[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 39.034771][ T27] audit: type=1800 audit(1549468320.665:25): pid=7792 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 39.070511][ T27] audit: type=1800 audit(1549468320.665:26): pid=7792 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 39.092549][ T27] audit: type=1800 audit(1549468320.665:27): pid=7792 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.21' (ECDSA) to the list of known hosts. 2019/02/06 15:52:11 fuzzer started 2019/02/06 15:52:14 dialing manager at 10.128.0.26:36685 2019/02/06 15:52:14 syscalls: 1 2019/02/06 15:52:14 code coverage: enabled 2019/02/06 15:52:14 comparison tracing: enabled 2019/02/06 15:52:14 extra coverage: extra coverage is not supported by the kernel 2019/02/06 15:52:14 setuid sandbox: enabled 2019/02/06 15:52:14 namespace sandbox: enabled 2019/02/06 15:52:14 Android sandbox: /sys/fs/selinux/policy does not exist 2019/02/06 15:52:14 fault injection: enabled 2019/02/06 15:52:14 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/02/06 15:52:14 net packet injection: enabled 2019/02/06 15:52:14 net device setup: enabled 15:54:38 executing program 0: get_thread_area(&(0x7f0000000000)={0x9, 0x100000, 0x1000, 0x1, 0x2, 0x81, 0x80000000, 0x9, 0x3, 0x7}) r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x7fffffff, 0x800) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000080)) r1 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x0, 0x80000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x4c, r2, 0x300, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x4}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}]}]}, 0x4c}}, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r1, 0xc008551b, &(0x7f0000000280)={0x7, 0x20, [0x101, 0x114, 0x6, 0x9, 0x5, 0x52, 0x4, 0xb5e4]}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000380)={r3, 0x10, &(0x7f0000000340)=[@in={0x2, 0x4e21, @rand_addr=0x75a}]}, &(0x7f00000003c0)=0x10) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000400)={0x1f, 0x25, 0xe, 0xf, 0x3, 0x101, 0x2, 0x96, 0xffffffffffffffff}) lsetxattr$security_smack_transmute(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='security.SMACK64TRANSMUTE\x00', &(0x7f00000004c0)='TRUE', 0x4, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f0000000500)={0x40, 0x1, 0xffffffffffffffff, 0x7, 0x10, 0x8}) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000540)={r3, @in={{0x2, 0x4e20, @remote}}, 0x71adcb63, 0xffffffff}, 0x90) ioctl$void(r0, 0xc0045c78) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000600)={[{0xfffffffffffff672, 0x7ff, 0x1000, 0x81, 0x5, 0x3, 0xfffffffffffffffc, 0xbb62, 0x8000, 0x5788d8f1, 0x97, 0x400, 0xf9}, {0x3c9, 0x8, 0x4, 0x9, 0x1, 0x2, 0x8, 0x7, 0xc25c, 0x3, 0x2, 0x9, 0x9}, {0xffffffff, 0xe1, 0x987, 0x0, 0x0, 0x4, 0x3be3, 0x2, 0x6, 0x6, 0xa9, 0x9, 0x9}], 0x1000}) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f0000000680)={0x2bd2, {0x4f61, 0x7, 0x1f, 0x0, 0x4, 0x1}}) write$P9_RLOPEN(r0, &(0x7f00000006c0)={0x18, 0xd, 0x1, {{0x80, 0x0, 0x7}}}, 0x18) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r4 = syz_open_dev$mouse(&(0x7f0000000700)='/dev/input/mouse#\x00', 0x10001, 0x80000) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r4) open_by_handle_at(r4, &(0x7f0000000740)={0xe7, 0x100000000, "97030ecf3734e79858a746f774b6ba260033f5a3d9882e96e5b5d868e838dc75d65b8d418855d63a896cbede35efac6fa55a115b898820c446c7d96867c20533fa04270b77f8fe49b391733f8a9a33bcc51277fafb8f07fb6b11af91c3a3ea0699ebdca982e97b61962ff4be6286bea0ab05e76db07a7e4a52027acbb9314e878f7ef45a5100289c66cb6bcc79e46926f6a4d2debd4d53bc422987c576f343f6e4a534fac53540afdceec62ff3fdc4f1422deb203d2fb6a0f41bc5a7dc8e4de67fbb42bfbe1b055b9ebac115e9fff9c2c142ee8e92a2401e947495fdae46e7"}, 0x26000) ioctl$VIDIOC_STREAMOFF(r4, 0x40045613, &(0x7f0000000840)=0x3) bind$rds(r4, &(0x7f0000000880)={0x2, 0x4e23, @local}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000940)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@dev}}, &(0x7f0000000a40)=0xe8) mount$overlay(0x0, &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='overlay\x00', 0x10000, &(0x7f0000000a80)={[{@nfs_export_off='nfs_export=off'}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}], [{@uid_lt={'uid<', r5}}]}) ioctl$RNDADDENTROPY(r4, 0x40085203, &(0x7f0000000ac0)={0x8, 0x8b, "8e7232577ddb30faad23e0b9a65f1d9d6cdb0916ec2d68ceb32a12d3273fda62f7aafe016b478440a86d2d46c0a944c566c13e163c56c4005ee652ab139db940296e51a302d77add564d6e366bc3de05952772fb69c68294ea0c985123af60c33b35a40c9d858423a505be8b088ac88dd74639c3e7a98a30967ed42d4816305ba58ccacd7c5425a47abfd0"}) ioctl$SCSI_IOCTL_STOP_UNIT(r4, 0x6) syz_mount_image$bfs(&(0x7f0000000b80)='bfs\x00', &(0x7f0000000bc0)='./file0\x00', 0x4, 0x7, &(0x7f0000001040)=[{&(0x7f0000000c00)="d82aa36a84326c3928b4ae370422d85a76c0b1c3e72bb9995301166cc075409452ddf638ee46ea108b55643a70fc92669269315c1e2f740d724b59519de122", 0x3f, 0x1ff}, {&(0x7f0000000c40)="fa70f9948d4a6555d78e815ef5bfaa78a7f1e364a9420f023ef8fb4a0b9d1603c79e00d6b50140e0a7dbb7e43204c717dd1087cace207ae9aef03c3805e711ab2ccf86d2d7ae6425019f3d2719309cc32b7581acad9f9eb4ec98e30588b3bd8c34805b9775191bc0485de9d667df6d327c329c476d582ca5f56ded8d0ce20be104b5229f4ed66861d1affc7f1f350dbaf7193a59517b313f5dd38633b380fa36c4780aefbe2b4a6b78823b9254f43d1bebf69443dce05342dba8609d7647f45502d7b4c7eafe2245367dfc8128d286287b513c73adf866cf3e1cf5ac881c6c697541c74560bd3932d77fc817751dfd8b04", 0xf1, 0x101}, {&(0x7f0000000d40)="abf01b3934d0ac2d0c6e3b9ddbe405bbdfdd8bd93c6b866f06f643d4314345444930c2c4c2aa1ef30167e0f082d21894635b136699aa4c57b344b0cf9dbb71b099d0db839b32192164dd52b696", 0x4d, 0x100}, {&(0x7f0000000dc0)="cccd043aa55eacbc527dc20bbbef1aadf952cdfe20a460c9fcd67c3c6869c09e62b00bea09a770989c795796fa479814929acf0823776e19d35e3ca1b71eb63221df181a4a4cd7d4a956efa4ec4c7bcd633bdfa01b90916d9521d4e419052b0dd37eb8345e0fcf4d42f36092e0c32ba9decafc296b4fdcbc085d3d4aa90e991705639bf0fd8f0bbfcabba1a287e65d8eb244df14bae7bb4d78c94d8b2a5d4ab47fa69d6cd12a8ab686fc2343d646b6f1a47ccaca11d24a74e42772f2bcd4d54119a79e26265addb40ea9266310f81265", 0xd0, 0x80000001}, {&(0x7f0000000ec0)="f707305c", 0x4, 0x6}, {&(0x7f0000000f00)="dd2185d4b00fcc51a2fe7725ffb091244143352f24a20cb70050900e7d727302bf74fa0f080caf0c6df9f9c741c66292840ab3844bd3dbb8ca6668c29eddb677402fa79ec2f72087d97e6d883c6286c0eb4a881873535d8a9ac15f762519649e299e601d090f974188c9c9e202a7b2efc8ae72d874e67d08d48910a642e4e78c3fba447e0579275d98d7925f8d2f162e4d79d017ab2bc9c7724ef5a7db7a12698197f4d12af6ea492cb4f09ecc2803e9c665f0dd6ec63ac0d794a154a8ed9e3090", 0xc1, 0x9}, {&(0x7f0000001000), 0x0, 0x1bf1}], 0xe8012, 0x0) bind$rxrpc(r4, &(0x7f0000001100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e22, @multicast1}}, 0x24) sendmsg$rds(r4, &(0x7f0000001500)={0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000001140)=""/197, 0xc5}], 0x1, &(0x7f0000001400)=[@mask_fadd={0x58, 0x114, 0x8, {{0x10000, 0x1}, &(0x7f0000001280)=0xd86a, &(0x7f00000012c0)=0xac0, 0x4, 0x8, 0x2, 0x20, 0x1a, 0x7ff}}, @mask_fadd={0x58, 0x114, 0x8, {{0x2, 0x200}, &(0x7f0000001300)=0x5, &(0x7f0000001340)=0x400, 0x2, 0x80, 0x5, 0xa96, 0x2, 0x2}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000001380)=""/6, 0x6}, &(0x7f00000013c0), 0x6}}, @rdma_dest={0x18, 0x114, 0x2, {0x3f}}], 0xf8, 0x80}, 0x1) syzkaller login: [ 196.497851][ T7956] IPVS: ftp: loaded support on port[0] = 21 15:54:38 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x117, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x2, {0x401, 0x2, "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", 0x37, 0x0, 0x1f, 0x9, 0x40, 0x4, 0xfffffffffffffac5}, r1}}, 0x128) r2 = getpid() perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x5, 0x3, 0x0, 0x100000001, 0x0, 0xe000000000, 0x0, 0xc, 0x9, 0x6, 0x6, 0x79, 0x80000001, 0x6f, 0x0, 0x7, 0x8, 0x6, 0x1f, 0x4, 0xd74b, 0x0, 0x8, 0x1, 0x5, 0x3ff, 0x37, 0xfffffffffffffff9, 0x8, 0x40, 0x81, 0x40, 0x0, 0xfffffffffffffff7, 0x9, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x3ff, 0x9}, 0x2000, 0x100, 0x5, 0x7, 0x58e, 0x1ffe0, 0x2}, r2, 0x4, r0, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/btrfs-control\x00', 0x80, 0x0) r4 = mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000008, 0x13, r3, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r3, 0xc018620b, &(0x7f00000002c0)={r4}) ioctl$TIOCNXCL(r3, 0x540d) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xac}, {0xa, 0x4e24, 0x4, @loopback, 0x7fff}, r1, 0x4}}, 0x48) fcntl$setstatus(r3, 0x4, 0x40000) r5 = socket$inet6(0xa, 0x2, 0x3) ioctl$RTC_UIE_ON(r0, 0x7003) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000b00)={{{@in=@broadcast, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@empty}}, &(0x7f0000000c00)=0xe8) r9 = geteuid() getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c40)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000d40)=0xe8) syz_mount_image$iso9660(&(0x7f0000000380)='iso9660\x00', &(0x7f00000003c0)='./file0\x00', 0x3b, 0x6, &(0x7f0000000900)=[{&(0x7f0000000400)="a682f210d2891b1490346556709c2899370ff0e007d4f45d8a6c710dad4d555a0bed296110be945a3dda5db195db378caf8e2c3790c9e173203b4d0730fce92dcdd233b05dc1636e42aa9fef4d450ff6f5bc2e1056631dfcc5af907757fa4f378b04a3f931964a28bfe2ede4d7c727e7bdf34ca8aca64b1e719e3b58354b2ca48bf084e4199d1af4bd368432ea1863f6320ba0e5bab36708519e2bde64783177af8982f513bbee19fb0e9f94b2eac7922ab0a7c642bb62b6e2af0bd439b1035cd564bd3b8a7b61", 0xc7, 0x79ec}, {&(0x7f0000000500)="3872db678a699fcb36e7528d5f8371dd23f091634c8f38e392097ef5e354a91f8aa87ed39bdd47e213f329e10273b7b133bef34ab62390aeab6568a4794ae6a06fc048a0b2b135ec1a767dcdc6fc14f396b254b4cdc4a6c3de99bf442847e08718b87a2664754d7d0e7ea67f7ed21347d8764c05df715eb26e99d68d349c2112504c0ac833e4df9ce4ef48d98a3cbe7febaa0f47b6b5f01abcec37ed14e00c384b0c6decd086f7ec5b9707cf884befdfc83cb370783069960a0948f9e4847cb5c9f330334807cb96fb3b995709d6b2bccba53e536cf931a093dc356ca5b10532c5c0b4274afe", 0xe6}, {&(0x7f0000000600)="80723a131e164504b3a19619fd58de4bf6f9b0373af80e1e2b37bf82b2af474813c5cc00a4e8a56d2b6d568dced7b3592805c13bc3096fa55d4cbfb24e28885130e4ba1f04f5c97433ccd795cf2ce012c1112d3683d8c6482da7160a39220d0fd194f5752e3fc3bd3a34a5778119b66e09c08d9c6257b2f7997115bfa5ff924391b4494b933b519ea51cdb809cc9e64b91fbb33c1fc40850a8b56fe032e96954db1e142323d526ddc31944f3558c7172c14cae5ff37e04a541226127693a8d471fcd369a5bca02470e61559ef1723f5b37d91c16590694e4996cb69e3b063126b157af6527b593", 0xe7, 0x9b}, {&(0x7f0000000700)="fe92e0cd21095c4f31a8c218ead784a430b6a92bf656fe4f0ae11ba7de0cd3fea573bee2c0c562647651ddef4f498582d7e67d9451d81202db62bbf26dca123e7a1f65b1bb584faebec99834f147", 0x4e, 0x19}, {&(0x7f0000000780)="88a16beb536538f01b7ce08b8162c0577f57e3d8accf802f3de825cf68c1fe39090b11bf4558aa1638c2b8cd675195c92d5d066a8cc90f7839e0e7e37d2ec6a341307d031e3e9ae3e7ecb03ef2ca66d72ee58730cfa97ecb5a03422f712f6a7b2be15760d449d663b33a7b8ed46bc488d813af33bb7023526d86b5e261b4a74bc94b0500fbe7ae62d427a6e6ee14812f78948c70d34470f1126e7fb292635fe506424bda4f74c83ace47c3a8fc6fefe8778027965acf220be50d7d7e8add69c011404b64ae50d8eb65b16902b599e2268547f73cb2afad951eee843bfb96313e93cd0d5ce637482d0aff8caf71c484211acd725df78bc5d3", 0xf8, 0x180000000000}, {&(0x7f0000000880)="df5f5d746a5eecba313b77486b76c9f6b7647230ff7c20708db6f3aa98a7c40a21eefdd505adcc2536985d0960cf1d6540cb9471f4a0f22afd8fb8714ff602f59ab39339637d68a0", 0x48, 0x38}], 0x0, &(0x7f0000000d80)={[{@hide='hide'}], [{@euid_lt={'euid<', r7}}, {@fowner_eq={'fowner', 0x3d, r8}}, {@fowner_lt={'fowner<', r9}}, {@dont_appraise='dont_appraise'}, {@dont_hash='dont_hash'}, {@seclabel='seclabel'}, {@obj_role={'obj_role', 0x3d, '/dev/null\x00'}}, {@permit_directio='permit_directio'}, {@fowner_gt={'fowner>', r10}}]}) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000e40)="e79c952e25ee08ccf80a9a95022b15d7", 0x10) sched_setattr(r2, &(0x7f0000000e80)={0x30, 0x7, 0x1, 0x7, 0x10001, 0x400, 0x9, 0x7efa}, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f0000000ec0)={0x8, 0x120, 0xfa00, {0x2, {0x7ff, 0x7, "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", 0x15, 0x2, 0x612d925d, 0x0, 0x5, 0x3da, 0x7}, r1}}, 0x128) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000001000)) mmap$perf(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000000, 0x80112, r3, 0x0) ioctl$sock_SIOCSIFBR(r5, 0x8941, &(0x7f0000001040)=@generic={0x0, 0x3, 0x5}) r11 = openat$rtc(0xffffffffffffff9c, &(0x7f0000001080)='/dev/rtc0\x00', 0x8002, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r11, 0x84, 0x66, &(0x7f00000010c0)={0x0, 0x5}, &(0x7f0000001100)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r5, 0x84, 0x5, &(0x7f0000001140)={r12, @in6={{0xa, 0x4e23, 0x1, @mcast1, 0x3}}}, 0x84) accept4$ax25(r0, &(0x7f0000001200)={{}, [@remote, @netrom, @netrom, @rose, @rose, @netrom, @rose, @bcast]}, &(0x7f0000001280)=0x48, 0x80000) sendmsg$nl_route_sched(r0, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x7a00000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)=@gettclass={0x24, 0x2a, 0x400, 0x70bd28, 0x25dfdbfc, {0x0, r6, {0x7, 0xfff2}, {0xf, 0x67d0c57d095f2340}, {0x0, 0xffff}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) [ 196.622772][ T7956] chnl_net:caif_netlink_parms(): no params data found [ 196.724355][ T7956] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.745750][ T7956] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.764929][ T7956] device bridge_slave_0 entered promiscuous mode [ 196.773368][ T7956] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.780926][ T7956] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.789015][ T7956] device bridge_slave_1 entered promiscuous mode [ 196.816935][ T7956] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 196.827117][ T7956] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 196.830300][ T7959] IPVS: ftp: loaded support on port[0] = 21 [ 196.857816][ T7956] team0: Port device team_slave_0 added [ 196.869042][ T7956] team0: Port device team_slave_1 added 15:54:38 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x3) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r1, 0x910, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1a}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x8004}, 0x20004804) socket$kcm(0x29, 0x2, 0x0) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000180)={0x749bc2e8, 0x0, 0xd7, 0x400, 0x1, 0x400}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0), 0x111, 0x1009}}, 0x20) ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f0000000240)) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x480000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x68, r2, 0x706, 0x70bd25, 0x25dfdbfe, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0xffffffffffffffff, @media='udp\x00'}}}, ["", "", ""]}, 0x68}}, 0x240000c0) umount2(&(0x7f0000000440)='./file0\x00', 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000480)={0x8, 0x0, 0x4}, 0x6) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f00000004c0)={0x7, 0x100, 0x0, {0x8, 0x7, 0x5, 0xffffffffffffff01}}) mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000000, 0x10, r0, 0x0) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000500)={0x200, 0x7, 0x0, [{0x8, 0x1a, 0x4, 0x7, 0x16e00, 0x3, 0x9}, {0x2, 0x37, 0xffff, 0x1d6b, 0x7, 0x5, 0x2}, {0x37b, 0x1, 0x7, 0xc28d, 0xde, 0x3, 0x100}, {0x2, 0x3f, 0xcf, 0xd4, 0x1, 0x10001, 0xe5}, {0x7, 0x9, 0x7, 0x10000, 0x6, 0x6}, {0x5, 0x47, 0x7, 0x1, 0x800, 0x7, 0x200}, {0x7fffffff, 0x2, 0x7fffffff, 0x4, 0x20, 0x1, 0x800}]}) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000700)) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000740)={0x800, 0x9, 0x0, [{0x0, 0x80, 0x1111, 0x3, 0x7fffffff, 0x307, 0x3b}, {0x4, 0x4, 0x6a, 0x800, 0x4, 0x400, 0xfffffffffffffffa}, {0x5671, 0xe9e, 0x9, 0x4, 0x91e1, 0xb4c, 0x80000001}, {0x3ff, 0xffffffff, 0x6, 0xce, 0xfffffffffffff70c, 0x3ffc0000, 0x2a9}, {0x152, 0x5, 0x3, 0xdd, 0x5, 0x331aeaf3, 0xffff}, {0xffffffffffffff01, 0x4, 0x1ff, 0x6, 0x63, 0x0, 0x4}, {0x7, 0x3, 0x1ff, 0x7, 0x8, 0x1000, 0x1}, {0x6, 0x461e, 0xd003, 0x100, 0x1b, 0x6c, 0xffffffffffffffff}, {0x0, 0x100000000, 0x8, 0xfa54, 0x8, 0xfffffffffffffffd, 0xffffffffffffffc1}]}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000a00)={0x0, r0, 0x0, 0xa, &(0x7f00000009c0)='/dev/vbi#\x00'}, 0x30) get_robust_list(r3, &(0x7f0000000b80)=&(0x7f0000000b40)={&(0x7f0000000a80)={&(0x7f0000000a40)}, 0x0, &(0x7f0000000b00)={&(0x7f0000000ac0)}}, &(0x7f0000000bc0)=0x18) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x420}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x30, r2, 0x104, 0x70bd2c, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x7f, 0x4, 0x9, 0xcd}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x8804}, 0x8080) prctl$PR_SET_PTRACER(0x59616d61, r3) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000d00)='/dev/video37\x00', 0x2, 0x0) accept$unix(r0, &(0x7f0000000d40)=@abs, &(0x7f0000000dc0)=0x6e) fsetxattr$security_ima(r4, &(0x7f0000000e00)='security.ima\x00', &(0x7f0000000e40)=@ng={0x4, 0xd, "81ae5f88850f62a1e2f6eeeddef427bb"}, 0x12, 0x2) syz_open_dev$usb(&(0x7f0000000e80)='/dev/bus/usb/00#/00#\x00', 0x4, 0x20000) syz_mount_image$f2fs(&(0x7f0000000ec0)='f2fs\x00', &(0x7f0000000f00)='./file0\x00', 0x6, 0x2, &(0x7f0000001080)=[{&(0x7f0000000f40)="c51c5a20b5cf8111f1ca6b00df9740754c1fcde23c3f92b6348c2573b31921422573b51bb21d505c2eb4b3ff9f09bff44201631089226427268516623fbffe079c4154846b9bf4a7e6a77bf717d8fcac1a0d7b0dfebbd33491ae556f5b90465d92937bbe65169edefcc27f4ddae9d15cd91b2b2720e07b97d29c521a9613fad9a02698ca44a183c76bbe3e97466ac6bf7003a012caff25b7479d08a57df42d05544da500727b8a", 0xa7, 0x1}, {&(0x7f0000001000)="0c258b7ac3a0f4e450639bd9981384dd413d9fb59ddac1bb72ee3e8b5b9d000d1dc040a019352ed83744b524148b715b4aaed3c89f0256baf5dc15c0711ee48004ed6bc9cd799b90ce21de31aefd3973a4a33b842570286b2ef766415d66747f27b18bb7432aa238b22696e9eaa5e4b265402acc3a04e1274d99", 0x7a, 0x8}], 0x4, &(0x7f00000010c0)={[{@test_dummy_encryption='test_dummy_encryption'}, {@inline_xattr='inline_xattr'}, {@whint_mode_off='whint_mode=off'}, {@two_active_logs='active_logs=2'}, {@nolazytime='nolazytime'}, {@prjquota={'prjquota', 0x3d, '^md5sumeth0'}}], [{@subj_role={'subj_role', 0x3d, '&S%^]cgroup'}}]}) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000001140)) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000001180)="fe2f9d89ff3d10bee0e57579c4b2c3243dd7cbac7d73a70440615595625be75fea659543f449d33b89f42b82eabe5429a17c989cbe860c51bfa0ccbd21ded099980aebf30ea5bb6530f007a7aa195f15ad3290f392c84104694ea707683d7a2dad1dea82d7b17d5dc4a36da0233092e4be3bd76562b2e4fe4dcd095be8e46a1c592b5727f38a547ca4c416d3fb54a4eec6747b181e488ef44bf8f662d495fae3ca3347be83c0931320c1d92bc38af189ee7b5cef81a048bc1e3e98cc5b6733b6a237355dd90fe20375618f2d4e") prctl$PR_SET_SECUREBITS(0x1c, 0x3) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001280)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000001380)=0xe8) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000013c0)={@dev={0xfe, 0x80, [], 0x20}, @mcast1, @rand_addr="3c41ccd9d67100985f69c1643c487e18", 0x10000, 0x9, 0x4, 0x100, 0x3, 0x180, r5}) [ 196.958305][ T7956] device hsr_slave_0 entered promiscuous mode [ 196.995223][ T7956] device hsr_slave_1 entered promiscuous mode [ 197.061331][ T7956] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.068556][ T7956] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.076221][ T7956] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.083284][ T7956] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.097282][ T7961] IPVS: ftp: loaded support on port[0] = 21 15:54:38 executing program 3: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xfff, 0x2100) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000040)={0x400}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x3}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000100)={r1, 0x1000, 0xa5, "2dc2aa2e4bcedd0637ee9043d3ae6f3c5c607085a15042c3277a6c5469cdb3563e1e28d0eed6f79fc1e73cec29d21b2cbce3c4224fc264fc592ff7af162a7d33b3451af469f123838e600459e1e2fc12f96fbae65846cd27d0b0b74ee32294de596105530b7941a0a3003b42b1aa21daba995c010b8285b885f1f40dfbfe269d8ddffba5915180f99e2184ad4070393df1a7d71f823e5c3a6b9ccbab303c6b25a377de2934"}, 0xad) recvmsg$kcm(r0, &(0x7f0000001880)={&(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000001740)=[{&(0x7f0000000240)=""/63, 0x3f}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/244, 0xf4}, {&(0x7f0000001380)=""/247, 0xf7}, {&(0x7f0000001480)=""/54, 0x36}, {&(0x7f00000014c0)=""/214, 0xd6}, {&(0x7f00000015c0)=""/43, 0x2b}, {&(0x7f0000001600)=""/239, 0xef}, {&(0x7f0000001700)=""/46, 0x2e}], 0x9, &(0x7f0000001800)=""/96, 0x60}, 0x40) ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f00000018c0)={0x7fff, 0xfffffffffffffffc, 0x3, 0x1, 0x800, 0x20}) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000001900)="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") getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000001a00)={r1, 0xe7, "218b63020f0876cd19c0bf4061ceb161f1cfa79d648eb6cd228ed1a1af5edce0609df2fa3c3f1b1604003cbf67ba5ce15c96156777573918f2751d39d4137bf18e1bd502fcae5d81f1f5b4a64e5c53fe79a7dcca415c95d177bd7c7a6eec58595ae4057f291c7faf7171f0f33df8e0bbed011c5d6c4b569c05b72453a750811a75d38ad6c742204b2bbc6ee5295d66047b982350236643b1f4d879c81c285c7f16c253a33d5054caee8af7228a080b7496f9bb9a960d511ee1c980c96443c3e6fb5b7537c7ee4d9f61b4959c2ba3f594f6f3a1408c1b16bab156bff8bb39d59ccc4333d975cc3c"}, &(0x7f0000001b00)=0xef) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000001b40)={r3, 0x7fff, 0x100000000}, 0x8) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0x40) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000001b80)={0x8000}, 0x4) r4 = syz_open_dev$radio(&(0x7f0000001bc0)='/dev/radio#\x00', 0x1, 0x2) getsockname(r2, &(0x7f0000001c00)=@l2, &(0x7f0000001c80)=0x80) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000001cc0)={0x7, 0x8, 0x8, 0x7fff, 0x7, 0x1, 0x8, 0x8a5, r3}, &(0x7f0000001d00)=0x20) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f0000001d40)=r4) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001dc0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r2, &(0x7f0000001f00)={&(0x7f0000001d80)={0x10, 0x0, 0x0, 0x10100}, 0xc, &(0x7f0000001ec0)={&(0x7f0000001e00)={0xa4, r5, 0x500, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xc9ab}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_SOCK={0x48, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x301}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x65}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_REF={0x8}]}, @TIPC_NLA_LINK={0x28, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7926}]}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x20000004}, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000001f40)) bind(r0, &(0x7f0000001f80)=@nfc_llcp={0x27, 0x1, 0x2, 0x1, 0x5, 0x53, "bfbb07592087980fbf487d389f50d35638770f16c270c78a89e182e26b64da2a2fb1a8be2aac5e2952fac46779dcc403256c437d1e3d94d79ea9ae4ec0c347", 0x1d}, 0x80) r6 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x2) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000002000)) ioctl$CAPI_GET_ERRCODE(r4, 0x80024321, &(0x7f0000002040)) ioctl$TCSETAF(r4, 0x5408, &(0x7f0000002080)={0x5, 0x0, 0x3c6b, 0x1, 0x10, 0xfffffffffffff800, 0x7f, 0x1, 0x727f, 0x1}) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r4, 0xc040564a, &(0x7f00000020c0)={0xd7, 0x0, 0x3008, 0x80, 0xfffffffffffffff7, 0x2, 0xff, 0x1}) ioctl$KVM_S390_VCPU_FAULT(r6, 0x4008ae52, &(0x7f0000002100)=0x6) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000002180)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f00000022c0)={&(0x7f0000002140)={0x10, 0x0, 0x0, 0x400001}, 0xc, &(0x7f0000002280)={&(0x7f00000021c0)={0xa8, r7, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x260000000000}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x52a}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bcsh0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x400}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xf8}]}, 0xa8}, 0x1, 0x0, 0x0, 0x8014}, 0x0) ioctl$KVM_S390_VCPU_FAULT(r4, 0x4008ae52, &(0x7f0000002300)=0x7) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r4, 0x84, 0x1c, &(0x7f0000002340), &(0x7f0000002380)=0x4) [ 197.355569][ T7959] chnl_net:caif_netlink_parms(): no params data found [ 197.368265][ T7965] IPVS: ftp: loaded support on port[0] = 21 [ 197.375599][ T7961] chnl_net:caif_netlink_parms(): no params data found 15:54:39 executing program 4: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x400, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}, {0x1}, 0x3e, {0x2, 0x4e22, @rand_addr=0x100000000}, 'irlan0\x00'}) ioctl$KVM_SET_CLOCK(r0, 0x4030ae7b, &(0x7f00000000c0)={0x200, 0xffffffff}) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000100)={0x47a6, 0x0, 0x8, 0x5e}) open_by_handle_at(r0, &(0x7f0000000140)={0x8, 0x401}, 0x1) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bind$pptp(r0, &(0x7f0000000180)={0x18, 0x2, {0x0, @multicast1}}, 0x1e) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f00000001c0)=0x8001, 0x4) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0x20200, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000240)={{0xa, 0x4e22, 0x9, @mcast1, 0x49}, {0xa, 0x4e21, 0x10000, @local, 0xfffffffffffffff7}, 0x4, [0x400, 0x5, 0xffffffff, 0x3, 0x15f, 0xcd4]}, 0x5c) write$binfmt_misc(r1, &(0x7f00000002c0)={'syz0', "127f22adf133cc054025e7f450d00f44ff5763fff6e46ccfd44ef919bce1297535019fd2df2eb19bbf0b30be42e3a0104da17121796137dce83300599deb826b0e8471079e3d3052dbbef648902a6284ba14100a1050dad60d601e3c53f75cf5bb2a2bd4442d9aaddcdc9e2ac2152e4e86"}, 0x75) r3 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) shmat(r3, &(0x7f0000ffc000/0x4000)=nil, 0x2000) ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f0000000340)=0x10000) r4 = semget(0x1, 0x3, 0x100) semtimedop(r4, &(0x7f0000000380)=[{0x4, 0x5b32, 0x1000}, {0x1, 0x5, 0x1000}, {0x4, 0x10000, 0x800}, {0x0, 0xffffffffffffff80, 0x800}, {0x3, 0xb1, 0x1800}], 0x5, &(0x7f00000003c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r0, &(0x7f0000000400)="d5223501923c2c7f3a967028e0f988193bcb44fca44b5bff42676c415668ced29cf9d0588435f03807f35e5f3da1cc7cea28fdde793586c32ddc9066c751d89670b86d8aaafa8ee15f660e93b4aed0d99b121b84d161e3f60e66db5426f303d28066f1e4cc729432b1301dcb85f66fddaba687015d291ce832c6ea7115b11c9e74cee52645f64041a45a4da44fe313b393ee8a528051a069a7830b69f3c3e9614d36f17fde01bd8d", &(0x7f00000004c0), 0x2}, 0x20) socket$inet_sctp(0x2, 0x5, 0x84) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000540)='/dev/dlm-monitor\x00', 0x2000, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000580)={0x18, 0xf, 0x2, {{0x80, 0x0, 0x6}}}, 0x18) fstat(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r6) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000640)=""/115) syz_genetlink_get_family_id$nbd(&(0x7f00000006c0)='nbd\x00') ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000700)={0x22, 0x10, 0x9, 0x13, 0x4, 0x8, 0x2, 0x16c, 0xffffffffffffffff}) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000740)={0x10200, 0x0, &(0x7f0000ffe000/0x2000)=nil}) msgctl$IPC_STAT(r4, 0x2, &(0x7f0000000780)=""/250) getsockopt$XDP_MMAP_OFFSETS(r2, 0x11b, 0x1, &(0x7f0000000880), &(0x7f0000000900)=0x60) socket$rxrpc(0x21, 0x2, 0x2) [ 197.439009][ T7956] 8021q: adding VLAN 0 to HW filter on device bond0 [ 197.536597][ T7961] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.543787][ T7961] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.565821][ T7961] device bridge_slave_0 entered promiscuous mode [ 197.618075][ T7961] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.628776][ T7961] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.637080][ T7961] device bridge_slave_1 entered promiscuous mode [ 197.656577][ T2979] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.665726][ T2979] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.674646][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 197.697289][ T7959] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.704335][ T7959] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.713112][ T7959] device bridge_slave_0 entered promiscuous mode [ 197.728134][ T7956] 8021q: adding VLAN 0 to HW filter on device team0 [ 197.736404][ T7967] IPVS: ftp: loaded support on port[0] = 21 [ 197.757701][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 197.767908][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 197.777291][ T7959] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.784341][ T7959] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.792651][ T7959] device bridge_slave_1 entered promiscuous mode [ 197.813291][ T7961] bond0: Enslaving bond_slave_0 as an active interface with an up link 15:54:39 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$can_raw(0x1d, 0x3, 0x1) sendfile(r1, r2, &(0x7f0000000040), 0x78) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000080)=0x401) r3 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x3ff, 0x97a9, 0x9bda, 0x1, 0x0, 0x3d4, 0xc0000, 0x8, 0xffffffff, 0x6, 0x6, 0x5, 0xfffffffffffff800, 0x3ff, 0x200, 0xb8, 0x5, 0x2, 0x40f11df2, 0x2, 0x4, 0x401, 0x9, 0x1, 0x1, 0x800, 0xbc, 0x6, 0x2, 0x7, 0x0, 0x123b, 0x7fff, 0x7, 0x315, 0x7, 0x0, 0xf17, 0x0, @perf_config_ext={0xffffffffffffffc0, 0x6}, 0x20000, 0x2, 0x0, 0xb, 0x9, 0x7fff, 0x5}, 0xffffffffffffffff, 0x9, r1, 0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x100000001, @ipv4={[], [], @empty}, 0x8}}, 0x3}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000240)={r4, 0x1}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000002c0)={r4, 0x7fffffff}, &(0x7f0000000300)=0x8) write$binfmt_misc(r1, &(0x7f0000000340)={'syz0', "6a750c96c5193d40c5d99469d24e16940e1190eb35eb9b9fbf30994f8ac80e2e14e9c04c78cad15c5b2ac4be7e085ccbc1704442d98aa687d5647bcc9cf4b74abb842bd5e688fa95a5685711f55f52e84714b9ad1fb4103230314a9e11dfbd8862afeaf7ffaafbd14fa36905792b1aceb51211020205b1363989efa81dfdc99f9f8aaad8dde5ed118c3c7842558f45535dee4b95c78cbdf04c9813aa4e6d1ea8a5683e50dc12a3c43bee9343f94498eb37f08aed4bba7125ff92547f53"}, 0xc1) sendto$isdn(r1, &(0x7f0000000440)={0x3f, 0x76, "b944236ae2c33c1ab5c1de0c40776f8a12ab823fc1e3882e3bd20852b60a12f13973decdae2b222cf2ecb966b3a6ac5e1eb705b9e4122d3a287cfcfc816d346cbb6f8323b2c3f0a67fd75075ee05ddc9a2a9f403cf28f6b2cc1ec8fd12a24f8182dd32617c8016141205eda981364a647d91ed4f579ef58282fc614f3757946692a8c501861b2a2cd734502b2d476457df021244201b370462095c120ef636b53ac2"}, 0xaa, 0x0, &(0x7f0000000500)={0x22, 0x1, 0x3, 0x7, 0x8a83}, 0x6) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000540)={r4, 0xfffffffffffffffe, 0x4, [0x6, 0x7, 0x80, 0x2]}, 0x10) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000580)='/proc/capi/capi20\x00', 0x48000, 0x0) getsockname$netrom(r6, &(0x7f00000005c0)={{0x3, @netrom}, [@remote, @null, @remote, @default, @null, @default, @bcast, @default]}, &(0x7f0000000640)=0x48) ftruncate(r3, 0x8) ioctl$KVM_GET_MSRS(r1, 0xc008ae88, &(0x7f0000000680)={0x5, 0x0, [{}, {}, {}, {}, {}]}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000700)={r5, 0x1}, &(0x7f0000000740)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000780)={r7, 0x9f2, 0x10}, 0xc) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) ioctl$sock_inet6_tcp_SIOCOUTQ(r6, 0x5411, &(0x7f00000007c0)) ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e85411, &(0x7f0000000800)=""/217) bind$vsock_dgram(r0, &(0x7f0000000900)={0x28, 0x0, 0x2711}, 0x10) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000980)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000cc0)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c80)={&(0x7f00000009c0)={0x2b0, r8, 0x28, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0xf0, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4ce7}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffeff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xda29}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}]}, @TIPC_NLA_BEARER={0x30, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e20, @rand_addr=0x3}}}}]}, @TIPC_NLA_BEARER={0x90, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'bridge_slave_1\x00'}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfffffffffffffc21}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @empty}}, {0x14, 0x2, @in={0x2, 0x4e21, @broadcast}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x81}]}, @TIPC_NLA_BEARER={0x8c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x40}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xe}}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x3ff, @empty, 0x7}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'bcsh0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x100}]}, @TIPC_NLA_BEARER={0x40, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e23, @local}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3ff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x10}, 0x4) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000001300)={'bcsf0\x00', 0x0}) bind$xdp(r1, &(0x7f0000001340)={0x2c, 0x1, r9, 0x31, r0}, 0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r6, 0x84, 0x0, &(0x7f0000001380)={r4, 0x0, 0x6, 0x10001}, &(0x7f00000013c0)=0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000001400)=@assoc_value={r10, 0xfffffffffffffff9}, &(0x7f0000001440)=0x8) fcntl$getownex(r0, 0x10, &(0x7f0000001480)) [ 197.840546][ T7959] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 197.852564][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 197.862364][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 197.873531][ T3473] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.880636][ T3473] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.899687][ T7959] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 197.916207][ T7961] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 197.936228][ T7970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 197.948857][ T7970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.958576][ T7970] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.965714][ T7970] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.013962][ T7959] team0: Port device team_slave_0 added [ 198.028702][ T7961] team0: Port device team_slave_0 added [ 198.042999][ T7956] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 198.047198][ T7973] IPVS: ftp: loaded support on port[0] = 21 [ 198.055018][ T7956] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 198.071246][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 198.079931][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 198.088677][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 198.097373][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 198.105594][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 198.113862][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 198.122250][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 198.130392][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 198.138749][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 198.147654][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 198.157132][ T7959] team0: Port device team_slave_1 added [ 198.162884][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 198.170703][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 198.200707][ T7961] team0: Port device team_slave_1 added [ 198.256643][ T7961] device hsr_slave_0 entered promiscuous mode [ 198.295321][ T7961] device hsr_slave_1 entered promiscuous mode [ 198.436663][ T7959] device hsr_slave_0 entered promiscuous mode [ 198.475171][ T7959] device hsr_slave_1 entered promiscuous mode [ 198.543320][ T7965] chnl_net:caif_netlink_parms(): no params data found [ 198.649771][ T7965] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.658053][ T7965] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.666276][ T7965] device bridge_slave_0 entered promiscuous mode [ 198.673931][ T7965] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.681598][ T7965] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.689576][ T7965] device bridge_slave_1 entered promiscuous mode [ 198.698350][ T7956] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 198.754076][ T7965] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 198.804604][ T7965] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 198.844269][ T7967] chnl_net:caif_netlink_parms(): no params data found [ 198.861585][ T7973] chnl_net:caif_netlink_parms(): no params data found [ 198.898612][ T7965] team0: Port device team_slave_0 added [ 198.956087][ T7965] team0: Port device team_slave_1 added [ 198.972016][ T7959] 8021q: adding VLAN 0 to HW filter on device bond0 [ 199.011597][ T7961] 8021q: adding VLAN 0 to HW filter on device bond0 [ 199.049518][ T7982] overlayfs: unrecognized mount option "uid<00000000000000000000" or missing value 15:54:40 executing program 0: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000000c0)="0a5c2d0240316285717070") socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000180)) r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000200)={0x2, 0x0, @multicast2}, &(0x7f0000000240)=0x10) sendmmsg$inet_sctp(r0, &(0x7f0000000500)=[{&(0x7f0000000280)=@in6={0xa, 0x4e24, 0xd26c, @mcast2, 0x7f}, 0x1c, &(0x7f0000000440)=[{&(0x7f00000002c0)="7c6479f5e04dea09ccdb5977bcfc8826922df895e5ce7b6dffa042eec24ffcc77639e4dab0070a7c4e67aaf14cfa33f80f85b3de53d6c1945f52efd0c56019d9a2bdbc156122b8ed97b3ceff77f5326598296a7114e87bc6b8299cd4c524899e4471ec0c8bb72c50cfbe2983eaed3c421ddc5c1398676201f9b69931efbca060b0d4e7af872338d83f46387409900e34e0b157975a066a5f", 0x98}, {&(0x7f0000000380)="ee8d5c856f8287a2a74aadd4420ebbd7c7a8206c31c6e9b930d40bfca976ae80b1663fb01df9a4e97713cd7405a05e3662537bee9897c097a3130c6c3c801504c061c8be310b99ba7e4ee3c2ea594b136da3bb22e87294583e9d84d2080d773208938547d6e8ccc170c6014d63d7ef61331491f280a7a8ee0e507969800d059de8f0f411e9c87a66b73c913290931ce507d7fdff279f8f065363d651aa8f7f73d54082905486c6e25b335656ac02254c93601328feacfa3137d5e0380c49ea", 0xbf}], 0x2, &(0x7f0000000480)=[@prinfo={0x18, 0x84, 0x5, {0x0, 0x20}}, @authinfo={0x18, 0x84, 0x6, {0x200}}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x6}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast1}], 0x60, 0x48000}], 0x1, 0x804) r1 = socket$netlink(0x10, 0x3, 0x2) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) getsockname$netlink(r1, &(0x7f0000000540), &(0x7f00000005c0)=0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) [ 199.082675][ T7959] 8021q: adding VLAN 0 to HW filter on device team0 [ 199.091285][ T7973] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.100506][ T7973] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.118075][ T7973] device bridge_slave_0 entered promiscuous mode 15:54:40 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x81) r1 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) sendfile(r1, r0, &(0x7f0000000600), 0x400) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x3, 0x6, 0x5, 0x0, 'ceph\x00'}}, 0x2e) syz_mount_image$ceph(&(0x7f0000000040)='ceph\x00', &(0x7f0000000080)='./file0\x00', 0x3, 0x2, &(0x7f0000000200)=[{&(0x7f00000000c0)="77f09b872281676ecce572ea5e2ee627f2b5cc7f456df845f4e0edf219d3638da85ab1c3eaca7ea81118c58371d321ba4d443eb430d473b289b2ab100b9f0af9ef799b8bd4210ca240d59d30a0d7a9da78544e2a8623a62012e5444a1ac924e7348eac02bce1d458049ff3582c57ce29345fc7e2311954ad16767375cfd1c757db43c4c07b0659155e5221887516b528595b54bd7015240f3838d1604daba46325ef1284bfe905e7a262e8f2ca0d28e9d9f92af696a473d82323bb7ef97ecfe3bf59acd5c6a69f", 0xc7, 0xe08e}, {&(0x7f00000001c0)="77f079947d02e99211fde844eb6ea47cd64ffedc7ced6771e381db5d9b615831b7e74ab14798f6745807b138d6ebd4279c518bef", 0x34, 0x9}], 0x1001010, &(0x7f0000000240)='}%-\x00') ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f00000005c0)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000480)={r3}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000740)={0x24, 0x0, &(0x7f0000000640), 0x9ddbbb49, 0x0, &(0x7f00000017c0)="b3ca18973fffa5804cee5b82917c9125700f615c1356e6a1e3c6a21140d7ed9c2353dde8f4e9073d428820991d3d6aa4cc40783ba645303be82cd4f2b61eaa0a12e181393b75b7e30f9f479da241964c2741b482c971baf6532e5712d2c4c8e25b4b418404dce34ea77028efec64a194dc9b0bc6e5c303906fad8997d1b8e6446752939b41083f309c8b83eda172022247728f3818b0ac2167df8018cefc526d9425cea2b032d54ca4b56a9e2654a7e596867e782676d638f4a879b1f3fff9b6b6672c78b587dcfe36fc6dc299fbab79e47e34d2de0b03177468d57dd44e0632a0ca894578f9a2afd33889808694728258428a536fa8c95e8dd8e26b35cfdc20dd40d0ca4a16d5b16011a08df3c8ca034f7ed7408119f9cf76e293cf5bb5a04da4698d303fd3b09376aa6d42fe3b64e0aa151c8410691d7e2dbc1c9e9c06cf7ba2b48564aa4ac1068ae70851e01e908d8cee3f1d9b94a66eca59508e3698b5ee53d97a8b6d9d985647de1d93595b294b27a27fd56629676c519193a30df36176c3675aea82f465407f27cb36d65021cfc2699f48b02548f3e8c9d525f00972a9455052e5e174a43b0cf0516347584dad3811623496635223f32c33025a4946e3c177444fc6ea663e5593343db74a743176ef1b8d5d34607db6a5f4cfacf5bfac35fbdc973ac2beb1c31984481d96d220613981cca0281283f765bd9e51cefb5828278d89d65972eab498abcf7fa63b2984310e23189c4a153d4f51979979541ce05333ade4d1ab308b9f09cb5f19e09b05228aac8f2ae66d169c1aa3625f0b3254485b6cf11a39854c74e2b241eb83c2a0c89c764a4a2613bc12f22eb9fa7b4458a4857f1c4015f35d26dce20bc7be26fdb5358de1543f7c1deaef5e6b47f74c9f048a73be6e66a9f4712bb0e077982db63ba30030b22f4d6c541a8155815a33b143a3dbbd680957932f67776687559aeafad31b569b6af869640224270f3ba8f87a95671179b2fa941c1b1f67fbde237ecc3e2913ca7bd5ebde2a05f59d8edc83098b5c969c65fc093a939642af18071fc434f447e7e32691433253447003674630dc31ff7675b7396104e3f2f8b392dea7a0b4ffac9167932e4a9ecf795cf291b1a9c4aaf59a8111ab12ea9244f3389b152511b8e7e91f98601ddd19654b80668f6802a531d9baa6a01ca138d4e26474df9cca15ba78c65d2fe018811e0c61037093e68d1ffc87245ca0e6f783fecac32fe5079816108bd5f0f53797ab1463908be5756192e8b6268b2cee99d027a162bc889bdddbed94661010c7b7b0f33ae23c9f4d4bf2b9ba3475a5faa0e50ee622f1603e7064d7d3b1e4be9d0f1b75a973648540b9eff2b2d787f85c7f515b624a774ffc9078e6038b27c02913c872a18ad8b7c01d790afbfcb7150155176d514523523c82de904dc6df6084a0b4585e5872a91568ec22f016e2a67aac911d3b78a9647295519a68e46c645f2d39dc750923f6679f65ebe6fac76b01e943aad2e2ac3e07f90a735127067abfe051f1283478ac60d37799ac381ca83a74eb86acbae75b092bb7b5d120633e6e6f332c0a8c0268722388a52d5f08ff60bebd4790921194ab82d83439d776f33a604b9fde1df6ddc9d943469b2bdebb545078471a851a37759f48ffff53412e8e4ea5027ceabd287ab516613a0949c352b33b7393027eb2e998720575cd27a35ef51b29678ba8717d7f855734fa8dc6c965ce42735ea8f26795f96c109cc7e563a3779efb66d5eb0e6bf722da75b6d8a1a0abf629dd2dd9e7734dc6764f16386a82b04b1f94e8ff0fa48b35247d2d56c60bf54e42582b8effb1d3e58c551906ce8ae73915b60e1176ec474b2e85ff8ccb5a0b5c5b42474c0a311a3bd6c525cd619e781f2edc6d09d4a45e077d8bba9cbc6ff95910ec686cf447b79d2af06b6fecaa7752ccdd96195a7fa06fee332447316722c50ab12cb7681eb5ef385ba9a7ced91bafd8423cd63ea11c5945e5e961867e53843bf3430796b1c262dffc49bcd5ba9bf8ada9ee1cdda67902a59f70e366633009765b86883e342eddbe69e9614570bf9d76049565400894fa2ad26d0e9ae2f3e6ec9670af09948f112d24efc45e757a31d2ff441e53f97daf939bc9b67e33ca1900b7ef70c9ea588b88eb857e905194e5d9657c7b24d92c08fbebf511d94f91976d11f5276f737b5ee6083bca66e2819fc2a7dd6c47efa385bc134d758620e549848d050ba2eed24bd75645289f94cdade633f9086a833b15388ddb2622780cc965522eaa8bb334accd5ceb3e3c71c757b182967ed5e06aa8b40d97e51b7ec8b3cb764209aeac1a09535b9783746b4398ce2ea89456ce099ce900c6aa911284ee91858043d049146d814c5fa941d8707bb9b3a0a4db0e4a6f9bfba48330c04148b29404f748945b4a2208dede529a8f3b9579c4f8acc6d95b3cc7694a2002b7502f889841e7183dced1a0c6a76ee681d204e3743a884ddb2b3d0be04415d6bc94b7ec37b9bd9bf87c02d4ca580424354603bee06925e04b9294d2aed831ccc527e85718661397dfa2d5238f5407f579f822158273a6f5cbaf5974cf042f3424f5fe6b994401405bb32283f9b118fdbee1b0597913779910adc08d2fe6c94a8bf68b140de17cb84ab2654fc645a8d3c32b5e4e513e4e16e85929fab2b24932c00ab0dc11962fa9c6f6fdce14666f02b8de69da87b8f5f6f8488e52e763de80c79eda167ab3c57009e0620ecd28490932b3caff8e55e72e5091f93be81c183b318168212094ec92ac7560066b912ea7130d2549ae5f76e8044a7d47500f45755f9aedc2302c1761b512b6e56f38243cb190926c5fd7e2047282b3bb024c26c26bbdc548eb0beb4bb0ba2786c8b5ffb1cf693da5091460369d9e1c72b830bb352daca28a461e9d53bd09fc7e34f348f0693b2c7dbc586fa791097543312a36fbdb668f93c58b073606f8d448382e79a965f6f44389ec3e7ff0ee4eeb3a78e5e316be989fc942fecf259998460bbf385d30645b089032baa8c0469e5a60a0953a6a303c5375c1b2ca75cf6164c51995cbd282b28d495885d32f820a4b439a86554c3c6c6fe629a6c842cf9fd47b86f7ab2eaed2d31ee5360186416e3d35f0a055d39705f9a91a081cdb1eede579258ee093e204fe9ff675563b6082f7ec860ff65bdf8468525d0c90f157a514cac47a890d2ec8965786fa21fe9f127d90004ba92a431612af2f21f671f3cf13644325973e247066ecc61936ba4cb5cc0af87640f982fe429c51a9bc80c0a7fa510aca4a70c3266682f2e577affad166c955f6004099c4c5bfa471ac7563aa3beba011b8cee04a04ce4ed9e2614404b48d4e05363e1de32cfd478836fcf2c318433e9c1b2a1a7d7909ef234962ba6b471f3d8cfe8518bc746ea3c9994b96692dae68950f328d46bec61bb67d7ace433169f54dbac0d0ed4bd24a99e086510603fd5c974436fc95e5835dc2b676035dcebb45d183a1b9c3e0b49a9e81b4eb903583dec3648031e55737f830f17504189f98c3574eeb43bf1594cf9f3b4d382e965d5b89c7d5c4ba0b20485405d980aa8c78a9454228e74443491cf7040160aedfa5d90a7d5df542a468975e72886b2fb72f7c7f5618a64591fad859c5ac1a52215d38a0894e1fccaca2133aad06fe07f70a96802ae45e8656939a549b8a65e0409eee91a890d205239da2a8e42f291eac8811627c759328350fba99899c89cacc698dffd5a07cc2ec405e7d25d518647b49fe74cac7cca4c398a643e1535e38a03b672df539b29678ccde4b5ba3c0d99b58e5647175c1200b4ace51bd764f177c5fe39eb3b1b514773710ca89cfd53d407be23fae03cf9c5f28812de8500f49698ef4a202e7fdc153126f435fc75245f1d518182e95bd855b19eac2a6c0d769ddb82d8e2ad19dd1086d19a2cebe57847231e4b1d6044133a034c61196d478552613705573f0fabb6329801e7d46709ee3cf462edd1562efebbf70b339907550a8ddbe5d12391ca4e587702f94262e123ea86d2ffb69d2881e0aafa32c05ac12d2bc85208d58adf4dddd8ebb533a9ce37041e997bceba6e5b552be981ad8fe3c83f0ada9a0a0e6fa15fc29f054d55255d4c5e0cdf9579fbf5e3eea1afee67c13b6861449e48dee3327b67d1ef2db24c402f531676e8efe77551c3e8ac1bf4dfcc43b699d3251bfc5ee5923b1b3027a03a5ca6519ddd094e111bec047c67c93ee807f18fd6ac98048a54e4bca8fa2bb5669a61af2281aa3712ff7dc098ef53080f45a6b284abbdb7b4b76cf683d750409d2d206e84ffbbfe8a35307fa2920c45a81cec829e8d29926b6fef77d87993246106be5f3f62cb3da70fec701d268d6a622c293aaaf0efbba26e4f061293da915e86c340d4855f83139b526ac7ccd55c5709a313505c023dea8675eb47cacaf398b7b01c848759cf03efad492bdb4e87c894a4b66f4b12e4b4d4cb031208507b66b006f04c147e677f5ee55ef9d6f2873b30d65691b19244c6171789721fced741e4d063f2e431344c7c10b18a858bc6463f086daf841942114f7c523baeadef984d69ee513c679f5d5a9f3ac4e3ccc476d32ca3aba599281226f3ce61cdfe10e387ff3e2c5376d44e14c922c1deedb5c92d0d40f2cdab11c3e0d4237ac4fcfcbd8dabedc9d0cdce6c51ac88dde8c8c8068b571b999040f3620b41e91caff5d05d6640e772cb76ff94f382bdfce97e39cd4050ee7daf4ed07eddf4126c925aec87c3bdac13f6c9356d311a7962201a687cd16fa5edee526019f5357f56ad351c7f6544b073946f4c3136f79f489f502d64cfbd074b84331001abe1851d82d52cc4ccf78297c57a01a0abe00eac196d6b093295d813ddeecccff651dea15cb81671b203d61d3eea143561015a49cce0fbf30a46d9497db37f122557c5e53453c2da64c8842c59f264a74d390dffbb82661e9327f3e86fac08ff1fe9a4782a092a10c4dffc3925918f1c00c8a3bcc99f397954dc9d76fb36a95fa5e6a840841b3dd51c438429e2a5106397d9804f7fa4b94074277f12d5dd2cb40e9cb7b905890324bcecf4e8a2ee521f5e0fce50d5dedde84ee617841ad0014489b02bb818aed4c42eef736027e651dfec9e9d01cf9a5a223e763257d1ae7dfcca379e40b260a795ad4fe49599ecdca55a74e81152f2ed396bf7d33dad36dabc20aed018dbb3b134132eec7a06c1ea1fee1c0ebbaafd4758fe07928377711c7fefa202a286aabbf1cc837a5d73610258125129ab86b91f2014d564221f6cc4aaab4c592514c079a3a316cb60a34cc75ebf6e839133cc2c577f1b37df4f4ea74972504b165036f9262593641866c71b57d47ee37b7aa1445af71b71bddb6a57a6239a3ac37b90d12e49b8cf71b83f83156067713ddc4a616ced89e3083334c66fefea052eed5f3cf6aa5288bb7a752a774339519b75c9ffe64150889a81cb0089031c618c4ee6c265d77d027b0aef1e160dac720a95ce6801c17fe2410b39aa42b40019520ebc57e7ce2c300315901adfa9431577198a6732ecb8e984e69d5ee7f7338188072340437a537aaeb49ccbce3edeabb98715810184f19c9bb8e730b8140088910687850b069a1b894cbcde5d8a591422ccff279d51727158bfe38b078d81b7d6d0a3387464d558f8916badfb923a94e87542354960ba625f93b34e6340448c06765090e94f01b2fd5950ef533970fc6473bb302bcbfda741f7238701b9b32040238113066edd38a097ff9fc8b78de407a47783db6512f23d352751a"}) ioctl$RTC_AIE_ON(r1, 0x7001) mmap(&(0x7f0000000000/0x600000)=nil, 0x602200, 0x0, 0x10, r1, 0x8000000000000000) [ 199.139227][ T7970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 199.174256][ T7970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 199.183627][ T7970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 199.192029][ T7970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 199.202607][ T7961] 8021q: adding VLAN 0 to HW filter on device team0 [ 199.248052][ T7965] device hsr_slave_0 entered promiscuous mode [ 199.285195][ T7965] device hsr_slave_1 entered promiscuous mode 15:54:41 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) connect$netlink(r0, &(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x10200000}, 0xc) fsetxattr$security_capability(r0, &(0x7f0000000380)='security.capability\x00', &(0x7f00000003c0)=@v2, 0x14, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="010001000000000088b070") write$ppp(r0, &(0x7f00000004c0)="98", 0x1) [ 199.340740][ T7973] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.354284][ T7973] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.363432][ T7973] device bridge_slave_1 entered promiscuous mode [ 199.372074][ T7967] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.382358][ T7967] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.391129][ T7967] device bridge_slave_0 entered promiscuous mode [ 199.398838][ T7967] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.406262][ T7967] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.413813][ T7967] device bridge_slave_1 entered promiscuous mode [ 199.458379][ T7967] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 199.468832][ T7967] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 199.486803][ T7973] bond0: Enslaving bond_slave_0 as an active interface with an up link 15:54:41 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000640)=@filter={'filter\x00', 0xe, 0x2, 0x470, [0x0, 0x20000140, 0x20000310, 0x20000580], 0x0, &(0x7f0000000080), &(0x7f0000000880)=ANY=[@ANYBLOB="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"]}, 0x536) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x200006c0, 0x200006f0, 0x20000838], 0x0, &(0x7f0000000000), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x11, 0x71, 0x88be, 'vcan0\x00', 'sit0\x00', 'ifb0\x00', 'ip6tnl0\x00', @random="81d5c9a4b050", [0xff, 0xff, 0x0, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xe8, 0x118}, [@common=@NFLOG={'NFLOG\x00', 0x50, {{0x8828, 0x3, 0xffffffffffffffff, 0x1, 0x0, "3c950973080fe385dcd09bc9b8d2c21734cd833be971e9808b99b1ab99752cdfc71e50012f074986c335773c1bfc95931d33e194ae30c4c0ce2749cdbeee1f06"}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x81}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x220) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0xbfea, 0x0) r2 = geteuid() fsetxattr$security_capability(r0, &(0x7f00000005c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x8, 0xffffffff}, {0xdf7, 0x80}], r2}, 0x18, 0x1) ioctl$RTC_PIE_ON(r1, 0x7005) [ 199.501304][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 199.520635][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 199.531989][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.539101][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.542646][ T8010] kernel msg: ebtables bug: please report to author: Wrong len argument [ 199.553433][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 199.557574][ T8010] kernel msg: ebtables bug: please report to author: bad policy [ 199.564307][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 199.574660][ T8010] kernel msg: ebtables bug: please report to author: Wrong len argument [ 199.579918][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.594252][ T8011] kernel msg: ebtables bug: please report to author: bad policy [ 199.595095][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state 15:54:41 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x77f, 0x0) ioctl(r0, 0x16, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x40101, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) [ 199.642360][ T7973] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 199.651563][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 199.661340][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 199.672733][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 199.684728][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 15:54:41 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r0 = open(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x3) mkdirat(r0, &(0x7f00000001c0)='.//ile0\x00', 0x0) mkdirat(r0, &(0x7f0000000000)='./file0/f.le.\x00', 0x0) renameat(r0, &(0x7f0000000240)='.//ile0\x00', r0, &(0x7f00000007c0)='./file0/f.le.\x00') [ 199.694015][ T3473] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.701105][ T3473] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.709812][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 199.725227][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 199.733764][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 199.758963][ T7968] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.766127][ T7968] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.777618][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 199.786967][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 199.791365][ T8021] overlayfs: filesystem on './file0' not supported as upperdir 15:54:41 executing program 0: r0 = socket$inet6(0xa, 0x1000000000003, 0x200) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x509800, 0x0) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x66d, 0x12200) write$apparmor_current(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="6368616e676568617420307830303030303030303030301a5230303030315e776c616e316e6f64657600747275737465645c6c6f00002f000026766d6e657430005c2f2147504c70726f63706f7369785f61636c5f6163636573735c7468312c6264657676626f786e6574312b5e24504c2c6c6f287070703100252873917374656d00"], 0x81) setsockopt$inet6_mtu(r0, 0x29, 0x11, &(0x7f0000000080), 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r2, 0x0, 0x5, &(0x7f00000000c0)='eth1\x00'}, 0x30) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc1105511, &(0x7f0000000240)={{0x8, 0x1, 0x1f, 0x7fff, 'syz1\x00', 0x447}, 0x5, 0x200, 0x9, r3, 0x6, 0x1000, 'syz1\x00', &(0x7f0000000140)=['em0nodev+\x00', '\xfevboxnet1@\x00', '/dev/dsp#\x00', '/dev/hwrng\x00', '/dev/hwrng\x00', '/dev/hwrng\x00'], 0x40, [], [0x3ff, 0x100000000, 0x50415a9b, 0x8]}) fcntl$getown(r0, 0x9) [ 199.809457][ T7967] team0: Port device team_slave_0 added [ 199.832454][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 199.842724][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 199.851293][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 199.860541][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 199.869929][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 199.892525][ T7967] team0: Port device team_slave_1 added [ 199.904675][ T7973] team0: Port device team_slave_0 added [ 199.912607][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 199.921256][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 199.929915][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 199.939388][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 199.948779][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 199.960799][ T7959] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 199.972192][ T7965] 8021q: adding VLAN 0 to HW filter on device bond0 [ 200.005838][ T7973] team0: Port device team_slave_1 added [ 200.024766][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 200.042719][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 200.052052][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 200.061030][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 200.126845][ T7967] device hsr_slave_0 entered promiscuous mode [ 200.165087][ T7967] device hsr_slave_1 entered promiscuous mode [ 200.216532][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 200.224335][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 200.235513][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 200.243690][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 200.252184][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 200.267390][ T8013] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 200.276580][ T8013] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 200.288519][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 200.337037][ T7973] device hsr_slave_0 entered promiscuous mode [ 200.355155][ T7973] device hsr_slave_1 entered promiscuous mode [ 200.398008][ T7965] 8021q: adding VLAN 0 to HW filter on device team0 [ 200.406720][ T7959] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 200.427902][ T8013] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 200.436863][ T8013] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 200.445807][ T8013] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.452844][ T8013] bridge0: port 1(bridge_slave_0) entered forwarding state [ 200.460587][ T8013] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 200.469450][ T8013] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 200.477955][ T8013] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.485070][ T8013] bridge0: port 2(bridge_slave_1) entered forwarding state [ 200.494068][ T8013] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 200.533210][ T8013] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 200.544037][ T8013] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 200.552995][ T8013] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 200.562835][ T8013] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 200.571281][ T8013] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 200.618997][ T8013] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 200.638873][ T8013] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 200.654189][ T8013] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 200.663036][ T8013] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 200.672198][ T8013] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 200.681558][ T8013] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 200.693240][ T7965] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 200.706800][ T7961] 8021q: adding VLAN 0 to HW filter on device batadv0 15:54:42 executing program 1: r0 = socket$kcm(0x10, 0x10000005, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000001d008103e00f80ecdb4cb9d91f63190400000000000000fb120001000e00da1b40d819a9060015000000", 0x2e}], 0x1}, 0x0) remap_file_pages(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x4c0, 0x8000) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x23, 0x101000) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x7) [ 200.791634][ T7965] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 200.860654][ T8044] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 200.870187][ T8044] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 200.874333][ T7973] 8021q: adding VLAN 0 to HW filter on device bond0 [ 200.892636][ T8049] mmap: syz-executor1 (8049) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 200.907163][ T8044] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 200.923504][ T7967] 8021q: adding VLAN 0 to HW filter on device bond0 [ 200.925889][ T8044] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 200.939133][ T8044] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 200.954028][ T7973] 8021q: adding VLAN 0 to HW filter on device team0 [ 200.961614][ T8044] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 200.970694][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 200.982114][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 200.989944][ T8044] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 201.015184][ T8044] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 201.020520][ T7967] 8021q: adding VLAN 0 to HW filter on device team0 [ 201.038933][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 201.051365][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 201.061722][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.068846][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.077010][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 201.084775][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 201.094650][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 15:54:42 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000002c0)={'\x05\x00', 0x6}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000100)={0x4, 0x0, 0x0, &(0x7f00000019c0)=""/246, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000180)={0x300000000001, r1}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'team_slave_0\x00', 0x3100}) ioctl$VHOST_NET_SET_BACKEND(r0, 0xaf02, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x402, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000000c0)={'\x00', {0x2, 0x4e24, @remote}}) [ 201.127879][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 201.160023][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 201.170819][ T3473] bridge0: port 1(bridge_slave_0) entered blocking state 15:54:42 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@hci, 0x80) socket$inet_udplite(0x2, 0x2, 0x88) r1 = accept4(r0, &(0x7f0000000000)=@vsock={0x28, 0x0, 0x0, @reserved}, &(0x7f0000000100)=0x80, 0x80000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x14400) pread64(0xffffffffffffffff, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000440)=0x40, 0x4) sendmmsg$alg(r1, 0x0, 0x1d3, 0x4040004) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x43, &(0x7f0000000740)={'TPROXY\x00'}, &(0x7f0000000780)=0x1e) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) ioctl$KVM_CREATE_PIT2(r4, 0x4040ae77, 0x0) semctl$SETVAL(0x0, 0x1, 0x10, &(0x7f0000000540)) r5 = dup2(r2, r4) syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r5, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x21000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="090028bd7000fddbdf2503000000040005000800040003000000080002000200edff070002000a000000"], 0x1}, 0x1, 0x0, 0x0, 0x8000}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 201.177957][ T3473] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.217219][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 201.226309][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 201.234517][ T3473] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.241591][ T3473] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.249266][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 201.258206][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 201.269143][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 201.277071][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 201.288113][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 201.294675][ T8071] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 201.296563][ T3473] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.318587][ T3473] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.328592][ T8072] Unknown ioctl 35093 [ 201.366337][ T8073] Unknown ioctl 35093 [ 201.388287][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 201.400621][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 201.409113][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 201.418012][ C0] hrtimer: interrupt took 49693 ns [ 201.423977][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 201.432669][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 201.445386][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 201.453765][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 201.462669][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 201.471223][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 201.479854][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 201.488679][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 201.497306][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 201.505813][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 201.514049][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 201.522362][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 201.530652][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 201.577895][ T7967] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 201.586174][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 201.593965][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 201.602297][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 201.629718][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 201.640423][ T7973] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 201.693528][ T7967] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 201.710020][ T7973] 8021q: adding VLAN 0 to HW filter on device batadv0 15:54:43 executing program 4: removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.syz\x00') r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x1, 0x0) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000140)={0x3, 0x2, 0x6}) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x7fffffff) r2 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r3 = socket$inet_smc(0x2b, 0x1, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) recvfrom$inet(r3, &(0x7f0000000180)=""/63, 0x3f, 0x102, &(0x7f00000001c0)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x2430}, 0x14) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x9) connect$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) 15:54:43 executing program 5: r0 = eventfd2(0x8, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f0000000100)=""/8, 0xfffffffffffffdea}, {&(0x7f0000001500)=""/231, 0x7}], 0x2) 15:54:43 executing program 1: r0 = userfaultfd(0xffffffffffffffdc) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0xffffffffff600000}, 0x7fffdfa1c000}) 15:54:43 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000280)=ANY=[@ANYBLOB="8b0000009fc627ad9ae5686eece9fe25755057234d5d3d43efebdde8e63629f55240e2f92eba2dcb909e61cb4a3467cca99902004d22ba04c8a13dd5c948e01e6552a5af09a3ec0b027c711ebd263054449fbed3549cb181597f23ed797c61276a33a50cc3c6fec1f603f1a1ba0925d6a187f18c0924d7"], 0x0) mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4, 0x40010, r0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000880)={0x8, 0x0, &(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='(\x00\x00\x00\x00\x00\x00\x00X\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x00(\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x00\x00x\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']], 0x0, 0x0, 0x0}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e23, 0x7, @dev, 0x7}}, [0x0, 0x7961fcc3, 0xffffffff00000000, 0x8, 0x751, 0x8, 0x2, 0x5, 0x3817, 0x401, 0x1f, 0xd, 0x9, 0x5, 0x60]}, 0x0) perf_event_open(&(0x7f00000008c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f00000006c0), 0x0, 0x100002, 0x0, 0x0, 0x0) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f00000009c0)={@null, @null, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast]}) r2 = socket$can_raw(0x1d, 0x3, 0x1) r3 = openat$dir(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_raw(r2, &(0x7f0000000140)={0x1d, r4}, 0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000000)={0xf17, 0x0, 0x4, 0x9, r1}, &(0x7f0000000940)=0x10) ioctl(r3, 0x5, &(0x7f0000000440)="672099b1a95be71185ee039735732dc2296a26c75479d62188f07d744128d64f1803b316c061025c53273ee779a14c737b01be29bd017b303b095c55e59a5c978dcff46cb8b769c7f1b9cc6ce814d0d5cd0e733910f12bf05f0685cfc96ec367c8cd4f1acef13b8499662ae7be8b6ed8167f137678f784ab2b2a7caa7c43337df6d210643fb15d2d6f429358d3e5b9cc1caf98f3aec529cd48c870a692dba3eef4075741ad3858ec45781c9231ee2600f9e792fa7b79dc38e1cd07d3c2b4c1086e1a921ae877ae694b2fd52ecb07ba44c471dbdde40155addeba62d1ce54949568a8fc3b589e0371c138cc0de8c8c4d2eb6ee6cd40edf1") setsockopt(r2, 0x402000000000065, 0xfffffffffffffff9, &(0x7f0000000080), 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) sendmmsg$nfc_llcp(0xffffffffffffffff, &(0x7f0000001b80)=[{&(0x7f0000000a80)={0x27, 0x0, 0x1, 0x0, 0x174c, 0x2, "1ddc37787121faccc97cc16d89ea3349ddb1882abc4761f38bc41e881d0b3f2213adefd7dccb3508d318002f25dd536138a77dbfd649633be43e9de500a940", 0x1f}, 0x60, 0x0, 0x0, 0x0, 0x0, 0x1}], 0x1, 0xc800) unshare(0x40000400) 15:54:43 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@hci, 0x80) socket$inet_udplite(0x2, 0x2, 0x88) r1 = accept4(r0, &(0x7f0000000000)=@vsock={0x28, 0x0, 0x0, @reserved}, &(0x7f0000000100)=0x80, 0x80000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x14400) pread64(0xffffffffffffffff, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000440)=0x40, 0x4) sendmmsg$alg(r1, 0x0, 0x1d3, 0x4040004) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x43, &(0x7f0000000740)={'TPROXY\x00'}, &(0x7f0000000780)=0x1e) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) ioctl$KVM_CREATE_PIT2(r4, 0x4040ae77, 0x0) semctl$SETVAL(0x0, 0x1, 0x10, &(0x7f0000000540)) r5 = dup2(r2, r4) syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r5, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x21000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="090028bd7000fddbdf2503000000040005000800040003000000080002000200edff070002000a000000"], 0x1}, 0x1, 0x0, 0x0, 0x8000}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:54:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) connect$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x1000, {0xc1, 0x1000, 0x8, 0x4, 0x4, 0xffffffffffffff81}, 0x5, 0x6}, 0xe) ioctl$KDGKBLED(r1, 0xc0045405, &(0x7f0000a07fff)) 15:54:43 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="2c6cd177657264723d2e3a66696c653079429d8c0c13c5ddbf35e45b49041f1d4476429dbffe142c4a7038e545a8597f188f0c03feec66efd3a6a3625fedbb266cbd33d21e1311d515fec81a28972284a1aa68f075cf9051b4c74bcf58960abe5d439ae0807a7bd04d"]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) accept4$nfc_llcp(r0, &(0x7f0000000140), &(0x7f00000001c0)=0x60, 0x800) lseek(r0, 0x0, 0x1) 15:54:43 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x10003, 0x42) read(r0, &(0x7f00000000c0), 0x0) 15:54:43 executing program 1: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000740)) memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\xbb.\x19;\xe1\xc1\xa9}\xeb\x96\xb1\xe2', 0x1000000000006) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) r0 = gettid() getpid() syz_open_procfs(r0, &(0x7f00000001c0)='limits\x00') r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vfio/vfio\x00', 0x400, 0x0) execveat(r1, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x1000) [ 202.197345][ T8121] overlayfs: unrecognized mount option "lÑwerdr=.:file0yBŒ ÅÝ¿5ä[IDvB¿þ" or missing value [ 202.235617][ T8121] overlayfs: unrecognized mount option "lÑwerdr=.:file0yBŒ ÅÝ¿5ä[IDvB¿þ" or missing value 15:54:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x9, &(0x7f0000000000)=""/2, &(0x7f0000000040)=0x2) r1 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="f138f609b01ec597d926990f1ba0183bb66daaea6c63429209b640493c2877085080b8d7998532e893be39e3720bffc851aa5be732283db446ff7a7bd4210e108412e8877624d0fbae6146a1aff1ccdef6bd95cc514a3a7b2863f09c7032c0edc899cd035d986ef86a9a12ef73269555d5659c64631f35da1958d54c2cc7043d1c17a7e94fba3174184f0cfad943d3a56e9086f9c009ccdd197f9ae4915f668fe6e897f720ed0c43e87bd4c909e539456f30906fb7df568f495ee24e38992ab0", 0xc0, 0x0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x20) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x3e) keyctl$set_timeout(0xf, r1, 0x3ff) getsockopt$netlink(r2, 0x10e, 0xc000e, 0x0, &(0x7f0000000340)=0x890b) 15:54:43 executing program 2: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="2300000007ffff160065269dd03fe36424491633d61e00"], 0x17) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c76657273696f6e3d3970323030302c00b9c84c970a8e1bdad3076877de94322d67c95c03e5520631742e7faa5685b3881f66cdd9a326d2116835fb8224010c0af4cc9afe3b7262e15931cf9ddcf27a69ae3dcfe45588840c14623e0976154f2db800f2043043f4f7d3088f80ecfbd8bdecca584956ce8354faa7821666137dff8d6405f2a2beb80077db5d51421ed60fc53fe20fc2f2acf4fb9071ea8769d259d9"]) [ 202.259040][ T8127] capability: warning: `syz-executor1' uses 32-bit capabilities (legacy support in use) [ 202.291382][ T8106] IPVS: ftp: loaded support on port[0] = 21 15:54:44 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x10003, 0x42) read(r0, &(0x7f00000000c0), 0x0) 15:54:44 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockname(r1, &(0x7f0000000840)=@rc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200, 0x0) fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000140)=[0xee00, 0x0]) write$FUSE_ENTRY(r2, &(0x7f0000000180)={0x90, 0x0, 0x7, {0x6, 0x1, 0x8, 0x6, 0x2, 0x0, {0x5, 0x48, 0x0, 0x6, 0x5, 0x200, 0x7f, 0x9, 0x3, 0x3, 0x3, r3, r4, 0x86e, 0x8f}}}, 0x90) r5 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000540)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000a80], 0x2, 0x0, &(0x7f0000000a80)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bcsf0\x00\x00\x00\x00\b\x00', 'sit0\x00\x00\x02\x00\x00\x00\xff\xff\x00', 'bond0\x00', 'vlan0\x00', @broadcast, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1a8) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r6, 0x20, 0x70bd27, 0x25dfdbfb, {{}, 0x0, 0x4109, 0x0, {0x14, 0x18, {0x8, @bearer=@udp='udp:syz0\x00'}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) 15:54:44 executing program 4: sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) lseek(r0, 0x0, 0x1) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$radio(&(0x7f0000000480)='/dev/radio#\x00', 0x2, 0x2) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000380)) ioctl$KVM_SET_CLOCK(r2, 0x4030ae7b, &(0x7f00000004c0)={0x9, 0xfff}) r3 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r3, 0x4008af00, &(0x7f00000000c0)=0x80000001fffffffe) ioctl$int_in(r3, 0x40000000af01, 0x0) r4 = syz_open_dev$swradio(0x0, 0x1, 0x2) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000400)='/dev/audio\x00', 0x400, 0x0) preadv(r3, &(0x7f0000000100)=[{&(0x7f00000016c0)=""/4096, 0xfffffffffffffe8d}], 0x10000000000005cf, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0}, &(0x7f0000000540)=0xc) ioctl$SIOCAX25DELUID(r5, 0x89e2, &(0x7f0000000580)={0x3, @default, r6}) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/mISDNtimer\x00', 0x400000, 0x0) close(r5) mq_timedreceive(r5, &(0x7f0000000000)=""/1, 0x1, 0x80000000, &(0x7f0000000080)) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000280)=ANY=[@ANYRESDEC=r7, @ANYRESHEX=r7, @ANYRES16=r7, @ANYRESHEX=r1, @ANYRESHEX, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESDEC=r5, @ANYRESHEX=r5, @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESHEX=r4, @ANYRESOCT, @ANYRES32=r1, @ANYRESDEC=r3], @ANYRES64=r3], @ANYRESOCT=r5]) ioctl$VHOST_NET_SET_BACKEND(r4, 0x4008af30, &(0x7f0000000180)={0x0, r5}) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) sendmsg$nl_route(r5, &(0x7f0000000440)={&(0x7f0000000340), 0xc, &(0x7f00000003c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="1c000000520000062bbd7000fcdbdf250a0800060001002e088f500000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x20040004) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, 0x0) [ 202.447031][ T8140] 9pnet: p9_errstr2errno: server reported unknown error e&Ð?ãd$I3Ö 15:54:44 executing program 2: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="2300000007ffff160065269dd03fe36424491633d61e00"], 0x17) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c76657273696f6e3d3970323030302c00b9c84c970a8e1bdad3076877de94322d67c95c03e5520631742e7faa5685b3881f66cdd9a326d2116835fb8224010c0af4cc9afe3b7262e15931cf9ddcf27a69ae3dcfe45588840c14623e0976154f2db800f2043043f4f7d3088f80ecfbd8bdecca584956ce8354faa7821666137dff8d6405f2a2beb80077db5d51421ed60fc53fe20fc2f2acf4fb9071ea8769d259d9"]) [ 202.526316][ T8144] kernel msg: ebtables bug: please report to author: entry offsets not in right order [ 202.588658][ T8152] kernel msg: ebtables bug: please report to author: Wrong nr. of counters requested [ 202.630359][ T8154] 9pnet: p9_errstr2errno: server reported unknown error e&Ð?ãd$I3Ö [ 202.650252][ T8152] kernel msg: ebtables bug: please report to author: entry offsets not in right order [ 202.665273][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 202.671176][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 202.712318][ T8155] kernel msg: ebtables bug: please report to author: Wrong nr. of counters requested [ 202.745652][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 202.751435][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:54:46 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x7, 0x4c2d, 0x0, 0x0, 0x0, 0x4}]}, 0x0}, 0x48) 15:54:46 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000180), &(0x7f00000001c0)=0x8a) r1 = socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2400000003061f001cfffd946fa2830020200a000300010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) 15:54:46 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockname(r1, &(0x7f0000000840)=@rc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200, 0x0) fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000140)=[0xee00, 0x0]) write$FUSE_ENTRY(r2, &(0x7f0000000180)={0x90, 0x0, 0x7, {0x6, 0x1, 0x8, 0x6, 0x2, 0x0, {0x5, 0x48, 0x0, 0x6, 0x5, 0x200, 0x7f, 0x9, 0x3, 0x3, 0x3, r3, r4, 0x86e, 0x8f}}}, 0x90) r5 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000540)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000a80], 0x2, 0x0, &(0x7f0000000a80)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bcsf0\x00\x00\x00\x00\b\x00', 'sit0\x00\x00\x02\x00\x00\x00\xff\xff\x00', 'bond0\x00', 'vlan0\x00', @broadcast, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1a8) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r6, 0x20, 0x70bd27, 0x25dfdbfb, {{}, 0x0, 0x4109, 0x0, {0x14, 0x18, {0x8, @bearer=@udp='udp:syz0\x00'}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) 15:54:46 executing program 2: r0 = syz_open_dev$mouse(0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000180)='\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r1, 0x400, 0x5) fcntl$setown(r2, 0x8, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) syz_open_dev$evdev(0x0, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:54:46 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000780)='/dev/sequencer2\x00', 0x14003d, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000000)) dup2(r1, r0) 15:54:46 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@hci, 0x80) socket$inet_udplite(0x2, 0x2, 0x88) r1 = accept4(r0, &(0x7f0000000000)=@vsock={0x28, 0x0, 0x0, @reserved}, &(0x7f0000000100)=0x80, 0x80000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x14400) pread64(0xffffffffffffffff, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000440)=0x40, 0x4) sendmmsg$alg(r1, 0x0, 0x1d3, 0x4040004) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x43, &(0x7f0000000740)={'TPROXY\x00'}, &(0x7f0000000780)=0x1e) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) ioctl$KVM_CREATE_PIT2(r4, 0x4040ae77, 0x0) semctl$SETVAL(0x0, 0x1, 0x10, &(0x7f0000000540)) r5 = dup2(r2, r4) syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r5, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x21000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="090028bd7000fddbdf2503000000040005000800040003000000080002000200edff070002000a000000"], 0x1}, 0x1, 0x0, 0x0, 0x8000}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 204.726957][ T8180] netlink: 16 bytes leftover after parsing attributes in process `syz-executor5'. 15:54:46 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000001c0012000c000100626f6e64000000000c00020008000b0007000043667d555432258b77e6612c0800"], 0x1}}, 0x0) [ 204.786543][ T8178] kernel msg: ebtables bug: please report to author: entry offsets not in right order 15:54:46 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8, &(0x7f0000000000)=0x4, 0x4) getsockopt$inet_tcp_int(r0, 0x6, 0x8, 0x0, &(0x7f0000000040)) [ 204.843970][ T8189] kernel msg: ebtables bug: please report to author: Wrong nr. of counters requested 15:54:46 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/11, 0xb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) r2 = epoll_create1(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000001f80)) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/4\x00') preadv(r3, &(0x7f0000000700)=[{&(0x7f0000000600)=""/246, 0x2b7}], 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 15:54:46 executing program 3: clone(0x3103001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pause() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xd) tkill(r0, 0x40) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 15:54:46 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockname(r1, &(0x7f0000000840)=@rc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200, 0x0) fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000140)=[0xee00, 0x0]) write$FUSE_ENTRY(r2, &(0x7f0000000180)={0x90, 0x0, 0x7, {0x6, 0x1, 0x8, 0x6, 0x2, 0x0, {0x5, 0x48, 0x0, 0x6, 0x5, 0x200, 0x7f, 0x9, 0x3, 0x3, 0x3, r3, r4, 0x86e, 0x8f}}}, 0x90) r5 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000540)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000a80], 0x2, 0x0, &(0x7f0000000a80)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bcsf0\x00\x00\x00\x00\b\x00', 'sit0\x00\x00\x02\x00\x00\x00\xff\xff\x00', 'bond0\x00', 'vlan0\x00', @broadcast, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1a8) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r6, 0x20, 0x70bd27, 0x25dfdbfb, {{}, 0x0, 0x4109, 0x0, {0x14, 0x18, {0x8, @bearer=@udp='udp:syz0\x00'}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) 15:54:46 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x7ffdfffffffffd, 0x2003) fcntl$getflags(r0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000180)={[{0x800000000002b, 'pids'}]}, 0x6) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000000380)) r4 = accept$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000340)=0x3d8) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000040)={0x0, 0xcd, 0x5, 0x42fc}) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000080)={0x1, 0x1, {0x8, 0x12, 0x17, 0x3, 0x0, 0xfffffffffffffffa}}) 15:54:46 executing program 4: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000300)='./file0\x00', 0x0) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') 15:54:46 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x7ffdfffffffffd, 0x2003) fcntl$getflags(r0, 0x401) sysinfo(0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x11b400, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f00000001c0)={0x0, 0x0, 0x3}) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000180)={[{0x800000000002b, 'pids'}]}, 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0xf5, 0x0, [0x1, 0x8604, 0xa56d, 0x80000001]}) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000000380)) r4 = accept$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000340)=0x3d8) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000040)={0x0, 0xcd, 0x5, 0x42fc}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000080)={0x1, 0x1, {0x8, 0x12, 0x17, 0x3, 0x0, 0xfffffffffffffffa, 0x5, 0x2e}}) [ 205.190842][ T8215] kernel msg: ebtables bug: please report to author: entry offsets not in right order [ 205.238168][ T8215] kernel msg: ebtables bug: please report to author: Wrong nr. of counters requested 15:54:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) tkill(r2, 0x1000000000016) 15:54:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") connect$unix(r1, &(0x7f00000000c0)=@abs={0x1}, 0x6e) 15:54:47 executing program 0: mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) clone(0x3102003ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e00c462913878fe3e0f1110c442019dccd3196f") execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) clone(0x1ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x294) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) accept$inet6(r0, 0x0, 0x0) sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 15:54:47 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockname(r1, &(0x7f0000000840)=@rc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200, 0x0) fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000140)=[0xee00, 0x0]) write$FUSE_ENTRY(r2, &(0x7f0000000180)={0x90, 0x0, 0x7, {0x6, 0x1, 0x8, 0x6, 0x2, 0x0, {0x5, 0x48, 0x0, 0x6, 0x5, 0x200, 0x7f, 0x9, 0x3, 0x3, 0x3, r3, r4, 0x86e, 0x8f}}}, 0x90) r5 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000540)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000a80], 0x2, 0x0, &(0x7f0000000a80)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bcsf0\x00\x00\x00\x00\b\x00', 'sit0\x00\x00\x02\x00\x00\x00\xff\xff\x00', 'bond0\x00', 'vlan0\x00', @broadcast, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1a8) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r6, 0x20, 0x70bd27, 0x25dfdbfb, {{}, 0x0, 0x4109, 0x0, {0x14, 0x18, {0x8, @bearer=@udp='udp:syz0\x00'}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) 15:54:47 executing program 4: clone(0x84007bf7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1042, 0x0) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) creat(&(0x7f0000000140)='./file0\x00', 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 15:54:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:54:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000cc0)={&(0x7f0000000bc0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x3383935f11e1fb56) 15:54:47 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620c, &(0x7f0000000080)) [ 205.714230][ T8255] hfsplus: unable to find HFS+ superblock [ 205.717302][ T8249] kernel msg: ebtables bug: please report to author: entry offsets not in right order 15:54:47 executing program 2: r0 = memfd_create(&(0x7f00000003c0)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\x85\r.2v\xb0>\xc5\xdd5W\xf2\xdaB\xc9UH\t\xb9L\x96\x880|\xa6\xa7\xc5\xc9\x18\x9cA\xb1\xecu&\x1b\x1f\x82 P\xf0\xb4\xb4\xe9hr\xd7\'7\x95\xfb`A\xccT\xb8^l\x19\xd6\xe4\aO\xf9\xcfRb\x91Mbb\xc2\xbd\x7f\xa4\x13\x18\xaax\xdd\xbf!\xf7\xf0^\xbf\x8e}T%NJ7\xa4\v\x9e\xddY^\xef\xe5p\xf6q\xc2nMl\x85\x87U\xdc\xd6I\x81\x1bh\xb4\"\xfa\xdcC\xfe\x94~\xda>1\b\"\xad[]`Y\x06\xf5o\x9a\x97\"{ub\xc9\xa3gQ\x8d\r\f4\x15]\x1fe\xafU\x84\x19\xbb.I\xab\x84\x86\x95\xbe\xad\xa4=\xd5\x96\xa0\x9e\xc3H\x10#\x90\xec\x1cFR\xff\x9f\b\x1a\a\x00\x00\x00\x00\x00\x00\x00\xc9Op\xb1\xa4\xf1X\"\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) timer_create(0x0, 0x0, &(0x7f0000000340)) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 15:54:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x7ffdfffffffffd, 0x0) sysinfo(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x800000000002b, 'pids'}]}, 0x6) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000380)) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000340)=0x3d8) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f0000000040)={0x0, 0xcd, 0x5, 0x42fc}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000480)={@loopback, 0x7, 0x2, 0x3, 0x2, 0xa58d, 0x3}, 0x20) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000080)={0x0, 0x1, {0x8, 0x12, 0x17, 0x3, 0x0, 0xfffffffffffffffa, 0x5, 0x2e}}) [ 205.793701][ T8270] hfsplus: unable to find HFS+ superblock [ 205.813323][ T8284] kernel msg: ebtables bug: please report to author: Wrong nr. of counters requested [ 205.829170][ T8275] binder: 8272:8275 ioctl c018620c 20000080 returned -1 15:54:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) [ 205.875548][ T8288] binder: 8272:8288 ioctl c018620c 20000080 returned -1 15:54:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:54:47 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620c, &(0x7f0000000080)) 15:54:47 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockname(r1, &(0x7f0000000840)=@rc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200, 0x0) fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000140)=[0xee00, 0x0]) write$FUSE_ENTRY(r2, &(0x7f0000000180)={0x90, 0x0, 0x7, {0x6, 0x1, 0x8, 0x6, 0x2, 0x0, {0x5, 0x48, 0x0, 0x6, 0x5, 0x200, 0x7f, 0x9, 0x3, 0x3, 0x3, r3, r4, 0x86e, 0x8f}}}, 0x90) r5 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000540)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000a80], 0x2, 0x0, &(0x7f0000000a80)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bcsf0\x00\x00\x00\x00\b\x00', 'sit0\x00\x00\x02\x00\x00\x00\xff\xff\x00', 'bond0\x00', 'vlan0\x00', @broadcast, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1a8) syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') [ 206.042340][ T8298] hfsplus: unable to find HFS+ superblock [ 206.072535][ T8306] kernel msg: ebtables bug: please report to author: entry offsets not in right order [ 206.078879][ T8302] binder: 8301:8302 ioctl c018620c 20000080 returned -1 [ 206.102923][ T8306] kernel msg: ebtables bug: please report to author: Wrong nr. of counters requested 15:54:47 executing program 0: 15:54:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:54:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:54:47 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockname(r1, &(0x7f0000000840)=@rc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200, 0x0) fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000140)=[0xee00, 0x0]) write$FUSE_ENTRY(r2, &(0x7f0000000180)={0x90, 0x0, 0x7, {0x6, 0x1, 0x8, 0x6, 0x2, 0x0, {0x5, 0x48, 0x0, 0x6, 0x5, 0x200, 0x7f, 0x9, 0x3, 0x3, 0x3, r3, r4, 0x86e, 0x8f}}}, 0x90) r5 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000540)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000a80], 0x2, 0x0, &(0x7f0000000a80)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bcsf0\x00\x00\x00\x00\b\x00', 'sit0\x00\x00\x02\x00\x00\x00\xff\xff\x00', 'bond0\x00', 'vlan0\x00', @broadcast, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1a8) syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') 15:54:47 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620c, &(0x7f0000000080)) 15:54:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000700)='/7\x02\xe8\xa4\xef\x9e\xc8e\xd5n\x89\xeb[<\x18-\x14\x8d8\xbf\xfe\x83\x19\xf3(\xd7y\x14h\xcf(f\x06I:\xa4\xea\xcb\b\x81C\xdd\xcc\x00\x00\x00\x00\xf9\b1h\xbam\xa4x\xb1:\xcf\a\x94Z\x7f\xc8\vy\xf2F\xf4\x9d\n3\xd4\x9a[\xee\xaa\t\xbe\x90\xabU3\xd3[y\xd1d^We\xa9\xcb\x86a\"\xba\xb7\xcd\xcf\x88\x9eqO|\x9f\xcf\r\x86\xf4\x15@\x82w\xa8\\\x8c^a\xbe\x991l\\\x16\xd4\xd53\xdd\x9e\x00\x01:\xac\x14^\xf6\xb6\xb1^\xaa\xfa\x02x\x8aV\x87\xe3\xfb\xef\xd0\xb7({,\xf4\xa2cl`\xdc\xf7\xe2f\xad\xaa>\xd4Ts\x10\xb9V!\x91uGTy\xde$X\xff\xb1\xf3={\xb7\xe65\xb6\x1a\x99q^\xc2\xfc\xb0\xc09\x85\x03\xf1]\xc54;\x8d\x01\xec3#\x8f%5\xef\xfe\xc5\xdb\xd5\xb7\xe0\xdd\xec,rV\x82!\xa0', 0x0) pwritev(r2, &(0x7f0000000240)=[{&(0x7f0000000440)=',', 0x1}], 0x1, 0x4081806) sendfile(r0, r2, 0x0, 0x20020102000007) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x880000}, 0xc, &(0x7f00000003c0)={0x0}, 0x1, 0x0, 0x0, 0x8010}, 0x0) clone(0x2502001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_DIRENT(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="052423abafa621deed888d5918c06e36d269f5a39bbe059285337be1450ba88c9d88e9d505f33d7f03a0802ffa9ccaf4b4d40d0dff4b27197818a3dabb804aa4d73e237e9a16c2af16227897d893a9423d5b105cc9c3ad567de1caafc91e9502b3f36a56ed"], 0x65) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$LOOP_SET_FD(r5, 0x4c00, r0) ioctl$EVIOCGNAME(r4, 0x80404506, &(0x7f00000000c0)=""/27) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(r1, &(0x7f0000000040)=""/4, 0xebc3276d6d4b1cd2, 0x100100, &(0x7f0000000100)=@abs, 0x930212) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 206.343236][ T8322] binder: 8321:8322 ioctl c018620c 20000080 returned -1 [ 206.369910][ T8318] hfsplus: unable to find HFS+ superblock [ 206.379948][ T8327] kernel msg: ebtables bug: please report to author: entry offsets not in right order 15:54:48 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620c, &(0x7f0000000080)) 15:54:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:54:48 executing program 0: [ 206.431053][ T8327] kernel msg: ebtables bug: please report to author: Wrong nr. of counters requested 15:54:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:54:48 executing program 0: 15:54:48 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockname(r1, &(0x7f0000000840)=@rc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200, 0x0) fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000140)=[0xee00, 0x0]) write$FUSE_ENTRY(r2, &(0x7f0000000180)={0x90, 0x0, 0x7, {0x6, 0x1, 0x8, 0x6, 0x2, 0x0, {0x5, 0x48, 0x0, 0x6, 0x5, 0x200, 0x7f, 0x9, 0x3, 0x3, 0x3, r3, r4, 0x86e, 0x8f}}}, 0x90) r5 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000540)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000a80], 0x2, 0x0, &(0x7f0000000a80)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bcsf0\x00\x00\x00\x00\b\x00', 'sit0\x00\x00\x02\x00\x00\x00\xff\xff\x00', 'bond0\x00', 'vlan0\x00', @broadcast, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1a8) [ 206.559825][ T8342] binder: 8341:8342 ioctl c018620c 20000080 returned -1 15:54:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:54:48 executing program 0: [ 206.658868][ T8350] hfsplus: unable to find HFS+ superblock [ 206.674800][ T8354] kernel msg: ebtables bug: please report to author: entry offsets not in right order 15:54:48 executing program 5: [ 206.723228][ T8360] kernel msg: ebtables bug: please report to author: Wrong nr. of counters requested 15:54:48 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockname(r1, &(0x7f0000000840)=@rc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200, 0x0) fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000140)=[0xee00, 0x0]) write$FUSE_ENTRY(r2, &(0x7f0000000180)={0x90, 0x0, 0x7, {0x6, 0x1, 0x8, 0x6, 0x2, 0x0, {0x5, 0x48, 0x0, 0x6, 0x5, 0x200, 0x7f, 0x9, 0x3, 0x3, 0x3, r3, r4, 0x86e, 0x8f}}}, 0x90) r5 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) 15:54:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) [ 206.944614][ T8369] kernel msg: ebtables bug: please report to author: entry offsets not in right order 15:54:48 executing program 4: 15:54:48 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:54:48 executing program 0: 15:54:48 executing program 5: 15:54:48 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockname(r1, &(0x7f0000000840)=@rc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200, 0x0) fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000140)=[0xee00, 0x0]) write$FUSE_ENTRY(r2, &(0x7f0000000180)={0x90, 0x0, 0x7, {0x6, 0x1, 0x8, 0x6, 0x2, 0x0, {0x5, 0x48, 0x0, 0x6, 0x5, 0x200, 0x7f, 0x9, 0x3, 0x3, 0x3, r3, r4, 0x86e, 0x8f}}}, 0x90) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) 15:54:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:54:49 executing program 0: 15:54:49 executing program 5: 15:54:49 executing program 4: 15:54:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:54:49 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockname(r1, &(0x7f0000000840)=@rc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200, 0x0) fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000140)=[0xee00, 0x0]) write$FUSE_ENTRY(r2, &(0x7f0000000180)={0x90, 0x0, 0x7, {0x6, 0x1, 0x8, 0x6, 0x2, 0x0, {0x5, 0x48, 0x0, 0x6, 0x5, 0x200, 0x7f, 0x9, 0x3, 0x3, 0x3, r3, r4, 0x86e, 0x8f}}}, 0x90) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) [ 207.323527][ T8380] hfsplus: unable to find HFS+ superblock 15:54:49 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:54:49 executing program 4: 15:54:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[@ANYRESDEC=0x0], 0xffffff8f) 15:54:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 15:54:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) [ 207.572093][ T8408] hfsplus: unable to find HFS+ superblock 15:54:49 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockname(r1, &(0x7f0000000840)=@rc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200, 0x0) fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000140)=[0xee00, 0x0]) write$FUSE_ENTRY(r2, &(0x7f0000000180)={0x90, 0x0, 0x7, {0x6, 0x1, 0x8, 0x6, 0x2, 0x0, {0x5, 0x48, 0x0, 0x6, 0x5, 0x200, 0x7f, 0x9, 0x3, 0x3, 0x3, r3, r4, 0x86e, 0x8f}}}, 0x90) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) 15:54:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet(0x2, 0x3, 0x6) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) r2 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xb) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x31, 0x0, 0x0) 15:54:49 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) [ 207.704026][ T8416] gfs2: not a GFS2 filesystem 15:54:49 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockname(r1, &(0x7f0000000840)=@rc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200, 0x0) fstat(r0, &(0x7f0000000040)) getgroups(0x2, &(0x7f0000000140)=[0xee00, 0x0]) r2 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) [ 207.812356][ T8431] gfs2: not a GFS2 filesystem [ 207.831059][ T8433] hfsplus: unable to find HFS+ superblock 15:54:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:54:49 executing program 4: syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}]}) 15:54:49 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockname(r1, &(0x7f0000000840)=@rc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200, 0x0) fstat(r0, &(0x7f0000000040)) r2 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) [ 207.891215][ T8441] kernel msg: ebtables bug: please report to author: entry offsets not in right order 15:54:49 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="12000000920a0000000000000000000002"]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) getpgid(0xffffffffffffffff) getresuid(&(0x7f0000000380), 0x0, &(0x7f0000000700)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) gettid() fstat(r1, &(0x7f0000000880)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000011c0)) stat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000012c0), &(0x7f0000001300)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000001480)) fstat(0xffffffffffffffff, 0x0) gettid() getgid() getpgrp(0xffffffffffffffff) fstat(r1, &(0x7f0000002b80)) getgroups(0x1, &(0x7f0000002c00)=[0xee00]) getpgid(0x0) stat(&(0x7f0000003580)='./bus\x00', &(0x7f00000035c0)) fstat(r0, &(0x7f0000003640)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000003740)={{{@in6=@dev, @in=@loopback}}, {{@in=@empty}, 0x0, @in6=@empty}}, 0x0) stat(&(0x7f0000003880)='./bus\x00', &(0x7f00000038c0)) fcntl$getownex(r1, 0x10, &(0x7f0000003d80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003dc0)={{{@in6=@remote, @in6=@loopback}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000003ec0)=0xe8) getpid() geteuid() lstat(&(0x7f0000004100)='./bus/../file0\x00', 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004200)={0x0, 0xffffffffffffff9c, 0x0, 0x36, &(0x7f00000041c0)='&.+loselinuxlokeyringvmnet1em0wlan0trustedvboxnet0em0\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000004240)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000004340)=0xe8) getresgid(&(0x7f0000004380), &(0x7f00000043c0), &(0x7f0000004400)) r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r5, &(0x7f0000000080)=ANY=[], 0x2a6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(0x0) sendfile(r5, r5, &(0x7f0000000000), 0x8080fffffffe) 15:54:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) [ 208.094987][ T8444] hfsplus: unable to find HFS+ superblock [ 208.111221][ T8453] kernel msg: ebtables bug: please report to author: entry offsets not in right order [ 208.222373][ T8444] hfsplus: unable to find HFS+ superblock 15:54:50 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x800ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 15:54:50 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:54:50 executing program 1: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockname(r0, &(0x7f0000000840)=@rc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200, 0x0) r1 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) 15:54:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:54:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r2, 0x29, 0x200000000000002d, 0x0, 0x281) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) [ 208.383736][ T8476] kernel msg: ebtables bug: please report to author: entry offsets not in right order 15:54:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000000)={'security\x00', 0x4, [{}, {}, {}, {}]}, 0x68) [ 208.427756][ T8474] hfsplus: unable to find HFS+ superblock 15:54:50 executing program 1: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockname(r0, &(0x7f0000000840)=@rc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) 15:54:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) [ 208.502671][ T8458] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 17) 15:54:50 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) [ 208.565530][ T8458] FAT-fs (loop5): Filesystem has been set read-only [ 208.588172][ T8458] FAT-fs (loop5): error, fat_free: invalid cluster chain (i_pos 17) 15:54:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) [ 208.626300][ T8502] kernel msg: ebtables bug: please report to author: entry offsets not in right order [ 208.644737][ T8503] hfsplus: unable to find HFS+ superblock [ 208.751784][ T8468] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 208.823504][ T8468] FAT-fs (loop5): error, fat_free: invalid cluster chain (i_pos 17) 15:54:50 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="12000000920a0000000000000000000002"]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) getpgid(0xffffffffffffffff) getresuid(&(0x7f0000000380), 0x0, &(0x7f0000000700)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) gettid() fstat(r1, &(0x7f0000000880)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000011c0)) stat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000012c0), &(0x7f0000001300)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000001480)) fstat(0xffffffffffffffff, 0x0) gettid() getgid() getpgrp(0xffffffffffffffff) fstat(r1, &(0x7f0000002b80)) getgroups(0x1, &(0x7f0000002c00)=[0xee00]) getpgid(0x0) stat(&(0x7f0000003580)='./bus\x00', &(0x7f00000035c0)) fstat(r0, &(0x7f0000003640)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000003740)={{{@in6=@dev, @in=@loopback}}, {{@in=@empty}, 0x0, @in6=@empty}}, 0x0) stat(&(0x7f0000003880)='./bus\x00', &(0x7f00000038c0)) fcntl$getownex(r1, 0x10, &(0x7f0000003d80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003dc0)={{{@in6=@remote, @in6=@loopback}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000003ec0)=0xe8) getpid() geteuid() lstat(&(0x7f0000004100)='./bus/../file0\x00', 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004200)={0x0, 0xffffffffffffff9c, 0x0, 0x36, &(0x7f00000041c0)='&.+loselinuxlokeyringvmnet1em0wlan0trustedvboxnet0em0\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000004240)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000004340)=0xe8) getresgid(&(0x7f0000004380), &(0x7f00000043c0), &(0x7f0000004400)) r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r5, &(0x7f0000000080)=ANY=[], 0x2a6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(0x0) sendfile(r5, r5, &(0x7f0000000000), 0x8080fffffffe) 15:54:50 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141442, 0x0) dup3(r1, r0, 0x0) fcntl$setstatus(r0, 0x4, 0x0) 15:54:50 executing program 1: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockname(r0, &(0x7f0000000840)=@rc, 0x0) r1 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff010000001100000000000000000076657468315f746f5f7465616d000000736974302000000000000400000000006272696467653000000000000000000076657468305f746f5f627269646765000180c2000000000000000000aaaaaaaaaa0000000000000000007000000070010000a80000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff01000000110000000000000000007465716c30000000000000000000000073797a5f74757e000000000000000000697036677265300000000000090000007663616e30000000d53fa73b00000000ffffffffffff000000000000aaaaaaaa98aa00000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff00000000"]}, 0x250) 15:54:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace(0x4207, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, 0x0, 0x20000004, &(0x7f0000000100)={0x0}) 15:54:50 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:54:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace(0x4207, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, 0x0, 0x20000004, &(0x7f0000000100)={0x0}) [ 208.916674][ T8517] kernel msg: ebtables bug: please report to author: entry offsets not in right order [ 208.985426][ T8522] hfsplus: unable to find HFS+ superblock 15:54:50 executing program 4: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x40000000003, 0x300) accept$netrom(0xffffffffffffff9c, &(0x7f0000000180)={{}, [@bcast, @null, @rose, @netrom, @remote, @bcast, @rose, @bcast]}, 0x0) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0x100, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_aout(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="080400007d020000ad0300009b010000320000000000000000000000000006001978ce3bea8825ff8b0efabdf1e01cf68b7dcb3f97e626eb79d01073cf3b67bb700fb56f275e0d9fcfd1f94bf6e1b57bb42c3c95f45eab578067bf66d9fd89edcdb6b91f361e57ec8acb4334e7815dde37c535c290f2280becbfe78984450dfd57a62303d27c25dc84e5ac3204aac5fc53d859a2fc470e383ad575b81721178a3f2b4256e218df72e756c282d0edba3d64da547bc66b87f06fa97354c189e40ebf947b8a3c26ccc4208843aa539367072b1eb9565705788e08fadee1a20889f344a2b8b530be5a64bfc51928bf635159aecd3a0141d1d8e41194941893c151ee5d72b9beff4233d7063c28e57129a34d829097cca0c47e08d50d2a2782ba5a1f54ffe735176a06ee845fe9d48aa3884dce8ee18be80847f1578234f6e32541bb0d16418031258c95482d759beade7bfad038bda26b13823ff28b80cf1134e470264801c6cc45aefafea17b47d503a6622a3113f4ee89a7132c3d9552deca1a4d4971dc9cc42f53213c3681943f0386c51247ad24ea38987e8b22b6de0c382009f77293b24cf31320fcd83223f40901e57ab6e276472b5014b145783cce7ab266cfa76326c0bbab28e0a791d6d9165019a2f0d9ce10799241ff3bbd00cdc39a1cfa5630a48a42693494eca8ce9642dab3764991ef74bad5c5dbe33913cc4ac6c9a20d8c2936073f5362eeb0ee34204ef58b44c6486263a42c5fc546c4693123ed49ca1e5d85ce722684fdf3bc2a13e549347990aa0890ceec9cf6b62064c412329d18d2a6e0c68e5700eaa4bd819b1de2c1347f84f285aaf421674016720a8cf752ba772634956785817b1c220049ce566496a6858fdf2d753ba8c0eddcb98cbfdaf86cfe7d1389322127fb8632fbc1a5ca15b17483ea1bccf14ca950cfa6bef6d4c8b7d583f7d7674f856eacbfc1b4d43633078710f74b9488bb3e0b217df6cf9b34d518959f18dbe0f57a60be2c59e92c056af419e8c798e7c730161ce714a8c0c5f4ab4a35561627ac6dc1ab92c0eef453f92ceb997ba30a09a5bfefaecc19dfb9a07308532cbd1b9d660a0187882ba3f6895294bef8aefcd6427178192e0d8a07ce036f2f27c5b5a3709958d0394f0c03207662fe5c7a2062de95c4b40629eced2ec06863f58eb2b61e7583b51dc000d7191378b9aba0ec9402377ed28a7b557af27ec7265db0314a4cb23f16580e87ea8617eab39d3d92aca39fdc5b6822564cccbef096ceb2d5257c4b9065065a4ebc835406c405e0b5561ddeab74b6cebc0c95e2990f7f63fa67e8942f4ba18e2f926b22e80536caf3d0547fe0a431da1d37f9d3cdbff249350403140fc7e02000af28c3a23cb245187547592bd979a35b08a22e236c0903ce695b7019a2ac27f06deadee4e3b3e139dd8a79facb9cb8608705451fffba777b3d2d99c9f19347cfc12fe79f5968de0394da3484b3ed57d3071d490d3fe6d8558ead1b88c932d0fe63d5df7d0170270072a43d5df2ed34a63ca7abb9cb33f067c93075d89f677c737edca27a3e28d072ebcaebc04a7fbfcd8c00501bb70c0e8e9c833758ccc815c01cc355e16b52bd76770eb6e46303a2d8a6470ce65dda223a8568cdb2c2a59d9be7f6d54ebf826ba88b45e00fa297a4732162641b951c06cb59139e79c95778033b9088684404a0cb3b7e5a9ebb43f349a6b9a0b7508ab8460ff255c9affa9671c4bd89b3fa352ef1f6f1e0ce9b87bb196cada6d72b6fd46c14fc7a54ec7f43b80c7c25183f39fb5078ba2b17d79981efa8436dd5bc4b0366a7894a3bafa0d2eb680f163d6a934233ba484e17bfc12f7ba5dac486b83449d37ef59960de9d195d3dfb3632d5d7cea086a4c9039c71f296f20f1f15d31897d36e344fd01ee1e1879f689344346f3dfa0c882023a4b8463513f2e4f6a7fb436ed8f5cb72487523b556de940e146508e4d00efc5086da521d8f1f328409310861e61167871db20fa5f91ca90a42d7fa84181b2c81b8ec928acaa75f38444d3421c701c9962d63977b8d35da1dc636089bcd9192710445acf3f5ba57aec5f535ea18edbe70f6cacaddd0bea353558d1d65e9afcfb031d251e33e82ae1f81ac0b536e418245d5f6d6779cc1b46a03000000000000000bbb3b504eee163498a33362380ce977b866c8145bcb2b720c863ed3ba2769ee6d89bd0ae53cdcd62fb3c84637cf5816f7e0c1dea4687c0139fd4dbf1bd72072d981f822ff6b1fa33cd8a537fcf6bd6cb0c3626080d0f302c8b451745ee82f1a6cd642688de58792feaceb7a27a65112b6eb880865fb913d5f86fed8480c7a7f60a0482ad3a0ebd4f5ecbb9691ec97c58257d8b6f26e9d34f531317b05246f5a7452584c4da4d5753d333ec4b58ef3cbe9355f10676d229d6114bf20ecb3c11316ec31237bdd50912ad4c4a51f04e95f3a1a05c8b64b9cc301836cadf9cfd1217498a27125dca4002d77c7a3cdb6619155ce6e38d913d06da2ed5597994f5125dd796af7d901dc4a87e3d77e3e286c714583be77e0d6575b38386e6ee092aaa5baacb06fcdfb837bfdc4cc4ec50ff019e904fb81c86ff0d60c5ea5be38189df39db2f92e8c4a3fa8700d6961bb952b0df11d39059f24845edc38281df1270d950531b30ba3eea6af4ecc1bf8fea924debb3ec2ab78a422f12541dfa6c375be11d3e5672de22a824972a9597ccde16d581d7afd852609d318733b4cfa5f27e5c6efe627bf1df1c0abc38d413b5bf0343775eecbc51183704c8d05a0af54f58d3b56d9f8b4e0e80ae57b2d4b4cd6b19884306b73024b64ca99a5829716b8260a8939a2880210ec64f733b995b41b5570398d3795e8e9d0a5f409e452bf6056efd4843e9b8ecfe7e7d828fce0befa381a7de85939e0794c15bbd60f1c9862e67e8875f4f72cb41fa380907ea510d19a70b6f176b43138851d506e23865c9e03a16f858a802d714fd8081a29b5fd95c021eb3ae73a04768f718317b11400ba5d72ea732a96f041b41cb49538f353638337c82c6d87f4b6591c01109a6129da9fc6fcce460fd6ce60b2358c9fd61f689791687849a7e7547b52a5ee8817751b75b6f195c40b965f2bbc47bf687554ed5347da169cfcf146ac109951fa8938f8c7a0f89ad56f9bb8144c259d026388de6f61637ebe67dd3c72e7b6d0f655f29ee968840d39d06e9489c350977dcba4903786aad2647528ede4e151b3ca4a824be0d8c812432903851ec5d72684e9772ebacb412dd08b406444251a17ecb26eb2c6224fdcf8c0a603d6ad297af6fbcf5a76fc6bb99970d57d46497745359daafa30d48abcba2dffcdfc86a0bc1c1d562ec0773912f6af5dd2727d50d0bdf76c5e2616f05973c14dd5e4315fd8ae4a6351df3bec546b0497cc8c3bff8c14761cbfd4c8ba86a44e5e4b119255707f7bf4d4805972ac3d130b594a5e7702db65e60f81809663fa1117d72b87b04aadc02f130f2969ebc35155d6079ccab121230a80fa4565131b3c2176a58948c26eecb1458ecdd2aca5795d426863194096000cacbc2aa02529360b002d98289676b9cbb0afbc4deb3b1bfbf1ddfc6daa144aac12e95400a8588a7ffcae90a5def405a67280174db6dd083b87f66b53dcc6343e6cbcf6211b25846b286e2aa048623989204b4b53ba50fb0c0bcd6f53ac120db3f56500350d419b81c2e23e7c30dae9b9ff6a6a61c251a217d073f08f840fdc7eac1d94fb77ad847e45b94ba64db17cf2a578a4fe499254fa9aea9f076ef547ad49d068b0e14b98b8b6700ccb7e312448b6308bba313bd587e368610179f7db1af775efdefc2d6b855a325378a1b8d8faa6316cbb7d9dfe87a649ae9f625eae7a8d86f99d9381b3930af2bc3102a474878eb7c372d29b0ff27b92a699e32398c7500c8a9b18bb7b48bef59defb917b568a43e25a3e9cd118b8752d387b0aeecd55766a15212f7d27a26ad25bbd51f69380059c36a9da449d12b0c47e19f682cfe6d1278b1232579c150d41b0955404f12aece1f75e08202c1de1024fa979d55d77288cf588c8bbe8f96cf1d07d177b79eeb7c0fd299836a8865a334f1477b5c3599d7327da5eb542836964a16146e870a39785fc1cc03ede8c36ad46293ff1f2eb8c8c880f7093957d148141afe69c4a224453b2249522116fe00e751011cdc1e788bbb47755f3aa38369091e1e964d09da6faf01d5ab8b3df8d883233599253721bd21c62f3febd36cd7a8864eadc2005ac8724d099719801f46f2494679c0345b57724a1621fa5b030de817195e176d47a97e37d82cc6d5921c6da0cb1efdc5ea25d4889efae4e8b60f031e3570ddffe480cf8c15634da882c378d6ddf92ae93346bed786d9c6c076b4540a508b19728c3ae424579c82bc29b3ed5c9f554dfccfd86f459e178e02ee7738bb71516806872fd6bb94a886b06d923cc81c1c24c9873f7db72a24026637f54913e54c22cfb5b125e95bad27dc1ea1e927dd48acf3c7309a7ae7516e1656ed0b1cc5cc883f79041c82d1f2154424419bc02d0c1dba07257b4963e4d3e3f93c7d182cebd5db88e2ec7d9818770a1674f98d2efa15fa276f6b27af5929d0f7437ed0d4b28bcbb0c5bc6a59833985be0cdf167b965b0cd0c3795499a24fd0f02b12707a6ac17764e611a485eca8ddc4650e610ef4780ee236887a6443b12008e5940e58a319a4f757e052269d828b3264ae657ce3eb6b86dd1e630ec9f6579b3ef57a7a5180b8a0f7b8917396cc41531c4e372de852697f17d5fddfd3e440b1983eb123c1bbd7d6e520c7a3a67355bef13af47c5813afa21655c2ffe9695d26bf6d2881e8b36622ad5e924d11e7855424234baa1a5c74f52e727fd6e87b124a8fe12e63480ed46f77b03aaa3e672c5b5ac2e7a57afdea124d267be7a3b91aa4fbc8495da80e9082ab1342486c38e4aa083617f715ccce6d38872d2ec494887a0ed0fb89216eb3bb5f9269ed40ada0618a0efbb5054e728631372a9d42ed3bcba511d0f4e044937846b37492da0bced226de80403980520ce5c2a6bab84ed0d87d138c57883a02202e8703c08f2c47cd842cf85cfe537e91375e26f081aaf88b09caa87edb3b61181d0f911271ef62dbebfd123fe34634f92b27fa2749159d8e873bf43b86dc0f1341cfb26df1cf4f3b34679544569a13fd4fae29a6a9765d1e676ec5711aa8170f7d1a53f798592559e0345a475d0b403db5964c000fa570d6682a0b126e886ae12230f423346be3c68927749585d7cac652bae49190982b9e964994b4292a33312c43928ced01c45f3658f421212c2a9e05f1519440ef3d500a65885cad3148b4cf223acf34a42ed0411310b658d620d8a4ba4090ca5e4f8a886856a8a9cc7e0d01188899b399da47e76ade58345a48affb17a689d7ff4c699253ea9efb40a5cd5549a7799db18b4ef1a9ff6232111cef9dc79f7bcba6a0415bb2270d5626c3eab8e7b750c078ed775bde7c33498c001d837793cb982ffb41f267946e4bb409ad4dc4c94af83a41affe02a5b6b2ebc321b7c6bb5b4ab6355e9d435c0e5338d09c78b3f2dbc7b15cf12dc012df1512fff761a4b7d682cabed3be5d1746b2e3e95fa0c3604257aae36551e37c8bca0f7f237395c7c164878831feb610c7ff04efa0c3328dc9d24260ce440a9e53a6631faf893ff335a243c3c449a0b61be18e54ab87b85874419f828b61f2ebdd80d07df2cf2b9730fda72405b9bd265b463a048321b38faf087b98f9c9ef95b1036bb323"], 0xffa) 15:54:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) ioctl(r1, 0x800000000008982, &(0x7f0000000080)) 15:54:50 executing program 1: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) 15:54:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace(0x4207, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, 0x0, 0x20000004, &(0x7f0000000100)={0x0}) 15:54:50 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) [ 209.332758][ T8545] kernel msg: ebtables bug: please report to author: entry offsets not in right order [ 209.372255][ T8548] hfsplus: unable to find HFS+ superblock 15:54:51 executing program 1: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff010000001100000000000000000076657468315f746f5f7465616d000000736974302000000000000400000000006272696467653000000000000000000076657468305f746f5f627269646765000180c2000000000000000000aaaaaaaaaa0000000000000000007000000070010000a80000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff01000000110000000000000000007465716c30000000000000000000000073797a5f74757e000000000000000000697036677265300000000000090000007663616e30000000d53fa73b00000000ffffffffffff000000000000aaaaaaaa98aa00000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff00000000"]}, 0x250) [ 209.384955][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 209.390800][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 209.519047][ T8564] kernel msg: ebtables bug: please report to author: entry offsets not in right order 15:54:51 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000007c0)='IPVS\x00') r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffc) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flistxattr(r1, 0x0, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x400000000000302, 0x4008800) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', 0x0, 0x5, 0x1, &(0x7f00000004c0)=[{0x0}], 0x2800040, &(0x7f0000000680)={[{@uni_xlate='uni_xlate=1'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '.$%GPL'}}, {@audit='audit'}]}) 15:54:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:54:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet(0x2, 0x3, 0x6) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) r2 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xb) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0xa, &(0x7f0000000100)={0x0, @remote, 0x0, 0x0, 'rr\x00'}, 0x3) 15:54:51 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:54:51 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) 15:54:51 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e23, 0x3d8b1965, @ipv4={[], [], @local}, 0xe5f}, 0x1c) sendmmsg(r0, &(0x7f000000ac80), 0x400000000000302, 0x4008800) 15:54:51 executing program 1: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) [ 209.849315][ T8572] kernel msg: ebtables bug: please report to author: entry offsets not in right order 15:54:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:54:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00005f8ffe)='#}\x00', 0x0) ftruncate(r1, 0x40001) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000e4effc)=0x4, 0x4) sendfile(r0, r1, 0x0, 0x100000000002) [ 209.934093][ T8570] hfsplus: unable to find HFS+ superblock 15:54:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:54:51 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) 15:54:51 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) [ 210.309419][ T8607] hfsplus: unable to find HFS+ superblock 15:54:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00005f8ffe)='#}\x00', 0x0) ftruncate(r1, 0x40001) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000e4effc)=0x4, 0x4) sendfile(r0, r1, 0x0, 0x100000000002) 15:54:52 executing program 1: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) 15:54:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000100)={0x0}) 15:54:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00005f8ffe)='#}\x00', 0x0) ftruncate(r1, 0x40001) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000e4effc)=0x4, 0x4) sendfile(r0, r1, 0x0, 0x100000000002) 15:54:52 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r0, &(0x7f000000ac80), 0x400000000000302, 0x4008800) 15:54:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:54:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000100)={0x0}) [ 210.592792][ T8626] hfsplus: unable to find HFS+ superblock 15:54:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:54:52 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000380)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000d00)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r0, &(0x7f0000000580), 0xffff) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) 15:54:52 executing program 1: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) 15:54:52 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0xd, &(0x7f0000000080)=0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) io_getevents(r2, 0x0, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) io_submit(r2, 0x16b, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000008, 0x0, r1, 0x0}]) 15:54:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000100)={0x0}) [ 210.830690][ T8648] hfsplus: unable to find HFS+ superblock 15:54:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:54:52 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl(r0, 0x0, 0x0) 15:54:52 executing program 1: socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) 15:54:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000100)={0x0}) [ 211.077909][ T8668] hfsplus: unable to find HFS+ superblock 15:54:52 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r0, &(0x7f000000ac80), 0x400000000000302, 0x4008800) 15:54:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) 15:54:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000100)={0x0}) 15:54:52 executing program 1: socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) 15:54:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") rt_sigprocmask(0x1, &(0x7f0000000100), 0x0, 0x8) 15:54:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:54:53 executing program 1: socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) 15:54:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) [ 211.477604][ T8698] hfsplus: unable to find HFS+ superblock 15:54:53 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x250) 15:54:53 executing program 4: openat$capi20(0xffffffffffffff9c, &(0x7f0000000500)='/dev/capi20\x00', 0x4000, 0x0) 15:54:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:54:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000100)={0x0}) [ 211.743063][ T8719] hfsplus: unable to find HFS+ superblock 15:54:53 executing program 0: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x100000080, 0x0, 0x6, 0x0, 0xffffffffffffff9c}, 0x2c) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) socket$inet6(0xa, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x114, 0x2710, &(0x7f0000000000)=""/13, 0x0) 15:54:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) 15:54:53 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x250) 15:54:53 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1000a40, 0x0) fchmod(r1, 0x700) 15:54:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:54:53 executing program 2: mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000100)={0x0}) 15:54:53 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x250) [ 212.034585][ T8735] hfsplus: unable to find HFS+ superblock 15:54:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:54:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) 15:54:53 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0}, 0x250) 15:54:53 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000000)={0x0, @src_change}) timer_settime(0x0, 0x0, 0x0, 0x0) 15:54:53 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0}, 0x250) [ 212.191194][ T8756] kernel msg: ebtables bug: please report to author: Wrong len argument [ 212.301268][ T8759] hfsplus: unable to find HFS+ superblock [ 212.311458][ T8763] kernel msg: ebtables bug: please report to author: Wrong len argument 15:54:54 executing program 0: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x100000080, 0x0, 0x6, 0x0, 0xffffffffffffff9c}, 0x2c) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) socket$inet6(0xa, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x114, 0x2710, &(0x7f0000000000)=""/13, 0x0) 15:54:54 executing program 2: mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000100)={0x0}) 15:54:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f00000001c0)={0x1, 0x1, 0x10000, 0x0, 0x10, 0x5}) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8940c056}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x18, r2, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x800}, 0x24000000) r3 = openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000300), 0x12) 15:54:54 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0}, 0x250) 15:54:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) [ 212.553886][ T8786] kernel msg: ebtables bug: please report to author: Wrong len argument [ 212.581398][ T8789] hfsplus: unable to find HFS+ superblock 15:54:54 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[]}, 0x78) 15:54:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:54:54 executing program 5: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:54:54 executing program 2: mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000100)={0x0}) [ 212.799428][ T8805] kernel msg: ebtables bug: please report to author: Entries_size never zero [ 212.827740][ T8803] hfsplus: unable to find HFS+ superblock 15:54:54 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[]}, 0x78) [ 212.913861][ T27] kauditd_printk_skb: 3 callbacks suppressed [ 212.913873][ T27] audit: type=1800 audit(1549468494.545:31): pid=8813 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor5" name="file0" dev="loop5" ino=4 res=0 [ 213.088530][ T8819] kernel msg: ebtables bug: please report to author: Entries_size never zero [ 213.161026][ T27] audit: type=1804 audit(1549468494.575:32): pid=8813 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir532133553/syzkaller.f3RGIY/27/file0/file0" dev="loop5" ino=4 res=1 15:54:54 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000000)={0x0, @src_change}) timer_settime(0x0, 0x0, 0x0, 0x0) 15:54:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c12") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:54:54 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[]}, 0x78) 15:54:54 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000400)) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) socket$key(0xf, 0x3, 0x2) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) ioctl$DRM_IOCTL_VERSION(r4, 0xc0406400, &(0x7f0000000200)={0x1000, 0x85, 0xffffffff, 0xb5, &(0x7f00000000c0)=""/181, 0x1d, &(0x7f0000000180)=""/29, 0x12, &(0x7f00000001c0)=""/18}) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) [ 213.304664][ T27] audit: type=1804 audit(1549468494.915:33): pid=8813 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir532133553/syzkaller.f3RGIY/27/file0/file0" dev="loop5" ino=4 res=1 [ 213.325563][ T8833] kernel msg: ebtables bug: please report to author: Entries_size never zero [ 213.340970][ T27] audit: type=1804 audit(1549468494.925:34): pid=8813 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir532133553/syzkaller.f3RGIY/27/file0/file0" dev="loop5" ino=4 res=1 [ 213.384697][ T8834] hfsplus: unable to find HFS+ superblock [ 213.424149][ T27] audit: type=1800 audit(1549468495.055:35): pid=8840 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16644 res=0 15:54:55 executing program 5: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:54:55 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB]}, 0x78) 15:54:55 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) [ 213.450137][ T27] audit: type=1804 audit(1549468495.065:36): pid=8840 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir508517115/syzkaller.ATZLJl/30/file0/file0" dev="sda1" ino=16644 res=1 15:54:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c12") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) [ 213.541270][ T8845] kernel msg: ebtables bug: please report to author: Entries_size never zero 15:54:55 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB]}, 0x78) [ 213.681449][ T27] audit: type=1800 audit(1549468495.315:37): pid=8857 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor5" name="file0" dev="sda1" ino=16642 res=0 [ 213.750861][ T8855] hfsplus: unable to find HFS+ superblock [ 213.764155][ T27] audit: type=1804 audit(1549468495.385:38): pid=8851 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir532133553/syzkaller.f3RGIY/28/file0/file0" dev="sda1" ino=16642 res=1 [ 213.770481][ T8862] kernel msg: ebtables bug: please report to author: Entries_size never zero 15:54:55 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB]}, 0x78) 15:54:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c12") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:54:55 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) [ 213.934764][ T8867] kernel msg: ebtables bug: please report to author: Entries_size never zero [ 213.963855][ T8869] hfsplus: unable to find HFS+ superblock [ 214.130639][ T27] audit: type=1804 audit(1549468495.765:39): pid=8840 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir508517115/syzkaller.ATZLJl/30/file0/file0" dev="sda1" ino=16644 res=1 15:54:55 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:54:55 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0xec, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff010000001100000000000000000076657468315f746f5f7465616d000000736974302000000000000400000000006272696467653000000000000000000076657468305f746f5f627269646765000180c2000000000000000000aaaaaaaaaa0000000000000000007000000070010000a80000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000feffffff000000000000000000000000000000000000000000000000"]}, 0x164) [ 214.188350][ T27] audit: type=1804 audit(1549468495.805:40): pid=8840 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir508517115/syzkaller.ATZLJl/30/file0/file0" dev="sda1" ino=16644 res=1 15:54:55 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) [ 214.233355][ T8882] kernel msg: ebtables bug: please report to author: entries_size too small 15:54:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) [ 214.453274][ T8892] hfsplus: unable to find HFS+ superblock 15:54:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'sit0\x00', 0x0}) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000000)=0x3, 0x4) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x5c06) syz_init_net_socket$llc(0x1a, 0x2, 0x0) connect$llc(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x2, 0xc882) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') 15:54:56 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000400)) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) socket$key(0xf, 0x3, 0x2) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) ioctl$DRM_IOCTL_VERSION(r4, 0xc0406400, &(0x7f0000000200)={0x1000, 0x85, 0xffffffff, 0xb5, &(0x7f00000000c0)=""/181, 0x1d, &(0x7f0000000180)=""/29, 0x12, &(0x7f00000001c0)=""/18}) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) 15:54:56 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0xec, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff010000001100000000000000000076657468315f746f5f7465616d000000736974302000000000000400000000006272696467653000000000000000000076657468305f746f5f627269646765000180c2000000000000000000aaaaaaaaaa0000000000000000007000000070010000a80000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000feffffff000000000000000000000000000000000000000000000000"]}, 0x164) 15:54:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000100)={0x0}) 15:54:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:54:56 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0xec, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff010000001100000000000000000076657468315f746f5f7465616d000000736974302000000000000400000000006272696467653000000000000000000076657468305f746f5f627269646765000180c2000000000000000000aaaaaaaaaa0000000000000000007000000070010000a80000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000feffffff000000000000000000000000000000000000000000000000"]}, 0x164) [ 214.612532][ T8903] kernel msg: ebtables bug: please report to author: entries_size too small [ 214.720673][ T8906] hfsplus: unable to find HFS+ superblock [ 214.798267][ T8915] kernel msg: ebtables bug: please report to author: entries_size too small 15:54:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000100)={0x0}) 15:54:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) [ 215.079927][ T8926] hfsplus: unable to find HFS+ superblock 15:54:56 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:54:56 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x162, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x1da) 15:54:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a0") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) [ 215.277167][ T8932] kernel msg: ebtables bug: please report to author: entries_size too small 15:54:56 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x162, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff010000001100000000000000000076657468315f746f5f7465616d000000736974302000000000000400000000006272696467653000000000000000000076657468305f746f5f627269646765000180c2000000000000000000aaaaaaaaaa0000000000000000007000000070010000a80000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff01000000110000000000000000007465716c30000000000000000000000073797a5f74757e000000000000000000697036677265300000000000090000007663616e30000000d53fa73b00000000ffffffffffff000000000000aaaaaaaa"]}, 0x1da) [ 215.353463][ T8933] hfsplus: unable to find HFS+ superblock [ 215.446271][ T8941] kernel msg: ebtables bug: please report to author: entries_size too small 15:54:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'sit0\x00', 0x0}) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000000)=0x3, 0x4) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x5c06) syz_init_net_socket$llc(0x1a, 0x2, 0x0) connect$llc(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x2, 0xc882) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') 15:54:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000100)={0x0}) 15:54:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a0") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:54:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f00000001c0)={0x0, r1/1000+30000}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f0000000180)=0x80000000002, 0x93) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000100), 0x4) sendto$inet(r0, &(0x7f0000000100), 0xfffffffffffffdf4, 0x0, 0x0, 0x240) 15:54:57 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x162, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x1da) 15:54:57 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) [ 215.959931][ T8956] hfsplus: unable to find HFS+ superblock [ 215.986846][ T8963] kernel msg: ebtables bug: please report to author: entries_size too small 15:54:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a0") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:54:57 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x19d, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x215) 15:54:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) [ 216.220228][ T8979] kernel msg: ebtables bug: please report to author: entries_size too small [ 216.242563][ T8977] hfsplus: unable to find HFS+ superblock 15:54:57 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x19d, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x215) 15:54:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) [ 216.405867][ T8989] kernel msg: ebtables bug: please report to author: entries_size too small 15:54:58 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x19d, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x215) [ 216.616680][ T8999] kernel msg: ebtables bug: please report to author: entries_size too small 15:54:58 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_snmp6\x00') renameat(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 15:54:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:54:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:54:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, "2695b414e44de7a3d400bc5fc2445ac05b71be6365a0cb4b31fd14354f7c0cba13ba4126657c93a1ccf05320eac0b7468147e4e06e7dded38508d27928eed7a7", "01b6e58ff3b91c5f052ebb893461d25b2fe1c30fc42295bd94dcb35a7aa992a535a7828613311b844d14600ab337aa25ad595c1fc1809a3076c73f469f7725dc", "4f05f87dc94079e7a3153c6f909267554be76f4b7bb3faf7a8c2e60f0a11a6f1"}) 15:54:58 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1bb, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x233) [ 216.904641][ T9012] kernel msg: ebtables bug: please report to author: entries_size too small 15:54:58 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) 15:54:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:54:58 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffdfefbfbfffbfc7, 0x0) 15:54:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:54:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, "2695b414e44de7a3d400bc5fc2445ac05b71be6365a0cb4b31fd14354f7c0cba13ba4126657c93a1ccf05320eac0b7468147e4e06e7dded38508d27928eed7a7", "01b6e58ff3b91c5f052ebb893461d25b2fe1c30fc42295bd94dcb35a7aa992a535a7828613311b844d14600ab337aa25ad595c1fc1809a3076c73f469f7725dc", "4f05f87dc94079e7a3153c6f909267554be76f4b7bb3faf7a8c2e60f0a11a6f1", [0x7fffffff]}) 15:54:58 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1bb, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x233) 15:54:58 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x80002, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000140)={0x20}, 0x20) [ 217.161947][ T9035] kernel msg: ebtables bug: please report to author: entries_size too small 15:54:58 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) 15:54:59 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1bb, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x233) 15:54:59 executing program 0: syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300008, 0x0, 0x0, @ipv4={[0x3580], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0x6, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 15:54:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:54:59 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) 15:54:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000100)={0x0}) 15:54:59 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) 15:54:59 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0xd, &(0x7f0000000080)) dup3(r1, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x8, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0x8000) [ 217.590249][ T9060] kernel msg: ebtables bug: please report to author: entries_size too small 15:54:59 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1ca, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x242) 15:54:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) [ 217.737769][ T9079] kernel msg: ebtables bug: please report to author: entries_size too small 15:54:59 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) 15:54:59 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) 15:54:59 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1ca, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x242) 15:54:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:54:59 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) 15:54:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000100)={0x0}) 15:54:59 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0xd, &(0x7f0000000080)) dup3(r1, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x8, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0x8000) [ 218.070848][ T9102] kernel msg: ebtables bug: please report to author: entries_size too small [ 218.108564][ T9076] syz-executor0 (9076) used greatest stack depth: 22464 bytes left 15:54:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 218.125755][ T27] kauditd_printk_skb: 10 callbacks suppressed [ 218.125768][ T27] audit: type=1800 audit(1549468499.765:51): pid=9110 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="loop4" ino=7 res=0 15:54:59 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1ca, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x242) 15:54:59 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) [ 218.404398][ T9122] kernel msg: ebtables bug: please report to author: entries_size too small [ 218.408089][ T27] audit: type=1804 audit(1549468499.765:52): pid=9110 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir655175655/syzkaller.kubfQw/31/file0/file0" dev="loop4" ino=7 res=1 15:55:00 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) [ 218.468925][ T9121] hfsplus: unable to find HFS+ superblock 15:55:00 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x249) 15:55:00 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 218.593940][ T9131] kernel msg: ebtables bug: please report to author: entries_size too small 15:55:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x0, &(0x7f0000000080)) dup3(r1, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x8, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0x8000) 15:55:00 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x249) [ 218.689399][ T27] audit: type=1800 audit(1549468500.325:53): pid=9136 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="loop4" ino=8 res=0 15:55:00 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) [ 218.800771][ T27] audit: type=1804 audit(1549468500.365:54): pid=9136 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir655175655/syzkaller.kubfQw/32/file0/file0" dev="loop4" ino=8 res=1 [ 218.929824][ T9142] hfsplus: unable to find HFS+ superblock [ 219.008392][ T9148] kernel msg: ebtables bug: please report to author: entries_size too small 15:55:00 executing program 5: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) 15:55:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 15:55:00 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x0, &(0x7f0000000080)) dup3(r1, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x8, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0x8000) 15:55:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:00 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x249) [ 219.287821][ T9177] kernel msg: ebtables bug: please report to author: entries_size too small [ 219.305152][ T9167] hfsplus: unable to find HFS+ superblock 15:55:01 executing program 5: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) 15:55:01 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d5, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x24d) [ 219.344902][ T27] audit: type=1800 audit(1549468500.975:55): pid=9174 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="loop4" ino=9 res=0 15:55:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}]}) [ 219.543549][ T9190] kernel msg: ebtables bug: please report to author: entries_size too small 15:55:01 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d5, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x24d) [ 219.658160][ T9195] hfsplus: unable to find HFS+ superblock 15:55:01 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:01 executing program 5: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) 15:55:01 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000000000002000000000020009004000000000412d1fbc00000003000600000000190200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8202a80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='\a\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x0) r2 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x185080, 0x1) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f0000000240)={0x5, 0x100000000, 0x1f, 0x3, 0xe, 0x1, 0x94, 0x85, 0x80000000, 0xffff, 0x75c, 0x5}) exit(0x0) [ 219.692332][ T27] audit: type=1804 audit(1549468501.005:56): pid=9174 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir655175655/syzkaller.kubfQw/33/file0/file0" dev="loop4" ino=9 res=1 15:55:01 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d5, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x24d) [ 219.776497][ T9200] kernel msg: ebtables bug: please report to author: entries_size too small 15:55:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}]}) [ 219.901789][ T9216] kernel msg: ebtables bug: please report to author: entries_size too small 15:55:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) [ 219.952276][ T27] audit: type=1800 audit(1549468501.585:57): pid=9217 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16673 res=0 15:55:01 executing program 5: syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) [ 220.045410][ T9226] hfsplus: unable to find HFS+ superblock 15:55:01 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff010000001100000000000000000076657468315f746f5f7465616d000000736974302000000000000400000000006272696467653000000000000000000076657468305f746f5f627269646765000180c2000000000000000000aaaaaaaaaa0000000000000000007000000070010000a80000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff01000000110000000000000000007465716c30000000000000000000000073797a5f74757e000000000000000000697036677265300000000000090000007663616e30000000d53fa73b00000000ffffffffffff000000000000aaaaaaaa98aa00000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff000000"]}, 0x24f) 15:55:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) [ 220.084784][ T27] audit: type=1804 audit(1549468501.615:58): pid=9217 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir655175655/syzkaller.kubfQw/34/file0/file0" dev="sda1" ino=16673 res=1 15:55:01 executing program 0: io_setup(0x0, &(0x7f0000000080)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x8, @dev, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0x8000) 15:55:01 executing program 5: syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) [ 220.277748][ T9247] kernel msg: ebtables bug: please report to author: entries_size too small 15:55:02 executing program 5: syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) 15:55:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}]}) 15:55:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:02 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x24f) 15:55:02 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:02 executing program 0: 15:55:02 executing program 0: 15:55:02 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r0, 0x0, 0x0, 0x200) [ 220.689131][ T9262] kernel msg: ebtables bug: please report to author: entries_size too small 15:55:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace(0x4207, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, 0x0, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:02 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x24f) [ 220.763688][ T9260] hfsplus: unable to find HFS+ superblock 15:55:02 executing program 0: [ 220.887245][ T27] audit: type=1800 audit(1549468502.525:59): pid=9281 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16686 res=0 [ 220.889314][ T9280] kernel msg: ebtables bug: please report to author: entries_size too small 15:55:02 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r0, 0x0, 0x0, 0x200) 15:55:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@force='force'}]}) 15:55:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace(0x4207, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, 0x0, 0x20000004, &(0x7f0000000100)={0x0}) [ 220.923377][ T27] audit: type=1804 audit(1549468502.555:60): pid=9281 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir655175655/syzkaller.kubfQw/35/file0/file0" dev="sda1" ino=16686 res=1 15:55:02 executing program 0: 15:55:02 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r0, 0x0, 0x0, 0x200) [ 221.099944][ T9290] hfsplus: unable to find HFS+ superblock 15:55:03 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@force='force'}]}) 15:55:03 executing program 1: 15:55:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace(0x4207, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, 0x0, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:03 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r0, &(0x7f00000000c0), 0x0, 0x200) 15:55:03 executing program 0: 15:55:03 executing program 0: 15:55:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:03 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r0, &(0x7f00000000c0), 0x0, 0x200) 15:55:03 executing program 1: [ 221.693782][ T9306] hfsplus: unable to find HFS+ superblock 15:55:03 executing program 0: 15:55:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@force='force'}]}) [ 222.053143][ T9337] hfsplus: unable to find HFS+ superblock 15:55:04 executing program 0: 15:55:04 executing program 1: 15:55:04 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r0, &(0x7f00000000c0), 0x0, 0x200) 15:55:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:04 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:04 executing program 3: 15:55:04 executing program 0: 15:55:04 executing program 3: 15:55:04 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r0, &(0x7f00000000c0)=[{0x0}], 0x1, 0x200) 15:55:04 executing program 1: 15:55:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:04 executing program 0: 15:55:04 executing program 3: 15:55:04 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r0, &(0x7f00000000c0)=[{0x0}], 0x1, 0x200) 15:55:04 executing program 1: 15:55:04 executing program 1: 15:55:04 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:04 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r0, &(0x7f00000000c0)=[{0x0}], 0x1, 0x200) 15:55:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:04 executing program 3: 15:55:04 executing program 0: 15:55:04 executing program 1: 15:55:04 executing program 3: 15:55:04 executing program 0: 15:55:04 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x0) [ 223.150877][ T27] kauditd_printk_skb: 2 callbacks suppressed [ 223.150890][ T27] audit: type=1800 audit(1549468504.785:63): pid=9393 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16714 res=0 15:55:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:04 executing program 1: 15:55:05 executing program 0: [ 223.326942][ T27] audit: type=1804 audit(1549468504.825:64): pid=9393 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir655175655/syzkaller.kubfQw/38/file0/file0" dev="sda1" ino=16714 res=1 15:55:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:05 executing program 3: 15:55:05 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x0) 15:55:05 executing program 1: 15:55:05 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:05 executing program 0: 15:55:05 executing program 0: 15:55:05 executing program 3: 15:55:05 executing program 1: 15:55:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0xffffffffffffffff, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:05 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x0) 15:55:05 executing program 1: 15:55:05 executing program 0: 15:55:05 executing program 3: [ 224.060854][ T27] audit: type=1800 audit(1549468505.695:65): pid=9430 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16719 res=0 15:55:05 executing program 5: 15:55:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0xffffffffffffffff, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) [ 224.202077][ T27] audit: type=1804 audit(1549468505.695:66): pid=9430 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir655175655/syzkaller.kubfQw/39/file0/file0" dev="sda1" ino=16719 res=1 15:55:06 executing program 3: 15:55:06 executing program 0: 15:55:06 executing program 1: 15:55:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0xffffffffffffffff, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:06 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:06 executing program 5: 15:55:06 executing program 1: 15:55:06 executing program 3: 15:55:06 executing program 5: 15:55:06 executing program 0: 15:55:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:06 executing program 1: 15:55:06 executing program 0: [ 225.002166][ T27] audit: type=1800 audit(1549468506.635:67): pid=9470 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="loop4" ino=10 res=0 15:55:06 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) mount(&(0x7f0000000080)=ANY=[], 0x0, 0x0, 0x0, &(0x7f0000653fff)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_unlink(0x0) syz_open_dev$ndb(&(0x7f0000000240)='/dev/nbd#\x00', 0x0, 0x101) recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000004640)={0x0, 0x989680}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x0, 0x0) dup2(r1, r2) writev(r2, &(0x7f00000023c0), 0x1000000000000252) readahead(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$usb(&(0x7f00000003c0)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000080)=ANY=[@ANYBLOB="0f89"]) 15:55:06 executing program 3: syz_mount_image$minix(&(0x7f0000000200)='minix\x00', &(0x7f0000000240)='./file0\x00', 0x300, 0x0, 0x0, 0x0, 0x0) [ 225.175039][ T27] audit: type=1804 audit(1549468506.645:68): pid=9470 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir655175655/syzkaller.kubfQw/40/file0/file0" dev="loop4" ino=10 res=1 15:55:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:07 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:07 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0xa, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20000015001}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x38d}}, 0x0) write$tun(r1, &(0x7f0000000340)={@void, @val={0x1}, @mpls={[], @ipv6={0x0, 0x6, "314092", 0x44, 0x3a, 0x0, @dev, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @dev}}}}}, 0xff23) 15:55:07 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620c, &(0x7f0000000080)) 15:55:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r1, 0x3, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x2}]}, 0x1c}}, 0x0) [ 225.406659][ T9491] MINIX-fs: unable to read superblock 15:55:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:07 executing program 0: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) [ 225.453641][ T9503] binder: 9502:9503 ioctl c018620c 20000080 returned -1 [ 225.480457][ T9505] netlink: 'syz-executor1': attribute type 4 has an invalid length. [ 225.492197][ T9501] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 225.505955][ T9501] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 225.520263][ T9510] netlink: 'syz-executor1': attribute type 4 has an invalid length. [ 225.531160][ T9491] MINIX-fs: unable to read superblock [ 225.544991][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 225.550783][ C0] protocol 88fb is buggy, dev hsr_slave_1 15:55:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r1, 0x3, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x2}]}, 0x1c}}, 0x0) [ 225.565897][ T9501] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 15:55:07 executing program 3: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) [ 225.624973][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 225.630777][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:55:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) [ 225.661874][ T27] audit: type=1800 audit(1549468507.295:69): pid=9522 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16566 res=0 [ 225.713417][ T27] audit: type=1804 audit(1549468507.295:70): pid=9522 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir508517115/syzkaller.ATZLJl/63/file0" dev="sda1" ino=16566 res=1 [ 225.740080][ T9508] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 225.774447][ T27] audit: type=1800 audit(1549468507.325:71): pid=9523 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16729 res=0 [ 225.799551][ T27] audit: type=1804 audit(1549468507.335:72): pid=9523 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir655175655/syzkaller.kubfQw/41/file0/file0" dev="sda1" ino=16729 res=1 [ 225.838980][ T9508] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 15:55:07 executing program 1: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:07 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:08 executing program 3: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:08 executing program 5: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:08 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:08 executing program 0: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00'}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00'}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:08 executing program 1: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:08 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00'}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:08 executing program 0: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, 0x0, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:09 executing program 3: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:09 executing program 4: geteuid() syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r1, r2, 0x0, 0x10000) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r3, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:09 executing program 5: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, 0x0, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:09 executing program 1: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, 0x0, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:10 executing program 0: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) [ 228.537436][ T27] kauditd_printk_skb: 16 callbacks suppressed [ 228.537450][ T27] audit: type=1800 audit(1549468510.165:89): pid=9645 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=16764 res=0 15:55:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x0, &(0x7f0000000100)={0x0}) 15:55:10 executing program 5: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) [ 228.602194][ T27] audit: type=1804 audit(1549468510.175:90): pid=9645 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir371046656/syzkaller.8jSG1D/83/file0/file0" dev="sda1" ino=16764 res=1 15:55:10 executing program 4: geteuid() syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r1, r2, 0x0, 0x10000) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r3, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x0, &(0x7f0000000100)={0x0}) 15:55:10 executing program 3: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) [ 228.881789][ T27] audit: type=1800 audit(1549468510.515:91): pid=9666 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16721 res=0 [ 229.005504][ T27] audit: type=1804 audit(1549468510.585:92): pid=9659 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir508517115/syzkaller.ATZLJl/66/file0/file0" dev="sda1" ino=16721 res=1 15:55:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x0, &(0x7f0000000100)={0x0}) 15:55:11 executing program 1: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:11 executing program 4: geteuid() syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r1, r2, 0x0, 0x10000) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r3, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) [ 229.515990][ T27] audit: type=1800 audit(1549468510.645:93): pid=9679 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor3" name="file0" dev="sda1" ino=16762 res=0 [ 229.548820][ T27] audit: type=1800 audit(1549468510.665:94): pid=9676 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="loop4" ino=13 res=0 15:55:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, 0x0) [ 229.589691][ T27] audit: type=1804 audit(1549468510.675:95): pid=9676 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir655175655/syzkaller.kubfQw/45/file0/file0" dev="loop4" ino=13 res=1 [ 229.616483][ T27] audit: type=1804 audit(1549468510.695:96): pid=9679 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir186508166/syzkaller.KZCsLi/66/file0/file0" dev="sda1" ino=16762 res=1 [ 229.663511][ T27] audit: type=1800 audit(1549468510.805:97): pid=9660 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor5" name="file0" dev="loop5" ino=14 res=0 [ 229.690608][ T27] audit: type=1804 audit(1549468510.885:98): pid=9660 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir532133553/syzkaller.f3RGIY/66/file0/file0" dev="loop5" ino=14 res=1 15:55:11 executing program 5: geteuid() syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r1, r2, 0x0, 0x10000) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r3, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:11 executing program 0: geteuid() syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r1, r2, 0x0, 0x10000) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r3, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:11 executing program 3: geteuid() syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r1, r2, 0x0, 0x10000) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r3, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, 0x0) 15:55:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, 0x0) 15:55:12 executing program 1: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:12 executing program 0: geteuid() syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r1, r2, 0x0, 0x10000) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r3, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:12 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:12 executing program 5: geteuid() syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r1, r2, 0x0, 0x10000) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r3, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:12 executing program 2: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:12 executing program 3: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:13 executing program 1: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:13 executing program 0: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:13 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:13 executing program 2: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:13 executing program 5: geteuid() syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r1, r2, 0x0, 0x10000) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r3, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:14 executing program 3: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) 15:55:14 executing program 1: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) 15:55:14 executing program 0: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:14 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:14 executing program 5: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:15 executing program 2: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:15 executing program 1: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:15 executing program 3: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) [ 233.623256][ T27] kauditd_printk_skb: 38 callbacks suppressed [ 233.623270][ T27] audit: type=1800 audit(1549468515.255:137): pid=9847 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor2" name="file0" dev="sda1" ino=16609 res=0 [ 233.669752][ T27] audit: type=1800 audit(1549468515.295:138): pid=9848 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor5" name="file0" dev="sda1" ino=16742 res=0 [ 233.694764][ T27] audit: type=1804 audit(1549468515.325:139): pid=9848 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir532133553/syzkaller.f3RGIY/70/file0/file0" dev="sda1" ino=16742 res=1 [ 233.723653][ T27] audit: type=1804 audit(1549468515.355:140): pid=9847 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir605949929/syzkaller.Kkbx6Y/87/file0/file0" dev="sda1" ino=16609 res=1 [ 233.902996][ T27] audit: type=1800 audit(1549468515.535:141): pid=9859 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=16779 res=0 [ 234.009665][ T27] audit: type=1804 audit(1549468515.545:142): pid=9859 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir371046656/syzkaller.8jSG1D/88/file0/file0" dev="sda1" ino=16779 res=1 [ 234.037388][ T27] audit: type=1800 audit(1549468515.585:143): pid=9856 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor3" name="file0" dev="sda1" ino=16780 res=0 [ 234.064657][ T27] audit: type=1804 audit(1549468515.615:144): pid=9856 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir186508166/syzkaller.KZCsLi/70/file0/file0" dev="sda1" ino=16780 res=1 15:55:15 executing program 0: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) 15:55:15 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) [ 234.332441][ T27] audit: type=1800 audit(1549468515.965:145): pid=9868 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16673 res=0 [ 234.512940][ T27] audit: type=1804 audit(1549468515.985:146): pid=9868 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir508517115/syzkaller.ATZLJl/71/file0/file0" dev="sda1" ino=16673 res=1 15:55:16 executing program 3: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) 15:55:16 executing program 2: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:16 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:16 executing program 1: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:16 executing program 5: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) 15:55:16 executing program 0: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) 15:55:16 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:16 executing program 2: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:17 executing program 5: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) 15:55:17 executing program 1: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:17 executing program 3: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockname(r0, &(0x7f0000000840)=@rc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200, 0x0) r1 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) 15:55:17 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r3, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:17 executing program 2: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) [ 235.867199][ T9938] kernel msg: ebtables bug: please report to author: entry offsets not in right order 15:55:17 executing program 3: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:17 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r3, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:17 executing program 1: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:17 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockname(r1, &(0x7f0000000840)=@rc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200, 0x0) fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000140)=[0xee00, 0x0]) write$FUSE_ENTRY(r2, &(0x7f0000000180)={0x90, 0x0, 0x7, {0x6, 0x1, 0x8, 0x6, 0x2, 0x0, {0x5, 0x48, 0x0, 0x6, 0x5, 0x200, 0x7f, 0x9, 0x3, 0x3, 0x3, r3, r4, 0x86e, 0x8f}}}, 0x90) r5 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000540)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000a80], 0x2, 0x0, &(0x7f0000000a80)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bcsf0\x00\x00\x00\x00\b\x00', 'sit0\x00\x00\x02\x00\x00\x00\xff\xff\x00', 'bond0\x00', 'vlan0\x00', @broadcast, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1a8) 15:55:18 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockname(r1, &(0x7f0000000840)=@rc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200, 0x0) fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000140)=[0xee00, 0x0]) write$FUSE_ENTRY(r2, &(0x7f0000000180)={0x90, 0x0, 0x7, {0x6, 0x1, 0x8, 0x6, 0x2, 0x0, {0x5, 0x48, 0x0, 0x6, 0x5, 0x200, 0x7f, 0x9, 0x3, 0x3, 0x3, r3, r4, 0x86e, 0x8f}}}, 0x90) r5 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000540)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000a80], 0x2, 0x0, &(0x7f0000000a80)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bcsf0\x00\x00\x00\x00\b\x00', 'sit0\x00\x00\x02\x00\x00\x00\xff\xff\x00', 'bond0\x00', 'vlan0\x00', @broadcast, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1a8) syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') 15:55:18 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r3, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:18 executing program 3: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r3, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:18 executing program 5: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) [ 236.406018][ T9974] kernel msg: ebtables bug: please report to author: entry offsets not in right order 15:55:18 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockname(r1, &(0x7f0000000840)=@rc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200, 0x0) fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000140)=[0xee00, 0x0]) write$FUSE_ENTRY(r2, &(0x7f0000000180)={0x90, 0x0, 0x7, {0x6, 0x1, 0x8, 0x6, 0x2, 0x0, {0x5, 0x48, 0x0, 0x6, 0x5, 0x200, 0x7f, 0x9, 0x3, 0x3, 0x3, r3, r4, 0x86e, 0x8f}}}, 0x90) r5 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000540)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000a80], 0x2, 0x0, &(0x7f0000000a80)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bcsf0\x00\x00\x00\x00\b\x00', 'sit0\x00\x00\x02\x00\x00\x00\xff\xff\x00', 'bond0\x00', 'vlan0\x00', @broadcast, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1a8) syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') [ 236.451589][ T9977] kernel msg: ebtables bug: please report to author: Wrong nr. of counters requested 15:55:18 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockname(r1, &(0x7f0000000840)=@rc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200, 0x0) fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000140)=[0xee00, 0x0]) write$FUSE_ENTRY(r2, &(0x7f0000000180)={0x90, 0x0, 0x7, {0x6, 0x1, 0x8, 0x6, 0x2, 0x0, {0x5, 0x48, 0x0, 0x6, 0x5, 0x200, 0x7f, 0x9, 0x3, 0x3, 0x3, r3, r4, 0x86e, 0x8f}}}, 0x90) r5 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000540)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000a80], 0x2, 0x0, &(0x7f0000000a80)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bcsf0\x00\x00\x00\x00\b\x00', 'sit0\x00\x00\x02\x00\x00\x00\xff\xff\x00', 'bond0\x00', 'vlan0\x00', @broadcast, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1a8) syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') [ 236.632526][ T9988] kernel msg: ebtables bug: please report to author: entry offsets not in right order [ 236.644606][ T9992] kernel msg: ebtables bug: please report to author: entry offsets not in right order [ 236.651919][ T9988] kernel msg: ebtables bug: please report to author: Wrong nr. of counters requested 15:55:18 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r3, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:18 executing program 2: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r3, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) [ 236.764680][ T9992] kernel msg: ebtables bug: please report to author: Wrong nr. of counters requested 15:55:18 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockname(r1, &(0x7f0000000840)=@rc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200, 0x0) fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000140)=[0xee00, 0x0]) write$FUSE_ENTRY(r2, &(0x7f0000000180)={0x90, 0x0, 0x7, {0x6, 0x1, 0x8, 0x6, 0x2, 0x0, {0x5, 0x48, 0x0, 0x6, 0x5, 0x200, 0x7f, 0x9, 0x3, 0x3, 0x3, r3, r4, 0x86e, 0x8f}}}, 0x90) r5 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000540)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000a80], 0x2, 0x0, &(0x7f0000000a80)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bcsf0\x00\x00\x00\x00\b\x00', 'sit0\x00\x00\x02\x00\x00\x00\xff\xff\x00', 'bond0\x00', 'vlan0\x00', @broadcast, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1a8) syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') [ 236.871348][T10005] kernel msg: ebtables bug: please report to author: entry offsets not in right order 15:55:18 executing program 3: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r3, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:18 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000180), &(0x7f00000001c0)=0x8a) r1 = socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2400000003061f001cfffd946fa2830020200a000300010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) [ 236.941215][T10005] kernel msg: ebtables bug: please report to author: Wrong nr. of counters requested 15:55:18 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000280)=ANY=[@ANYBLOB="8b0000009fc627ad9ae5686eece9fe25755057234d5d3d43efebdde8e63629f55240e2f92eba2dcb909e61cb4a3467cca99902004d22ba04c8a13dd5c948e01e6552a5af09a3ec0b027c711ebd263054449fbed3549cb181597f23ed797c61276a33a50cc3c6fec1f603f1a1ba0925d6a187f18c0924d7"], 0x0) mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4, 0x40010, r0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000880)={0x8, 0x0, &(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='(\x00\x00\x00\x00\x00\x00\x00X\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x00(\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x00\x00x\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']], 0x0, 0x0, 0x0}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e23, 0x7, @dev, 0x7}}, [0x0, 0x7961fcc3, 0xffffffff00000000, 0x8, 0x751, 0x8, 0x2, 0x5, 0x3817, 0x401, 0x1f, 0xd, 0x9, 0x5, 0x60]}, 0x0) perf_event_open(&(0x7f00000008c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f00000006c0), 0x0, 0x100002, 0x0, 0x0, 0x0) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f00000009c0)={@null, @null, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast]}) r2 = socket$can_raw(0x1d, 0x3, 0x1) r3 = openat$dir(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_raw(r2, &(0x7f0000000140)={0x1d, r4}, 0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000000)={0xf17, 0x0, 0x4, 0x9, r1}, &(0x7f0000000940)=0x10) ioctl(r3, 0x5, &(0x7f0000000440)="672099b1a95be71185ee039735732dc2296a26c75479d62188f07d744128d64f1803b316c061025c53273ee779a14c737b01be29bd017b303b095c55e59a5c978dcff46cb8b769c7f1b9cc6ce814d0d5cd0e733910f12bf05f0685cfc96ec367c8cd4f1acef13b8499662ae7be8b6ed8167f137678f784ab2b2a7caa7c43337df6d210643fb15d2d6f429358d3e5b9cc1caf98f3aec529cd48c870a692dba3eef4075741ad3858ec45781c9231ee2600f9e792fa7b79dc38e1cd07d3c2b4c1086e1a921ae877ae694b2fd52ecb07ba44c471dbdde40155addeba62d1ce54949568a8fc3b589e0371c138cc0de8c8c4d2eb6ee6cd40edf1") setsockopt(r2, 0x402000000000065, 0xfffffffffffffff9, &(0x7f0000000080), 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) sendmmsg$nfc_llcp(0xffffffffffffffff, &(0x7f0000001b80)=[{&(0x7f0000000a80)={0x27, 0x0, 0x1, 0x0, 0x174c, 0x2, "1ddc37787121faccc97cc16d89ea3349ddb1882abc4761f38bc41e881d0b3f2213adefd7dccb3508d318002f25dd536138a77dbfd649633be43e9de500a940", 0x1f}, 0x60, 0x0, 0x0, 0x0, 0x0, 0x1}], 0x1, 0xc800) unshare(0x40000400) [ 237.077667][T10018] kernel msg: ebtables bug: please report to author: entry offsets not in right order [ 237.117052][T10025] netlink: 16 bytes leftover after parsing attributes in process `syz-executor0'. 15:55:18 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r3, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:18 executing program 2: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r3, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) [ 237.134541][T10026] kernel msg: ebtables bug: please report to author: Wrong nr. of counters requested 15:55:18 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000180), &(0x7f00000001c0)=0x8a) r1 = socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2400000003061f001cfffd946fa2830020200a000300010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) 15:55:18 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000280)=ANY=[@ANYBLOB="8b0000009fc627ad9ae5686eece9fe25755057234d5d3d43efebdde8e63629f55240e2f92eba2dcb909e61cb4a3467cca99902004d22ba04c8a13dd5c948e01e6552a5af09a3ec0b027c711ebd263054449fbed3549cb181597f23ed797c61276a33a50cc3c6fec1f603f1a1ba0925d6a187f18c0924d7"], 0x0) mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4, 0x40010, r0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000880)={0x8, 0x0, &(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='(\x00\x00\x00\x00\x00\x00\x00X\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x00(\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x00\x00x\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']], 0x0, 0x0, 0x0}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e23, 0x7, @dev, 0x7}}, [0x0, 0x7961fcc3, 0xffffffff00000000, 0x8, 0x751, 0x8, 0x2, 0x5, 0x3817, 0x401, 0x1f, 0xd, 0x9, 0x5, 0x60]}, 0x0) perf_event_open(&(0x7f00000008c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f00000006c0), 0x0, 0x100002, 0x0, 0x0, 0x0) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f00000009c0)={@null, @null, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast]}) r2 = socket$can_raw(0x1d, 0x3, 0x1) r3 = openat$dir(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_raw(r2, &(0x7f0000000140)={0x1d, r4}, 0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000000)={0xf17, 0x0, 0x4, 0x9, r1}, &(0x7f0000000940)=0x10) ioctl(r3, 0x5, &(0x7f0000000440)="672099b1a95be71185ee039735732dc2296a26c75479d62188f07d744128d64f1803b316c061025c53273ee779a14c737b01be29bd017b303b095c55e59a5c978dcff46cb8b769c7f1b9cc6ce814d0d5cd0e733910f12bf05f0685cfc96ec367c8cd4f1acef13b8499662ae7be8b6ed8167f137678f784ab2b2a7caa7c43337df6d210643fb15d2d6f429358d3e5b9cc1caf98f3aec529cd48c870a692dba3eef4075741ad3858ec45781c9231ee2600f9e792fa7b79dc38e1cd07d3c2b4c1086e1a921ae877ae694b2fd52ecb07ba44c471dbdde40155addeba62d1ce54949568a8fc3b589e0371c138cc0de8c8c4d2eb6ee6cd40edf1") setsockopt(r2, 0x402000000000065, 0xfffffffffffffff9, &(0x7f0000000080), 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) sendmmsg$nfc_llcp(0xffffffffffffffff, &(0x7f0000001b80)=[{&(0x7f0000000a80)={0x27, 0x0, 0x1, 0x0, 0x174c, 0x2, "1ddc37787121faccc97cc16d89ea3349ddb1882abc4761f38bc41e881d0b3f2213adefd7dccb3508d318002f25dd536138a77dbfd649633be43e9de500a940", 0x1f}, 0x60, 0x0, 0x0, 0x0, 0x0, 0x1}], 0x1, 0xc800) unshare(0x40000400) 15:55:19 executing program 3 (fault-call:8 fault-nth:0): socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:19 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r3, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) [ 237.413084][T10047] netlink: 16 bytes leftover after parsing attributes in process `syz-executor0'. 15:55:19 executing program 2: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r3, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:19 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:19 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000180), &(0x7f00000001c0)=0x8a) r1 = socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2400000003061f001cfffd946fa2830020200a000300010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) [ 237.500928][T10031] IPVS: ftp: loaded support on port[0] = 21 [ 237.644159][T10064] netlink: 16 bytes leftover after parsing attributes in process `syz-executor0'. 15:55:19 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x8, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:19 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:21 executing program 1: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:21 executing program 2: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nullb0\x00', 0x8000, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r3, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:21 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000180), &(0x7f00000001c0)=0x8a) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2400000003061f001cfffd946fa2830020200a000300010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) 15:55:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x10, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:21 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:21 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000280)=ANY=[@ANYBLOB="8b0000009fc627ad9ae5686eece9fe25755057234d5d3d43efebdde8e63629f55240e2f92eba2dcb909e61cb4a3467cca99902004d22ba04c8a13dd5c948e01e6552a5af09a3ec0b027c711ebd263054449fbed3549cb181597f23ed797c61276a33a50cc3c6fec1f603f1a1ba0925d6a187f18c0924d7"], 0x0) mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4, 0x40010, r0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000880)={0x8, 0x0, &(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='(\x00\x00\x00\x00\x00\x00\x00X\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x00(\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x00\x00x\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']], 0x0, 0x0, 0x0}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e23, 0x7, @dev, 0x7}}, [0x0, 0x7961fcc3, 0xffffffff00000000, 0x8, 0x751, 0x8, 0x2, 0x5, 0x3817, 0x401, 0x1f, 0xd, 0x9, 0x5, 0x60]}, 0x0) perf_event_open(&(0x7f00000008c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f00000006c0), 0x0, 0x100002, 0x0, 0x0, 0x0) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f00000009c0)={@null, @null, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast]}) r2 = socket$can_raw(0x1d, 0x3, 0x1) r3 = openat$dir(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_raw(r2, &(0x7f0000000140)={0x1d, r4}, 0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000000)={0xf17, 0x0, 0x4, 0x9, r1}, &(0x7f0000000940)=0x10) ioctl(r3, 0x5, &(0x7f0000000440)="672099b1a95be71185ee039735732dc2296a26c75479d62188f07d744128d64f1803b316c061025c53273ee779a14c737b01be29bd017b303b095c55e59a5c978dcff46cb8b769c7f1b9cc6ce814d0d5cd0e733910f12bf05f0685cfc96ec367c8cd4f1acef13b8499662ae7be8b6ed8167f137678f784ab2b2a7caa7c43337df6d210643fb15d2d6f429358d3e5b9cc1caf98f3aec529cd48c870a692dba3eef4075741ad3858ec45781c9231ee2600f9e792fa7b79dc38e1cd07d3c2b4c1086e1a921ae877ae694b2fd52ecb07ba44c471dbdde40155addeba62d1ce54949568a8fc3b589e0371c138cc0de8c8c4d2eb6ee6cd40edf1") setsockopt(r2, 0x402000000000065, 0xfffffffffffffff9, &(0x7f0000000080), 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) sendmmsg$nfc_llcp(0xffffffffffffffff, &(0x7f0000001b80)=[{&(0x7f0000000a80)={0x27, 0x0, 0x1, 0x0, 0x174c, 0x2, "1ddc37787121faccc97cc16d89ea3349ddb1882abc4761f38bc41e881d0b3f2213adefd7dccb3508d318002f25dd536138a77dbfd649633be43e9de500a940", 0x1f}, 0x60, 0x0, 0x0, 0x0, 0x0, 0x1}], 0x1, 0xc800) unshare(0x40000400) 15:55:21 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000180), &(0x7f00000001c0)=0x8a) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2400000003061f001cfffd946fa2830020200a000300010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) 15:55:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4206, r2, 0x20000004, &(0x7f0000000100)={0x0}) [ 240.352925][ T27] kauditd_printk_skb: 30 callbacks suppressed [ 240.352938][ T27] audit: type=1800 audit(1549468521.975:177): pid=10107 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16819 res=0 15:55:22 executing program 2: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:22 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4207, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:22 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000180), &(0x7f00000001c0)=0x8a) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2400000003061f001cfffd946fa2830020200a000300010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) [ 240.519260][ T27] audit: type=1800 audit(1549468522.075:178): pid=10105 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="loop1" ino=24 res=0 [ 240.523326][T10094] IPVS: ftp: loaded support on port[0] = 21 [ 240.619015][ T27] audit: type=1804 audit(1549468522.085:179): pid=10105 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir371046656/syzkaller.8jSG1D/94/file0/file0" dev="loop1" ino=24 res=1 [ 240.840196][ T27] audit: type=1800 audit(1549468522.475:180): pid=10129 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16822 res=0 [ 240.883821][ T27] audit: type=1804 audit(1549468522.515:181): pid=10129 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir655175655/syzkaller.kubfQw/61/file0/file0" dev="sda1" ino=16822 res=1 15:55:22 executing program 1: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:22 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2400000003061f001cfffd946fa2830020200a000300010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) 15:55:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0, 0x8}) [ 240.950640][ T27] audit: type=1800 audit(1549468522.515:182): pid=10127 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor2" name="file0" dev="sda1" ino=16566 res=0 [ 240.976688][T10143] netlink: 16 bytes leftover after parsing attributes in process `syz-executor0'. [ 241.004174][ T27] audit: type=1804 audit(1549468522.515:183): pid=10127 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir605949929/syzkaller.Kkbx6Y/97/file0/file0" dev="sda1" ino=16566 res=1 15:55:22 executing program 0: r0 = socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2400000003061f001cfffd946fa2830020200a000300010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) 15:55:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0, 0x8000000}) [ 241.193560][ T27] audit: type=1800 audit(1549468522.825:184): pid=10152 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=16641 res=0 [ 241.249915][T10157] netlink: 16 bytes leftover after parsing attributes in process `syz-executor0'. [ 241.257686][ T27] audit: type=1804 audit(1549468522.855:185): pid=10152 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir371046656/syzkaller.8jSG1D/95/file0/file0" dev="sda1" ino=16641 res=1 15:55:25 executing program 5 (fault-call:1 fault-nth:0): r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) 15:55:25 executing program 0: r0 = socket$inet(0x10, 0x0, 0x80000000c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2400000003061f001cfffd946fa2830020200a000300010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) 15:55:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0, 0x800000000000000}) 15:55:25 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:25 executing program 2: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:25 executing program 1: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:25 executing program 0: r0 = socket$inet(0x10, 0x0, 0x80000000c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2400000003061f001cfffd946fa2830020200a000300010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) [ 243.506257][T10175] FAULT_INJECTION: forcing a failure. [ 243.506257][T10175] name failslab, interval 1, probability 0, space 0, times 1 [ 243.599948][T10175] CPU: 0 PID: 10175 Comm: syz-executor5 Not tainted 5.0.0-rc5-next-20190206 #29 [ 243.606641][ T27] audit: type=1800 audit(1549468525.235:186): pid=10177 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16827 res=0 [ 243.608994][T10175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 243.609012][T10175] Call Trace: [ 243.609123][T10175] dump_stack+0x172/0x1f0 [ 243.609214][T10175] should_fail.cold+0xa/0x15 [ 243.651689][T10175] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 243.657626][T10175] ? lock_downgrade+0x880/0x880 [ 243.662534][T10175] ? ___might_sleep+0x163/0x280 [ 243.667484][T10175] __should_failslab+0x121/0x190 [ 243.672462][T10175] should_failslab+0x9/0x14 [ 243.677021][T10175] kmem_cache_alloc_node_trace+0x270/0x720 [ 243.683076][T10175] __kmalloc_node+0x3d/0x70 [ 243.687627][T10175] kvmalloc_node+0x68/0x100 [ 243.692152][T10175] traverse+0x401/0x760 [ 243.696354][T10175] ? seq_dentry+0x2d0/0x2d0 [ 243.700869][T10175] seq_read+0x8f8/0x1130 [ 243.705130][T10175] ? seq_dentry+0x2d0/0x2d0 [ 243.709710][T10175] proc_reg_read+0x1fe/0x2c0 [ 243.714331][T10175] ? proc_reg_compat_ioctl+0x2a0/0x2a0 [ 243.719846][T10175] ? rw_verify_area+0x118/0x360 [ 243.719868][T10175] do_iter_read+0x4a9/0x660 [ 243.719930][T10175] ? dup_iter+0x260/0x260 [ 243.719952][T10175] vfs_readv+0xf0/0x160 [ 243.719967][T10175] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 243.719982][T10175] ? kasan_check_read+0x11/0x20 [ 243.733771][T10175] ? __fget+0x367/0x540 [ 243.733793][T10175] ? ksys_dup3+0x3e0/0x3e0 [ 243.733840][T10175] ? check_preemption_disabled+0x48/0x290 [ 243.733861][T10175] ? wait_for_completion+0x440/0x440 [ 243.768541][T10175] ? __fget_light+0x1a9/0x230 [ 243.773226][T10175] do_preadv+0x1c4/0x280 [ 243.777474][T10175] ? do_readv+0x290/0x290 [ 243.781843][T10175] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 243.787308][T10175] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 243.792773][T10175] ? do_syscall_64+0x26/0x610 15:55:25 executing program 0: r0 = socket$inet(0x10, 0x0, 0x80000000c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2400000003061f001cfffd946fa2830020200a000300010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) 15:55:25 executing program 0: r0 = socket$inet(0x10, 0x4000000000003, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2400000003061f001cfffd946fa2830020200a000300010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) [ 243.797459][T10175] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 243.803527][T10175] ? do_syscall_64+0x26/0x610 [ 243.808214][T10175] __x64_sys_preadv+0x9a/0xf0 [ 243.812901][T10175] do_syscall_64+0x103/0x610 [ 243.817535][T10175] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 243.823434][T10175] RIP: 0033:0x457e39 [ 243.827333][T10175] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:55:25 executing program 0: r0 = socket$inet(0x10, 0x4000000000003, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2400000003061f001cfffd946fa2830020200a000300010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) 15:55:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x4040, 0x0) connect$rose(r2, &(0x7f00000000c0)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace(0x4207, r3) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r3, 0x20000004, &(0x7f0000000100)={0x0}) [ 243.846933][T10175] RSP: 002b:00007fc46de57c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 243.846948][T10175] RAX: ffffffffffffffda RBX: 00007fc46de57c90 RCX: 0000000000457e39 [ 243.846957][T10175] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000003 [ 243.846965][T10175] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 243.846973][T10175] R10: 0000000000000200 R11: 0000000000000246 R12: 00007fc46de586d4 [ 243.846982][T10175] R13: 00000000004c48e1 R14: 00000000004d8060 R15: 0000000000000004 15:55:25 executing program 0: r0 = socket$inet(0x10, 0x4000000000003, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2400000003061f001cfffd946fa2830020200a000300010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) 15:55:25 executing program 5 (fault-call:1 fault-nth:1): r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) 15:55:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setopts(0x4206, r2, 0x10000, 0x4) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) [ 244.145375][T10212] FAULT_INJECTION: forcing a failure. [ 244.145375][T10212] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 244.158606][T10212] CPU: 0 PID: 10212 Comm: syz-executor5 Not tainted 5.0.0-rc5-next-20190206 #29 [ 244.167627][T10212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.177680][T10212] Call Trace: [ 244.180976][T10212] dump_stack+0x172/0x1f0 [ 244.185325][T10212] should_fail.cold+0xa/0x15 [ 244.189920][T10212] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 244.195814][T10212] ? mark_held_locks+0xf0/0xf0 [ 244.195897][T10212] should_fail_alloc_page+0x50/0x60 [ 244.195918][T10212] __alloc_pages_nodemask+0x1a1/0x7e0 [ 244.205857][T10212] ? find_held_lock+0x35/0x130 [ 244.205876][T10212] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 244.205908][T10212] cache_grow_begin+0x9c/0x850 [ 244.226497][T10212] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 244.232752][T10212] ? check_preemption_disabled+0x48/0x290 [ 244.238483][T10212] kmem_cache_alloc_node_trace+0x658/0x720 15:55:25 executing program 0: socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2400000003061f001cfffd946fa2830020200a000300010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) [ 244.244301][T10212] __kmalloc_node+0x3d/0x70 [ 244.248811][T10212] kvmalloc_node+0x68/0x100 [ 244.253314][T10212] traverse+0x401/0x760 [ 244.257503][T10212] ? seq_dentry+0x2d0/0x2d0 [ 244.262008][T10212] seq_read+0x8f8/0x1130 [ 244.266291][T10212] ? seq_dentry+0x2d0/0x2d0 [ 244.270806][T10212] proc_reg_read+0x1fe/0x2c0 [ 244.275397][T10212] ? proc_reg_compat_ioctl+0x2a0/0x2a0 [ 244.275418][T10212] ? rw_verify_area+0x118/0x360 [ 244.275436][T10212] do_iter_read+0x4a9/0x660 [ 244.275453][T10212] ? dup_iter+0x260/0x260 [ 244.275477][T10212] vfs_readv+0xf0/0x160 [ 244.275495][T10212] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 244.275514][T10212] ? kasan_check_read+0x11/0x20 [ 244.275534][T10212] ? __fget+0x367/0x540 [ 244.313781][T10212] ? ksys_dup3+0x3e0/0x3e0 [ 244.318200][T10212] ? check_preemption_disabled+0x48/0x290 [ 244.318218][T10212] ? wait_for_completion+0x440/0x440 [ 244.318239][T10212] ? __fget_light+0x1a9/0x230 [ 244.318260][T10212] do_preadv+0x1c4/0x280 [ 244.318280][T10212] ? do_readv+0x290/0x290 [ 244.329253][T10212] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 244.329270][T10212] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 244.329284][T10212] ? do_syscall_64+0x26/0x610 [ 244.329300][T10212] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 244.329314][T10212] ? do_syscall_64+0x26/0x610 [ 244.329334][T10212] __x64_sys_preadv+0x9a/0xf0 [ 244.329352][T10212] do_syscall_64+0x103/0x610 [ 244.329377][T10212] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 244.383850][T10212] RIP: 0033:0x457e39 [ 244.387741][T10212] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 244.407321][T10212] RSP: 002b:00007fc46de57c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 244.415709][T10212] RAX: ffffffffffffffda RBX: 00007fc46de57c90 RCX: 0000000000457e39 [ 244.423656][T10212] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000003 [ 244.431622][T10212] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 244.439576][T10212] R10: 0000000000000200 R11: 0000000000000246 R12: 00007fc46de586d4 [ 244.447524][T10212] R13: 00000000004c48e1 R14: 00000000004d8060 R15: 0000000000000004 15:55:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) capset(&(0x7f0000000140)={0x19980330, r3}, &(0x7f0000000180)={0x100, 0x1, 0xfffffffffffffff7, 0xfffffffffffffffd, 0x0, 0x5}) ptrace$setopts(0x4206, r3, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000440)="a3c9c44b74b2716fe202f2732f2d562d4471145f73af123309f8c4b9da01cab1752f9630e3dfbd6ff120ecd3343e7625b8ddc48175f8770b86e09c19cd1a7750769ba405603ac45e908ba2cf52eb22ede34f152f0c63fc2f715a8090451b9908a985b84d30a6c03066dcca7dfd2042bc2a37f0ee455e5eb891aab99f8036958dc0abd4f3c786416b71722d5bca2b3c2db8cc74365ebcc2", 0x97, 0x80, 0x0, 0x0) ptrace(0x4207, r3) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r3, 0x20000004, &(0x7f0000000100)={0x0}) r4 = dup3(r0, r1, 0x80000) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r4, 0x84, 0x4, &(0x7f0000000040), &(0x7f00000000c0)=0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'syz_tun\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000200)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@mcast1, @in6=@mcast2, 0x4e20, 0xff, 0x4e23, 0x4b5, 0x2, 0xa0, 0x80, 0xbf, r5, r6}, {0x9, 0x2bb3, 0xffffffff, 0xd5e1, 0x2, 0x4, 0x7, 0x101}, {0x0, 0xdf3, 0x7, 0x8}, 0x8001, 0x6e6bbc, 0x3, 0x1, 0x2, 0x2}, {{@in=@rand_addr=0x5, 0x4d2, 0xff}, 0x2, @in=@loopback, 0x3506, 0x6, 0x3, 0x3, 0x7, 0xf}}, 0xe8) 15:55:26 executing program 2 (fault-call:2 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:55:26 executing program 0: socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2400000003061f001cfffd946fa2830020200a000300010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) 15:55:26 executing program 5 (fault-call:1 fault-nth:2): r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) 15:55:26 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:26 executing program 1: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) [ 244.581763][T10228] FAULT_INJECTION: forcing a failure. [ 244.581763][T10228] name failslab, interval 1, probability 0, space 0, times 0 15:55:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) r3 = fcntl$getown(r0, 0x9) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x101000, 0x0) perf_event_open(&(0x7f0000000140)={0x7, 0x70, 0xdf7, 0x100, 0x2, 0x7ff, 0x0, 0x5a5, 0x492, 0x7, 0x9, 0x5, 0xff, 0x101, 0x101, 0x4, 0x2, 0x4, 0x6, 0x53, 0x5, 0x1a, 0x6fe, 0x7, 0x3, 0x8, 0x10000, 0x800, 0x6, 0x0, 0x8, 0x5, 0x6, 0x9, 0x1, 0xffffffffffff61bc, 0xfffffffffffffffd, 0x0, 0x0, 0x800, 0x2, @perf_config_ext={0x2, 0x9}, 0x23270, 0x7, 0x0, 0x0, 0xfffffffffffffffa, 0x100}, r3, 0xc, r4, 0x8) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x42) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x80, 0xfffffffffffffff8, 0x0, 0x2ef, 0x800}, &(0x7f00000001c0)=0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000200)={0x7fff, 0x8672, 0x8, 0xffffffffffffffe1, 0x0, 0x40, 0xb3, 0xfffffffffffffffd, r7}, &(0x7f0000000240)=0x20) ioctl$BLKSECDISCARD(r6, 0x127d, &(0x7f00000002c0)=0xffffffff) ptrace$setopts(0x4206, r5, 0x0, 0x8) ptrace(0x4207, r5) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r5, 0x20000004, &(0x7f0000000100)={0x0}) [ 244.623996][T10228] CPU: 1 PID: 10228 Comm: syz-executor2 Not tainted 5.0.0-rc5-next-20190206 #29 [ 244.633057][T10228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.643116][T10228] Call Trace: [ 244.646415][T10228] dump_stack+0x172/0x1f0 [ 244.650754][T10228] should_fail.cold+0xa/0x15 [ 244.655355][T10228] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 244.661163][T10228] ? lock_downgrade+0x880/0x880 [ 244.666019][T10228] ? ___might_sleep+0x163/0x280 [ 244.670892][T10228] __should_failslab+0x121/0x190 [ 244.675839][T10228] should_failslab+0x9/0x14 [ 244.680335][T10228] __kmalloc+0x2dc/0x740 [ 244.684576][T10228] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 244.690804][T10228] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 244.697100][T10228] ? strnlen_user+0x1f0/0x280 [ 244.701770][T10228] ? __x64_sys_memfd_create+0x13c/0x470 [ 244.707296][T10228] __x64_sys_memfd_create+0x13c/0x470 [ 244.712666][T10228] ? memfd_fcntl+0x1550/0x1550 [ 244.717421][T10228] ? do_syscall_64+0x26/0x610 [ 244.722104][T10228] ? lockdep_hardirqs_on+0x418/0x5d0 [ 244.727470][T10228] ? trace_hardirqs_on+0x67/0x230 [ 244.732519][T10228] do_syscall_64+0x103/0x610 [ 244.737129][T10228] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 244.743018][T10228] RIP: 0033:0x457e39 [ 244.746916][T10228] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 244.766499][T10228] RSP: 002b:00007fb398ecca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 15:55:26 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) 15:55:26 executing program 0: socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2400000003061f001cfffd946fa2830020200a000300010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) 15:55:26 executing program 2 (fault-call:2 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) [ 244.774908][T10228] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e39 [ 244.782873][T10228] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce47 [ 244.790831][T10228] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 244.798794][T10228] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb398ecd6d4 [ 244.806750][T10228] R13: 00000000004c664a R14: 00000000004dba68 R15: 0000000000000004 [ 244.953168][T10253] FAULT_INJECTION: forcing a failure. [ 244.953168][T10253] name failslab, interval 1, probability 0, space 0, times 0 [ 244.989082][T10253] CPU: 1 PID: 10253 Comm: syz-executor2 Not tainted 5.0.0-rc5-next-20190206 #29 15:55:26 executing program 0: r0 = socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(r0, 0x0, 0x0) 15:55:26 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x200000bb}], 0x1, 0x200) [ 244.998131][T10253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.008185][T10253] Call Trace: [ 245.011484][T10253] dump_stack+0x172/0x1f0 [ 245.015835][T10253] should_fail.cold+0xa/0x15 [ 245.020437][T10253] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 245.026267][T10253] ? lock_downgrade+0x880/0x880 [ 245.031154][T10253] ? ___might_sleep+0x163/0x280 [ 245.036010][T10253] __should_failslab+0x121/0x190 [ 245.040970][T10253] should_failslab+0x9/0x14 [ 245.045478][T10253] kmem_cache_alloc+0x2be/0x710 [ 245.050342][T10253] ? __alloc_fd+0x430/0x530 [ 245.054847][T10253] ? shmem_destroy_callback+0xc0/0xc0 [ 245.060227][T10253] shmem_alloc_inode+0x1c/0x50 [ 245.064996][T10253] alloc_inode+0x66/0x190 [ 245.069330][T10253] new_inode_pseudo+0x19/0xf0 [ 245.074012][T10253] new_inode+0x1f/0x40 [ 245.078103][T10253] shmem_get_inode+0x84/0x780 [ 245.082792][T10253] __shmem_file_setup.part.0+0x7e/0x2b0 [ 245.088366][T10253] shmem_file_setup+0x66/0x90 [ 245.093061][T10253] __x64_sys_memfd_create+0x2a2/0x470 [ 245.098440][T10253] ? memfd_fcntl+0x1550/0x1550 15:55:26 executing program 3: mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000180)={0x20002000}) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000140)={{0x0, 0x8, 0x5, 0xaa44, 0x401, 0x6359}, 0x3}) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f0000000040)=0x80000000) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0xfffffffffffffff9, 0x0, 0x6, 0x10000, 0x0, 0x8001, 0x800a, 0xd, 0x9, 0x27, 0xfffffffffffffff7, 0x6, 0x3196, 0x7, 0x1, 0x0, 0x7f, 0x6, 0x8, 0x5, 0x3, 0x5, 0x80000001, 0xa0, 0xfff, 0x5, 0x20e0, 0x9, 0x7, 0x7, 0x788a9768, 0x8, 0x6, 0x7, 0x9, 0x9, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10, 0x80000001, 0x4, 0x8, 0x2f9, 0x7, 0xfffffffffffffc00}, r2, 0x10, r0, 0x2) ioctl$KVM_GET_CLOCK(r0, 0x8030ae7c, &(0x7f0000000300)) ptrace(0x4207, r2) fcntl$getown(r1, 0x9) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000280)={{0x7, 0x5}, {0x6, 0xffffffffffffff00}, 0x2, 0x1, 0x1}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) [ 245.103212][T10253] ? do_syscall_64+0x26/0x610 [ 245.107923][T10253] ? lockdep_hardirqs_on+0x418/0x5d0 [ 245.113212][T10253] ? trace_hardirqs_on+0x67/0x230 [ 245.118247][T10253] do_syscall_64+0x103/0x610 [ 245.122848][T10253] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 245.128740][T10253] RIP: 0033:0x457e39 [ 245.132652][T10253] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 245.152248][T10253] RSP: 002b:00007fb398ecca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 245.160637][T10253] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e39 [ 245.168599][T10253] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce47 [ 245.176556][T10253] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 245.184507][T10253] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb398ecd6d4 [ 245.192458][T10253] R13: 00000000004c664a R14: 00000000004dba68 R15: 0000000000000004 15:55:26 executing program 2 (fault-call:2 fault-nth:2): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:55:26 executing program 1: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) [ 245.339339][T10270] FAULT_INJECTION: forcing a failure. [ 245.339339][T10270] name failslab, interval 1, probability 0, space 0, times 0 [ 245.367891][T10270] CPU: 1 PID: 10270 Comm: syz-executor2 Not tainted 5.0.0-rc5-next-20190206 #29 [ 245.376930][T10270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 15:55:27 executing program 0: r0 = socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(r0, 0x0, 0x0) [ 245.386979][T10270] Call Trace: [ 245.390273][T10270] dump_stack+0x172/0x1f0 [ 245.394616][T10270] should_fail.cold+0xa/0x15 [ 245.399214][T10270] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 245.405077][T10270] ? lock_downgrade+0x880/0x880 [ 245.409940][T10270] ? ___might_sleep+0x163/0x280 [ 245.414799][T10270] __should_failslab+0x121/0x190 [ 245.419738][T10270] should_failslab+0x9/0x14 [ 245.424242][T10270] kmem_cache_alloc+0x2be/0x710 [ 245.429089][T10270] ? current_time+0x6b/0x140 [ 245.433722][T10270] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 245.439538][T10270] ? lockdep_hardirqs_on+0x418/0x5d0 [ 245.444862][T10270] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 245.451196][T10270] ? timespec64_trunc+0xf0/0x180 [ 245.456223][T10270] __d_alloc+0x2e/0x8c0 [ 245.460389][T10270] d_alloc_pseudo+0x1e/0x30 [ 245.464896][T10270] alloc_file_pseudo+0xe2/0x280 [ 245.469757][T10270] ? alloc_file+0x4d0/0x4d0 [ 245.474252][T10270] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 245.480479][T10270] __shmem_file_setup.part.0+0x108/0x2b0 [ 245.486112][T10270] shmem_file_setup+0x66/0x90 [ 245.490781][T10270] __x64_sys_memfd_create+0x2a2/0x470 [ 245.496133][T10270] ? memfd_fcntl+0x1550/0x1550 [ 245.500878][T10270] ? do_syscall_64+0x26/0x610 [ 245.505544][T10270] ? lockdep_hardirqs_on+0x418/0x5d0 [ 245.510830][T10270] ? trace_hardirqs_on+0x67/0x230 [ 245.515838][T10270] do_syscall_64+0x103/0x610 [ 245.520414][T10270] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 245.526289][T10270] RIP: 0033:0x457e39 [ 245.530188][T10270] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 245.549794][T10270] RSP: 002b:00007fb398ecca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 245.558197][T10270] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e39 [ 245.566153][T10270] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce47 [ 245.574114][T10270] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 245.582076][T10270] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb398ecd6d4 15:55:27 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:27 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7ffff000}], 0x1, 0x200) 15:55:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x3) r2 = inotify_init1(0x80000) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000040)) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x10001c) ptrace(0x4207, r3) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x80, 0x0) ioctl$TUNSETNOCSUM(r4, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r3, 0x20000004, &(0x7f0000000100)={0x0}) [ 245.590031][T10270] R13: 00000000004c664a R14: 00000000004dba68 R15: 0000000000000004 15:55:27 executing program 2 (fault-call:2 fault-nth:3): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:55:27 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x2, 0x200) 15:55:27 executing program 0: r0 = socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(r0, 0x0, 0x0) [ 245.784169][ T27] kauditd_printk_skb: 8 callbacks suppressed [ 245.784188][ T27] audit: type=1800 audit(1549468527.415:195): pid=10294 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="loop1" ino=26 res=0 [ 245.815634][ T27] audit: type=1800 audit(1549468527.445:196): pid=10287 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="loop4" ino=27 res=0 15:55:27 executing program 1: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) [ 246.094431][T10301] FAULT_INJECTION: forcing a failure. [ 246.094431][T10301] name failslab, interval 1, probability 0, space 0, times 0 15:55:27 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:27 executing program 0: r0 = socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) [ 246.139054][T10301] CPU: 1 PID: 10301 Comm: syz-executor2 Not tainted 5.0.0-rc5-next-20190206 #29 [ 246.142802][ T27] audit: type=1804 audit(1549468527.445:197): pid=10294 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir371046656/syzkaller.8jSG1D/98/file0/file0" dev="loop1" ino=26 res=1 [ 246.148088][T10301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.148095][T10301] Call Trace: 15:55:27 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x8, 0x200) [ 246.148118][T10301] dump_stack+0x172/0x1f0 [ 246.148145][T10301] should_fail.cold+0xa/0x15 [ 246.148170][T10301] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 246.148189][T10301] ? lock_downgrade+0x880/0x880 [ 246.148216][T10301] ? ___might_sleep+0x163/0x280 [ 246.179341][ T27] audit: type=1804 audit(1549468527.475:198): pid=10287 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir655175655/syzkaller.kubfQw/64/file0/file0" dev="loop4" ino=27 res=1 [ 246.183079][T10301] __should_failslab+0x121/0x190 [ 246.183100][T10301] should_failslab+0x9/0x14 [ 246.183117][T10301] kmem_cache_alloc+0x2be/0x710 [ 246.183141][T10301] __alloc_file+0x27/0x300 [ 246.235575][T10301] alloc_empty_file+0x72/0x170 [ 246.235595][T10301] alloc_file+0x5e/0x4d0 [ 246.235615][T10301] alloc_file_pseudo+0x189/0x280 [ 246.235634][T10301] ? alloc_file+0x4d0/0x4d0 [ 246.235655][T10301] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 246.259092][T10301] __shmem_file_setup.part.0+0x108/0x2b0 [ 246.284586][T10301] shmem_file_setup+0x66/0x90 [ 246.289271][T10301] __x64_sys_memfd_create+0x2a2/0x470 [ 246.294655][T10301] ? memfd_fcntl+0x1550/0x1550 [ 246.299422][T10301] ? do_syscall_64+0x26/0x610 [ 246.304098][T10301] ? lockdep_hardirqs_on+0x418/0x5d0 [ 246.309384][T10301] ? trace_hardirqs_on+0x67/0x230 [ 246.314407][T10301] do_syscall_64+0x103/0x610 [ 246.319005][T10301] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 246.324899][T10301] RIP: 0033:0x457e39 [ 246.328809][T10301] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 246.348409][T10301] RSP: 002b:00007fb398ecca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 246.356816][T10301] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e39 [ 246.364783][T10301] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce47 [ 246.372754][T10301] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 246.380724][T10301] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb398ecd6d4 [ 246.388692][T10301] R13: 00000000004c664a R14: 00000000004dba68 R15: 0000000000000004 15:55:28 executing program 2 (fault-call:2 fault-nth:4): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:55:28 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x300, 0x200) [ 246.512260][ T27] audit: type=1800 audit(1549468528.145:199): pid=10313 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=16834 res=0 15:55:28 executing program 0: r0 = socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) [ 246.563662][ T27] audit: type=1804 audit(1549468528.185:200): pid=10313 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir371046656/syzkaller.8jSG1D/99/file0" dev="sda1" ino=16834 res=1 15:55:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000540)='/dev/dsp\x00', 0x0, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@empty, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@empty}}, &(0x7f0000000400)=0xe8) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x204450, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_u='version=9p2000.u'}, {@access_client='access=client'}, {@cache_mmap='cache=mmap'}, {@mmap='mmap'}, {@cache_fscache='cache=fscache'}], [{@fowner_lt={'fowner<', r3}}, {@fowner_gt={'fowner>', r4}}, {@uid_eq={'uid', 0x3d, r5}}]}}) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4200, r6, 0x200000000000009, 0x10005e) ptrace(0x4207, r6) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r6, 0x20000004, &(0x7f0000000100)={0x0}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000140)="8457d049e8ce9d5261f623e9fb171b5e", 0x10) 15:55:28 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0xf000, 0x200) [ 246.804677][T10330] FAULT_INJECTION: forcing a failure. [ 246.804677][T10330] name failslab, interval 1, probability 0, space 0, times 0 [ 246.810604][ T27] audit: type=1800 audit(1549468528.245:201): pid=10316 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16849 res=0 [ 246.869176][T10330] CPU: 1 PID: 10330 Comm: syz-executor2 Not tainted 5.0.0-rc5-next-20190206 #29 [ 246.878205][T10330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.888253][T10330] Call Trace: [ 246.889810][ T27] audit: type=1804 audit(1549468528.255:202): pid=10316 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir655175655/syzkaller.kubfQw/65/file0" dev="sda1" ino=16849 res=1 [ 246.891547][T10330] dump_stack+0x172/0x1f0 [ 246.891589][T10330] should_fail.cold+0xa/0x15 [ 246.924953][T10330] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 246.930772][T10330] ? lock_downgrade+0x880/0x880 [ 246.935627][T10330] ? ___might_sleep+0x163/0x280 [ 246.940584][T10330] __should_failslab+0x121/0x190 [ 246.945527][T10330] should_failslab+0x9/0x14 [ 246.950088][T10330] kmem_cache_alloc+0x2be/0x710 [ 246.954949][T10330] __alloc_file+0x27/0x300 [ 246.959366][T10330] alloc_empty_file+0x72/0x170 [ 246.959386][T10330] alloc_file+0x5e/0x4d0 [ 246.959410][T10330] alloc_file_pseudo+0x189/0x280 [ 246.959426][T10330] ? alloc_file+0x4d0/0x4d0 [ 246.959444][T10330] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 246.968493][T10330] __shmem_file_setup.part.0+0x108/0x2b0 [ 246.968530][T10330] shmem_file_setup+0x66/0x90 [ 246.968571][T10330] __x64_sys_memfd_create+0x2a2/0x470 [ 246.999843][T10330] ? memfd_fcntl+0x1550/0x1550 [ 247.004623][T10330] ? do_syscall_64+0x26/0x610 [ 247.009304][T10330] ? lockdep_hardirqs_on+0x418/0x5d0 [ 247.014620][T10330] ? trace_hardirqs_on+0x67/0x230 [ 247.019652][T10330] do_syscall_64+0x103/0x610 [ 247.024248][T10330] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 247.030136][T10330] RIP: 0033:0x457e39 [ 247.034030][T10330] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 247.053640][T10330] RSP: 002b:00007fb398ecca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 247.062060][T10330] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e39 15:55:28 executing program 0: r0 = socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) [ 247.070031][T10330] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce47 [ 247.078011][T10330] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 247.085988][T10330] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb398ecd6d4 [ 247.093956][T10330] R13: 00000000004c664a R14: 00000000004dba68 R15: 0000000000000004 15:55:28 executing program 2 (fault-call:2 fault-nth:5): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:55:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r4, r5) ptrace(0x4207, r3) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r3, 0x20000004, &(0x7f0000000100)={0x0}) [ 247.337505][T10340] FAULT_INJECTION: forcing a failure. [ 247.337505][T10340] name failslab, interval 1, probability 0, space 0, times 0 [ 247.375508][T10340] CPU: 1 PID: 10340 Comm: syz-executor2 Not tainted 5.0.0-rc5-next-20190206 #29 15:55:29 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:29 executing program 1: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) [ 247.384572][T10340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.394630][T10340] Call Trace: [ 247.397956][T10340] dump_stack+0x172/0x1f0 [ 247.402301][T10340] should_fail.cold+0xa/0x15 [ 247.406911][T10340] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 247.412721][T10340] ? lock_downgrade+0x880/0x880 [ 247.417583][T10340] ? ___might_sleep+0x163/0x280 [ 247.422439][T10340] __should_failslab+0x121/0x190 [ 247.427384][T10340] should_failslab+0x9/0x14 [ 247.431894][T10340] kmem_cache_alloc+0x2be/0x710 [ 247.436753][T10340] ? notify_change+0x6d5/0xfb0 [ 247.441521][T10340] ? do_sys_ftruncate+0x41e/0x550 [ 247.446571][T10340] getname_flags+0xd6/0x5b0 [ 247.451085][T10340] getname+0x1a/0x20 [ 247.454980][T10340] do_sys_open+0x2c9/0x5d0 [ 247.459402][T10340] ? filp_open+0x80/0x80 [ 247.463649][T10340] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 247.469110][T10340] ? do_syscall_64+0x26/0x610 [ 247.473792][T10340] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 247.479863][T10340] ? do_syscall_64+0x26/0x610 15:55:29 executing program 0: r0 = socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)}, 0x0) [ 247.484563][T10340] __x64_sys_open+0x7e/0xc0 [ 247.489081][T10340] do_syscall_64+0x103/0x610 [ 247.493714][T10340] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 247.499622][T10340] RIP: 0033:0x411f21 [ 247.503521][T10340] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 247.523130][T10340] RSP: 002b:00007fb398ecca80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 247.531541][T10340] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f21 [ 247.539522][T10340] RDX: 00007fb398eccafa RSI: 0000000000000002 RDI: 00007fb398eccaf0 [ 247.541546][ T27] audit: type=1800 audit(1549468529.175:203): pid=10347 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=16841 res=0 [ 247.547495][T10340] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 247.547504][T10340] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 247.547513][T10340] R13: 0000000000000000 R14: 00000000004dba68 R15: 0000000000000004 15:55:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0xfffff000, 0x200) 15:55:29 executing program 2 (fault-call:2 fault-nth:6): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:55:29 executing program 0: r0 = socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)}, 0x0) 15:55:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0xfffffffffffff000, 0x200) [ 247.977716][T10369] FAULT_INJECTION: forcing a failure. [ 247.977716][T10369] name failslab, interval 1, probability 0, space 0, times 0 [ 248.061440][ T27] audit: type=1804 audit(1549468529.245:204): pid=10347 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir371046656/syzkaller.8jSG1D/100/file0" dev="sda1" ino=16841 res=1 15:55:29 executing program 0: r0 = socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)}, 0x0) [ 248.148785][T10369] CPU: 0 PID: 10369 Comm: syz-executor2 Not tainted 5.0.0-rc5-next-20190206 #29 [ 248.157823][T10369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.167876][T10369] Call Trace: [ 248.171176][T10369] dump_stack+0x172/0x1f0 [ 248.175519][T10369] should_fail.cold+0xa/0x15 [ 248.180134][T10369] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 248.185948][T10369] ? lock_downgrade+0x880/0x880 [ 248.190804][T10369] ? ___might_sleep+0x163/0x280 [ 248.195680][T10369] __should_failslab+0x121/0x190 [ 248.200623][T10369] should_failslab+0x9/0x14 [ 248.205128][T10369] kmem_cache_alloc+0x2be/0x710 [ 248.209980][T10369] ? notify_change+0x6d5/0xfb0 [ 248.214747][T10369] ? do_sys_ftruncate+0x41e/0x550 [ 248.219772][T10369] getname_flags+0xd6/0x5b0 [ 248.224283][T10369] getname+0x1a/0x20 [ 248.228187][T10369] do_sys_open+0x2c9/0x5d0 [ 248.232618][T10369] ? filp_open+0x80/0x80 [ 248.236923][T10369] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 248.242384][T10369] ? do_syscall_64+0x26/0x610 [ 248.247079][T10369] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 248.253142][T10369] ? do_syscall_64+0x26/0x610 [ 248.257821][T10369] __x64_sys_open+0x7e/0xc0 [ 248.262335][T10369] do_syscall_64+0x103/0x610 [ 248.266943][T10369] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 248.272857][T10369] RIP: 0033:0x411f21 [ 248.276745][T10369] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 15:55:30 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0xa3) [ 248.296379][T10369] RSP: 002b:00007fb398eaba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 248.304777][T10369] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f21 [ 248.312757][T10369] RDX: 00007fb398eabafa RSI: 0000000000000002 RDI: 00007fb398eabaf0 [ 248.320718][T10369] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 248.328679][T10369] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 248.336655][T10369] R13: 0000000000000000 R14: 00000000004dba68 R15: 0000000000000004 15:55:30 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:30 executing program 0: r0 = socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1}, 0x0) [ 250.313511][T10393] IPVS: ftp: loaded support on port[0] = 21 [ 250.489526][ T8008] device bridge_slave_1 left promiscuous mode [ 250.496466][ T8008] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.548518][ T8008] device bridge_slave_0 left promiscuous mode [ 250.554637][ T8008] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.746484][ T8008] device hsr_slave_1 left promiscuous mode [ 253.801546][ T8008] device hsr_slave_0 left promiscuous mode [ 253.869040][ T8008] team0 (unregistering): Port device team_slave_1 removed [ 253.880596][ T8008] team0 (unregistering): Port device team_slave_0 removed [ 253.893598][ T8008] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 253.932087][ T8008] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 254.022463][ T8008] bond0 (unregistering): Released all slaves [ 254.160671][T10393] chnl_net:caif_netlink_parms(): no params data found [ 254.196163][T10393] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.203237][T10393] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.211464][T10393] device bridge_slave_0 entered promiscuous mode [ 254.219213][T10393] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.226363][T10393] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.234005][T10393] device bridge_slave_1 entered promiscuous mode [ 254.251446][T10393] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 254.262191][T10393] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 254.283520][T10393] team0: Port device team_slave_0 added [ 254.290552][T10393] team0: Port device team_slave_1 added [ 254.338097][T10393] device hsr_slave_0 entered promiscuous mode [ 254.375285][T10393] device hsr_slave_1 entered promiscuous mode [ 254.480322][T10393] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.487404][T10393] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.494669][T10393] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.501757][T10393] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.532828][T10393] 8021q: adding VLAN 0 to HW filter on device bond0 [ 254.545690][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 254.553631][ T7968] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.561505][ T7968] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.569785][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 254.582147][T10393] 8021q: adding VLAN 0 to HW filter on device team0 [ 254.608353][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 254.622725][ T7968] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.629818][ T7968] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.661561][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 254.670502][ T7968] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.677591][ T7968] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.687956][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 254.706496][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 254.714482][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 254.723761][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 254.732262][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 254.742946][T10393] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 254.767083][T10393] 8021q: adding VLAN 0 to HW filter on device batadv0 15:55:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x109a00, 0x0) ioctl$BLKBSZGET(r2, 0x80081270, &(0x7f00000000c0)) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace(0x4207, r3) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) inotify_init1(0x80000) ptrace$setregset(0x4209, r3, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:36 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x27b) 15:55:36 executing program 1: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) 15:55:36 executing program 0: r0 = socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1}, 0x0) 15:55:36 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:36 executing program 2 (fault-call:2 fault-nth:7): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) [ 254.900632][T10406] FAULT_INJECTION: forcing a failure. [ 254.900632][T10406] name failslab, interval 1, probability 0, space 0, times 0 15:55:36 executing program 0: r0 = socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1}, 0x0) 15:55:36 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x3f00) [ 254.970004][ T27] kauditd_printk_skb: 4 callbacks suppressed [ 254.970017][ T27] audit: type=1800 audit(1549468536.605:209): pid=10412 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16890 res=0 [ 255.056497][T10406] CPU: 0 PID: 10406 Comm: syz-executor2 Not tainted 5.0.0-rc5-next-20190206 #29 [ 255.065618][T10406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 255.075684][T10406] Call Trace: [ 255.079027][T10406] dump_stack+0x172/0x1f0 [ 255.083430][T10406] should_fail.cold+0xa/0x15 [ 255.088083][T10406] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 255.093912][T10406] ? lock_downgrade+0x880/0x880 [ 255.098760][T10406] ? ___might_sleep+0x163/0x280 [ 255.098781][T10406] __should_failslab+0x121/0x190 [ 255.098799][T10406] should_failslab+0x9/0x14 [ 255.098815][T10406] kmem_cache_alloc+0x2be/0x710 [ 255.098862][T10406] ? __save_stack_trace+0x8a/0xf0 [ 255.098885][T10406] __alloc_file+0x27/0x300 [ 255.127464][T10406] alloc_empty_file+0x72/0x170 [ 255.132249][T10406] path_openat+0xef/0x46e0 [ 255.136669][T10406] ? __lock_acquire+0x54b/0x4790 [ 255.141621][T10406] ? getname+0x1a/0x20 [ 255.145694][T10406] ? do_sys_open+0x2c9/0x5d0 [ 255.150286][T10406] ? __x64_sys_open+0x7e/0xc0 [ 255.154970][T10406] ? do_syscall_64+0x103/0x610 [ 255.159742][T10406] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 255.165822][T10406] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 255.171198][T10406] ? __lock_is_held+0xb6/0x140 [ 255.175971][T10406] ? __alloc_fd+0x430/0x530 [ 255.180478][T10406] do_filp_open+0x1a1/0x280 [ 255.184986][T10406] ? may_open_dev+0x100/0x100 [ 255.189672][T10406] ? lock_downgrade+0x880/0x880 [ 255.194534][T10406] ? kasan_check_read+0x11/0x20 [ 255.199390][T10406] ? do_raw_spin_unlock+0x57/0x270 [ 255.204506][T10406] ? _raw_spin_unlock+0x2d/0x50 [ 255.209364][T10406] ? __alloc_fd+0x430/0x530 [ 255.213879][T10406] do_sys_open+0x3fe/0x5d0 [ 255.218304][T10406] ? filp_open+0x80/0x80 [ 255.222560][T10406] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 255.228028][T10406] ? do_syscall_64+0x26/0x610 [ 255.232723][T10406] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 255.238794][T10406] ? do_syscall_64+0x26/0x610 [ 255.243476][T10406] __x64_sys_open+0x7e/0xc0 [ 255.247985][T10406] do_syscall_64+0x103/0x610 [ 255.252583][T10406] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 255.258475][T10406] RIP: 0033:0x411f21 [ 255.262380][T10406] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 255.271356][ T27] audit: type=1804 audit(1549468536.605:210): pid=10412 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir655175655/syzkaller.kubfQw/68/file0/file0" dev="sda1" ino=16890 res=1 [ 255.282001][T10406] RSP: 002b:00007fb398ecca80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 255.282016][T10406] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f21 [ 255.282026][T10406] RDX: 00007fb398eccafa RSI: 0000000000000002 RDI: 00007fb398eccaf0 [ 255.282035][T10406] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 255.282043][T10406] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 255.282066][T10406] R13: 0000000000000000 R14: 00000000004dba68 R15: 0000000000000004 15:55:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = fcntl$getown(r0, 0x9) ptrace$cont(0x1f, r1, 0x101, 0x2eb1) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace(0x4207, r3) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r3, 0x20000004, &(0x7f0000000100)={0x0}) [ 255.357697][ T27] audit: type=1800 audit(1549468536.645:211): pid=10416 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=16893 res=0 15:55:37 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000280)={0xfff, 0xffffffffffff2291, 0x8, 0x401, 0x2, 0x4, 0x10001, 0x2, 0x9110, 0x5}) accept4$unix(r0, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x400, 0x0) 15:55:37 executing program 2 (fault-call:2 fault-nth:8): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) [ 255.556964][ T27] audit: type=1804 audit(1549468536.655:212): pid=10416 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir371046656/syzkaller.8jSG1D/101/file0/file0" dev="sda1" ino=16893 res=1 [ 255.721217][T10441] FAULT_INJECTION: forcing a failure. [ 255.721217][T10441] name failslab, interval 1, probability 0, space 0, times 0 [ 255.760131][T10441] CPU: 1 PID: 10441 Comm: syz-executor2 Not tainted 5.0.0-rc5-next-20190206 #29 [ 255.769161][T10441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 255.779211][T10441] Call Trace: [ 255.782507][T10441] dump_stack+0x172/0x1f0 [ 255.786845][T10441] should_fail.cold+0xa/0x15 [ 255.791439][T10441] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 255.797246][T10441] ? lock_downgrade+0x880/0x880 [ 255.802115][T10441] ? ___might_sleep+0x163/0x280 [ 255.807003][T10441] __should_failslab+0x121/0x190 [ 255.811941][T10441] should_failslab+0x9/0x14 [ 255.816446][T10441] kmem_cache_alloc+0x2be/0x710 [ 255.821299][T10441] ? __save_stack_trace+0x8a/0xf0 [ 255.826330][T10441] __alloc_file+0x27/0x300 [ 255.830748][T10441] alloc_empty_file+0x72/0x170 [ 255.835510][T10441] path_openat+0xef/0x46e0 [ 255.839926][T10441] ? __lock_acquire+0x54b/0x4790 [ 255.844859][T10441] ? getname+0x1a/0x20 [ 255.848923][T10441] ? do_sys_open+0x2c9/0x5d0 [ 255.853507][T10441] ? __x64_sys_open+0x7e/0xc0 [ 255.858181][T10441] ? do_syscall_64+0x103/0x610 [ 255.862945][T10441] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 255.869021][T10441] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 255.874396][T10441] ? __lock_is_held+0xb6/0x140 [ 255.879167][T10441] ? __alloc_fd+0x430/0x530 [ 255.883683][T10441] do_filp_open+0x1a1/0x280 [ 255.888211][T10441] ? may_open_dev+0x100/0x100 [ 255.892907][T10441] ? lock_downgrade+0x880/0x880 [ 255.897758][T10441] ? kasan_check_read+0x11/0x20 [ 255.902608][T10441] ? do_raw_spin_unlock+0x57/0x270 [ 255.907722][T10441] ? _raw_spin_unlock+0x2d/0x50 [ 255.912576][T10441] ? __alloc_fd+0x430/0x530 [ 255.917132][T10441] do_sys_open+0x3fe/0x5d0 [ 255.921546][T10441] ? filp_open+0x80/0x80 [ 255.925793][T10441] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 255.931247][T10441] ? do_syscall_64+0x26/0x610 [ 255.935920][T10441] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 255.941984][T10441] ? do_syscall_64+0x26/0x610 [ 255.946662][T10441] __x64_sys_open+0x7e/0xc0 [ 255.951171][T10441] do_syscall_64+0x103/0x610 [ 255.955781][T10441] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 255.961666][T10441] RIP: 0033:0x411f21 [ 255.965557][T10441] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 255.985159][T10441] RSP: 002b:00007fb398ecca80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 255.993570][T10441] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f21 [ 256.001535][T10441] RDX: 00007fb398eccafa RSI: 0000000000000002 RDI: 00007fb398eccaf0 [ 256.009515][T10441] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 15:55:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f00000002c0)={'icmp6\x00'}, &(0x7f0000000300)=0x1e) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace(0x4207, r3) r4 = dup2(r0, r0) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x80000, 0x0) getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000000140)={@empty, @multicast2, 0x0}, &(0x7f0000000180)=0xc) r7 = getuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@remote, @in=@rand_addr=0x5, 0x4e21, 0x101, 0x4e24, 0x1, 0x2, 0x20, 0xa0, 0x2e, r6, r7}, {0x8, 0x4, 0x34ae, 0x8, 0x6, 0x4, 0x2}, {0x7, 0x8, 0x5}, 0x40, 0x0, 0x0, 0x1, 0x3, 0x3}, {{@in=@broadcast, 0x4d4, 0xff}, 0x2, @in6=@remote, 0x0, 0x3, 0x0, 0x81, 0x1, 0x1, 0x100000000}}, 0xe8) ioctl$GIO_CMAP(r5, 0x4b70, &(0x7f00000000c0)) ptrace$setregset(0x4209, r3, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:37 executing program 1: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) 15:55:37 executing program 0: r0 = socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)}], 0x1}, 0x0) 15:55:37 executing program 5: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0xffffffc1}], 0x0, 0x200) [ 256.017478][T10441] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 256.025447][T10441] R13: 0000000000000000 R14: 00000000004dba68 R15: 0000000000000004 15:55:37 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:37 executing program 2 (fault-call:2 fault-nth:9): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:55:37 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') ioctl$PIO_FONT(r0, 0x4b61, &(0x7f00000001c0)="6b6e6312651f239f1a20fb6cb64d83e4384cd5fd318a728dcacb2b35d68bf0c8f3d3117265255feb9bb74a10b50f75c7c8919d9a7ccee4a8e1105223ff01e385801db805d9cd91b45708c62fffd83c1e3a8d70569fa05ad016112e66bcaa72cf051e08a3d84bcb283b3fe654cced682d5cbf93d1fe994f73c905bf23ab15deb742") preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) 15:55:37 executing program 0: r0 = socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)}], 0x1}, 0x0) [ 256.246039][ T27] audit: type=1800 audit(1549468537.885:213): pid=10462 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16889 res=0 15:55:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff}) mmap(&(0x7f0000007000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x200, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f00000000c0)) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace(0x4207, r3) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r3, 0x20000004, &(0x7f0000000100)={0x0}) [ 256.314328][ T27] audit: type=1804 audit(1549468537.885:214): pid=10462 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir655175655/syzkaller.kubfQw/69/file0/file0" dev="sda1" ino=16889 res=1 [ 256.344731][T10466] FAULT_INJECTION: forcing a failure. [ 256.344731][T10466] name failslab, interval 1, probability 0, space 0, times 0 [ 256.411314][T10466] CPU: 1 PID: 10466 Comm: syz-executor2 Not tainted 5.0.0-rc5-next-20190206 #29 [ 256.420353][T10466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.430238][ T27] audit: type=1800 audit(1549468537.945:215): pid=10464 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=16890 res=0 [ 256.430412][T10466] Call Trace: [ 256.454006][T10466] dump_stack+0x172/0x1f0 15:55:38 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x80000001, 0x103200) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f0000000240)={&(0x7f0000ffd000/0x1000)=nil, 0x6, 0x7, 0xa1, &(0x7f0000ffd000/0x3000)=nil, 0x80}) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) getsockopt$inet6_tcp_int(r1, 0x6, 0x8, &(0x7f0000000000), &(0x7f00000001c0)=0x4) 15:55:38 executing program 0: r0 = socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)}], 0x1}, 0x0) [ 256.457695][ T27] audit: type=1804 audit(1549468537.945:216): pid=10464 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir371046656/syzkaller.8jSG1D/102/file0/file0" dev="sda1" ino=16890 res=1 [ 256.458375][T10466] should_fail.cold+0xa/0x15 [ 256.458395][T10466] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 256.458415][T10466] ? lock_downgrade+0x880/0x880 [ 256.498710][T10466] ? ___might_sleep+0x163/0x280 [ 256.503585][T10466] __should_failslab+0x121/0x190 [ 256.508520][T10466] should_failslab+0x9/0x14 [ 256.513007][T10466] kmem_cache_alloc+0x2be/0x710 [ 256.517854][T10466] ? __schedule+0x1387/0x1cc0 [ 256.522574][T10466] __kernfs_new_node+0xef/0x690 [ 256.527408][T10466] ? _raw_spin_unlock_irq+0x28/0x90 [ 256.532587][T10466] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 256.538038][T10466] ? __lock_acquire+0x54b/0x4790 [ 256.542990][T10466] ? _raw_spin_unlock_irq+0x5e/0x90 [ 256.548353][T10466] ? __schedule+0x1387/0x1cc0 [ 256.553020][T10466] kernfs_new_node+0x99/0x130 [ 256.557705][T10466] kernfs_create_dir_ns+0x52/0x160 [ 256.562853][T10466] internal_create_group+0x7f8/0xc40 [ 256.568147][T10466] ? bd_set_size+0x89/0xb0 [ 256.572569][T10466] ? remove_files.isra.0+0x190/0x190 [ 256.577859][T10466] sysfs_create_group+0x20/0x30 [ 256.582767][T10466] lo_ioctl+0xf8f/0x20d0 [ 256.586999][T10466] ? lo_rw_aio+0x1530/0x1530 [ 256.591621][T10466] blkdev_ioctl+0xee8/0x1c40 [ 256.596212][T10466] ? blkpg_ioctl+0xa90/0xa90 [ 256.600782][T10466] ? find_held_lock+0x35/0x130 [ 256.605573][T10466] ? debug_check_no_obj_freed+0x211/0x444 [ 256.611303][T10466] ? kasan_check_write+0x14/0x20 [ 256.616237][T10466] ? __fget+0x340/0x540 [ 256.620369][T10466] ? find_held_lock+0x35/0x130 [ 256.625129][T10466] ? __fget+0x340/0x540 [ 256.629263][T10466] block_ioctl+0xee/0x130 [ 256.633584][T10466] ? blkdev_fallocate+0x410/0x410 [ 256.638706][T10466] do_vfs_ioctl+0xd6e/0x1390 [ 256.643303][T10466] ? ioctl_preallocate+0x210/0x210 [ 256.648407][T10466] ? __fget+0x367/0x540 [ 256.652551][T10466] ? ksys_dup3+0x3e0/0x3e0 [ 256.656965][T10466] ? do_sys_open+0x31d/0x5d0 [ 256.661595][T10466] ? security_file_ioctl+0x93/0xc0 [ 256.666706][T10466] ksys_ioctl+0xab/0xd0 [ 256.670843][T10466] __x64_sys_ioctl+0x73/0xb0 [ 256.675421][T10466] do_syscall_64+0x103/0x610 [ 256.680150][T10466] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 256.686021][T10466] RIP: 0033:0x457ca7 [ 256.689907][T10466] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 256.709511][T10466] RSP: 002b:00007fb398ecca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 256.717930][T10466] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457ca7 [ 256.725893][T10466] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 256.733838][T10466] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 256.741786][T10466] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 256.749755][T10466] R13: 0000000000000000 R14: 00000000004dba68 R15: 0000000000000004 [ 256.806903][T10466] hfsplus: unable to find HFS+ superblock 15:55:38 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:38 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=0x0, &(0x7f00000001c0)=0x4) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000200)={r1, 0x4}, &(0x7f0000000240)=0x8) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) 15:55:38 executing program 1: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) 15:55:38 executing program 0: r0 = socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2400000003061f001cfffd946fa283002020", 0x12}], 0x1}, 0x0) 15:55:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x4, 0x46) ptrace(0x4207, r3) r4 = accept4(r0, &(0x7f0000000140)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000040)=0x80, 0x80000) ioctl$SIOCGETNODEID(r4, 0x89e1, &(0x7f00000000c0)={0x3}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r3, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:38 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x1, 0x0) getdents64(r0, &(0x7f0000000040)=""/28, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r1, &(0x7f0000000000), 0x36, 0x14) [ 257.205970][ T27] audit: type=1800 audit(1549468538.845:217): pid=10501 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16888 res=0 15:55:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:55:38 executing program 0: r0 = socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2400000003061f001cfffd946fa283002020", 0x12}], 0x1}, 0x0) 15:55:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x2, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r3, 0x4020565a, &(0x7f00000000c0)={0x8001009, 0x8001, 0x1}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:39 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x2, 0x3f, 0x5, 0x0, 0x4}) [ 257.407613][ T27] audit: type=1804 audit(1549468538.845:218): pid=10501 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir655175655/syzkaller.kubfQw/70/file0" dev="sda1" ino=16888 res=1 15:55:39 executing program 0: r0 = socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2400000003061f001cfffd946fa283002020", 0x12}], 0x1}, 0x0) [ 257.505048][T10521] hfsplus: unable to find HFS+ superblock 15:55:39 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f00000001c0)=@v2={0x2000000, [{0x3, 0x800}, {0x3, 0x7}]}, 0x14, 0x2) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) 15:55:39 executing program 0: r0 = socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2400000003061f001cfffd946fa2830020200a000300010006e700", 0x1b}], 0x1}, 0x0) 15:55:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) accept4$inet(r3, 0x0, &(0x7f00000000c0), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:39 executing program 1: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) 15:55:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='\nfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:55:39 executing program 5: exit(0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) 15:55:39 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:39 executing program 0: r0 = socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2400000003061f001cfffd946fa2830020200a000300010006e700", 0x1b}], 0x1}, 0x0) 15:55:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)=0x0) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace(0x4217, r3) openat$vicodec1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video37\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r3, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:39 executing program 0: r0 = socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2400000003061f001cfffd946fa2830020200a000300010006e700", 0x1b}], 0x1}, 0x0) 15:55:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='%fsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:55:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x44400, 0x0) r1 = inotify_init1(0x0) r2 = getpgrp(0xffffffffffffffff) fcntl$setown(r0, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace(0x4207, r3) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r3, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:40 executing program 0: r0 = socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2400000003061f001cfffd946fa2830020200a000300010006e700000000a3a2", 0x20}], 0x1}, 0x0) 15:55:40 executing program 0: r0 = socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2400000003061f001cfffd946fa2830020200a000300010006e700000000a3a2", 0x20}], 0x1}, 0x0) 15:55:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) getpeername(r0, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000040)=0x80) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='h\nsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:55:40 executing program 0: r0 = socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2400000003061f001cfffd946fa2830020200a000300010006e700000000a3a2", 0x20}], 0x1}, 0x0) 15:55:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4209, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) r3 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0xe4b, 0x200) ioctl$TIOCSPGRP(r3, 0x5410, &(0x7f0000000080)=r2) 15:55:40 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:40 executing program 5: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000000)={0x0, 0x0}) r1 = syz_open_procfs(r0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000bc0)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000c00)={r2, 0x80000, r1}) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, &(0x7f0000000240)) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f0000000200)={0x3, [0x0, 0x0, 0x0]}) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r1) fsetxattr$trusted_overlay_upper(r1, &(0x7f00000002c0)='trusted.overlay.upper\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="00fb7006041e45847907dd1046b0b598d224bf6ca85f06a5161af3ff5f9a67234769eb0b761c203fd5e493b25d39a72383a76f72bdd8127ead913e6b84125e650d5a8cdcbc2a40d6415d1f67077597bbe2d00b56ac5681b8e8a297010dd8509188ed0f016d7c20d8633278d6610c7f2c"], 0x70, 0x2) fstat(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_xen(&(0x7f0000000900)='dont_hash', &(0x7f0000000ac0)='.\x00', &(0x7f0000000b00)='9p\x00', 0x84, &(0x7f0000000b40)={'trans=xen,', {[{@mmap='mmap'}, {@dfltgid={'dfltgid', 0x3d, r5}}], [{@uid_gt={'uid>', r4}}, {@euid_eq={'euid', 0x3d, r3}}, {@euid_eq={'euid', 0x3d, r4}}]}}) syz_mount_image$ntfs(&(0x7f0000000500)='ntfs\x00', &(0x7f0000000540)='./file0\x00', 0x20, 0x4, &(0x7f0000000800)=[{&(0x7f0000000580)="9eeb6a2cf91d7cf018ab884ef7a46fbbe88b7b4a1c36ffaaec8e60fec20987b0407240938d61716ac0aed0951cfccd3b021522e542e4dc", 0x37, 0x280000000000}, {&(0x7f00000005c0)="f1815ad6fc3cf68df954dd344da865735120167b334008aff214e50517bd155dd8081220627f77f27cb2ae2c39f3345b9cd7e2f46356d187f8b6dcdb68a34969a4af8bb7b09acfae7706ee2ba5674d8419b274f5504efd12c737ae69c09a72efff0995679b53c2d3de0b5f7ed4234e4fb1d735fd53a7cc6492994ba5a13323f4ae18ebd2120977dfd0b3bc53ea61fb4a34f6e5248ebe12", 0x97, 0xe6ab}, {&(0x7f0000000680)="00657f6fb95700c719849406e6fd4f7540774f42c77224b4acc81f47fe6364bb9334ebf456c88debde9d76e76405cb22113b200c591edf7b6723faeab5c71227fa071aabbdc00312d855202a9bc8d7bb92a7d8ad0ca17a3dab5b0c98f54970803de6ca558d3d4a9ce81dd307199840518800ec162ff6ec89b0789c71efcf5f5c96329c7315ed42a4721fac3a41bdcc4ac5eb32e12c0830", 0x97}, {&(0x7f0000000740)="e779930c3439982fa65fbe527223851974fa5be138698272467913c67c37ef3a941a1ff01529b1308b9e98bbe9ece434e577146fc6d9ab000de40797dec10c07664594770adb714c0c27b790291b3a0104f5811578c3e72bb1d6649fae1d0ec98dbe6275b07380c2cc6c8a25aa5e06bc620c5f694e2aaee7a2bec9751438da4e75257a6b990970ccead3a6a33a39853a15580f910a6b257e02713d49148f47ffd02b929f3b71e02991cd78", 0xab, 0xfffffffffffffe00}], 0x400, &(0x7f0000000a00)={[{@umask={'umask'}}, {@utf8='utf8'}, {@uid={'uid', 0x3d, r3}}], [{@euid_lt={'euid<', r4}}, {@pcr={'pcr', 0x3d, 0x1c}}, {@dont_hash='dont_hash'}, {@dont_appraise='dont_appraise'}, {@pcr={'pcr', 0x3d, 0xd}}]}) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f00000004c0)='IPVS\x00', 0x5) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2202000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x40, r6, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x101}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) syz_open_dev$dspn(&(0x7f0000000280)='/dev/dsp#\x00', 0xcd, 0x800) 15:55:40 executing program 1: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) 15:55:40 executing program 0: r0 = socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2400000003061f001cfffd946fa2830020200a000300010006e700000000a3a20404", 0x22}], 0x1}, 0x0) [ 259.022467][T10624] 9pnet: Could not find request transport: xen 15:55:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) socket$kcm(0x29, 0x2, 0x0) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) [ 259.167946][T10641] 9pnet: Could not find request transport: xen 15:55:40 executing program 0: r0 = socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2400000003061f001cfffd946fa2830020200a000300010006e700000000a3a20404", 0x22}], 0x1}, 0x0) 15:55:40 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/123, 0x7b}], 0x1, 0x200) 15:55:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='h%splus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:55:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x60100, 0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:41 executing program 0: r0 = socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2400000003061f001cfffd946fa2830020200a000300010006e700000000a3a20404", 0x22}], 0x1}, 0x0) 15:55:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(r0, &(0x7f00000000c0), 0x0, 0x200) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e20, @multicast1}}, 0x7f, 0x5, 0x81, 0x1, 0xa0}, 0x98) 15:55:41 executing program 0: r0 = socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2400000003061f001cfffd946fa2830020200a000300010006e700000000a3a20404ff", 0x23}], 0x1}, 0x0) 15:55:41 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:41 executing program 5: recvmmsg(0xffffffffffffff9c, &(0x7f0000007840)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000440)=""/41, 0x29}], 0x1, &(0x7f00000004c0)=""/100, 0x64}, 0x55f7e7ee}, {{&(0x7f0000000540)=@pppoe, 0x80, &(0x7f00000016c0)=[{&(0x7f00000005c0)=""/103, 0x67}, {&(0x7f0000000640)=""/43, 0x2b}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000001680)=""/46, 0x2e}], 0x4}, 0x80000001}, {{&(0x7f0000001700)=@alg, 0x80, &(0x7f0000002a00)=[{&(0x7f0000001780)=""/224, 0xe0}, {&(0x7f0000001880)=""/4096, 0x1000}, {&(0x7f0000002880)=""/73, 0x49}, {&(0x7f0000002900)=""/199, 0xc7}], 0x4, &(0x7f0000002a40)=""/109, 0x6d}, 0x40}, {{&(0x7f0000002ac0)=@tipc=@id, 0x80, &(0x7f0000004c40)=[{&(0x7f0000002b40)=""/4096, 0x1000}, {&(0x7f0000003b40)}, {&(0x7f0000003b80)=""/4096, 0x1000}, {&(0x7f0000004b80)=""/49, 0x31}, {&(0x7f0000004bc0)=""/109, 0x6d}], 0x5, &(0x7f0000004cc0)=""/111, 0x6f}, 0x1}, {{&(0x7f0000004d40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000004e80)=[{&(0x7f0000004dc0)=""/156, 0x9c}], 0x1, &(0x7f0000004ec0)=""/118, 0x76}, 0x1f}, {{&(0x7f0000004f40)=@l2, 0x80, &(0x7f00000050c0)=[{&(0x7f0000004fc0)=""/223, 0xdf}], 0x1, &(0x7f0000005100)=""/4096, 0x1000}, 0x6c72c053}, {{&(0x7f0000006100)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000006440)=[{&(0x7f0000006180)=""/250, 0xfa}, {&(0x7f0000006280)=""/230, 0xe6}, {&(0x7f0000006380)=""/166, 0xa6}], 0x3, &(0x7f0000006480)=""/4096, 0x1000}, 0x10001}, {{&(0x7f0000007480)=@in6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f00000077c0)=[{&(0x7f0000007500)=""/205, 0xcd}, {&(0x7f0000007600)=""/134, 0x86}, {&(0x7f00000076c0)=""/236, 0xec}], 0x3, &(0x7f0000007800)=""/60, 0x3c}, 0xa278}], 0x8, 0x0, &(0x7f0000007a40)={0x0, 0x1c9c380}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007a80)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@empty}}, &(0x7f0000007b80)=0xe8) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, 0x0}, 0x0) r5 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, 0x0, 0x0) r6 = syz_open_dev$swradio(0x0, 0x1, 0x2) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x1d) mount(0x0, &(0x7f0000000c40)='./file0\x00', &(0x7f00000001c0)='configfs\x00', 0x0, 0x0) r8 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000340)={'rose0\x00', r1}) setsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f00000003c0)={@remote, @dev={0xac, 0x14, 0x14, 0x12}, r9}, 0xc) accept$ax25(r6, &(0x7f0000000500)={{0x3, @bcast}, [@null, @netrom, @null, @remote, @netrom, @bcast, @netrom, @null]}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') recvfrom$rxrpc(r5, &(0x7f0000007cc0)=""/162, 0xa2, 0x1, &(0x7f0000007d80)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e24, 0x80000000, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x24) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, 0x0, 0x20000000) getdents64(r8, &(0x7f0000000100)=""/186, 0x4a9e280) preadv(r3, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) fchdir(r3) ioctl$BLKBSZGET(r3, 0x80081270, &(0x7f0000000000)) ioctl$KVM_DIRTY_TLB(r6, 0x4010aeaa, &(0x7f0000003b40)={0x8001, 0x2}) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000007bc0)={{{@in6=@local, @in6=@local, 0x4e21, 0x3, 0x4e21, 0xf76b, 0x2, 0x80, 0x20, 0x3f, r9, r2}, {0x1f, 0x8, 0x1, 0x0, 0x200, 0x8001, 0x3}, {0x3, 0xfffffffffffffffe, 0x800, 0x401}, 0xfffffffffffffffe, 0x6e6bb0, 0x0, 0x0, 0x0, 0x1}, {{@in=@local, 0x4d5, 0x6f}, 0xa, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xd}}, 0x3505, 0x6, 0x3, 0xfff, 0x8, 0xabc4, 0x2}}, 0xe8) preadv(r3, &(0x7f0000000400)=[{&(0x7f00000001c0)=""/220, 0xdc}, {&(0x7f00000002c0)=""/18, 0x12}, {&(0x7f0000000300)=""/55, 0x37}, {&(0x7f0000000340)=""/164, 0xa4}], 0x4, 0x0) 15:55:41 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x4000, 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xb3, 0x1, 0x0, 0x4, 0x2, 0x3, 0xda6b, 0x23c, 0x40, 0x3a8, 0xff, 0x1, 0x38, 0x1, 0x8, 0x401, 0x8}, [{0x6474e551, 0xffff, 0x20e, 0x7fffffff, 0x8001, 0x117, 0xfffffffffffffffb, 0xffffffff}], "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", [[], [], [], [], [], [], []]}, 0x1778) socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x200, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r3, 0x80045500, &(0x7f00000000c0)) r4 = inotify_init1(0x0) syz_open_dev$sndmidi(&(0x7f0000001980)='/dev/snd/midiC#D#\x00', 0xc4e, 0x13b480) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r5, 0x0, 0x0) ptrace(0x4207, r5) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001900)=@assoc_value, &(0x7f0000001940)=0x8) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r5, 0x20000004, &(0x7f0000000100)={0x0}) dup3(r1, r3, 0x80000) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r0, 0x800455d1, &(0x7f00000019c0)) 15:55:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='h.splus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:55:41 executing program 0: r0 = socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2400000003061f001cfffd946fa2830020200a000300010006e700000000a3a20404ff", 0x23}], 0x1}, 0x0) 15:55:41 executing program 1: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) 15:55:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') r1 = semget$private(0x0, 0x3, 0x300) semctl$GETZCNT(r1, 0x2, 0xf, &(0x7f0000000280)=""/72) semctl$GETZCNT(r1, 0x2, 0xf, &(0x7f00000001c0)=""/148) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) 15:55:41 executing program 0: r0 = socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2400000003061f001cfffd946fa2830020200a000300010006e700000000a3a20404ff", 0x23}], 0x1}, 0x0) [ 260.072894][ T27] kauditd_printk_skb: 17 callbacks suppressed [ 260.072907][ T27] audit: type=1800 audit(1549468541.695:229): pid=10700 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="loop4" ino=29 res=0 15:55:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x400000, 0x0) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f00000001c0)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_GEM_CLOSE(r1, 0x40086409, &(0x7f0000000200)={r2}) 15:55:42 executing program 0: recvmmsg(0xffffffffffffff9c, &(0x7f0000007840)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000440)=""/41, 0x29}], 0x1, &(0x7f00000004c0)=""/100, 0x64}, 0x55f7e7ee}, {{&(0x7f0000000540)=@pppoe, 0x80, &(0x7f00000016c0)=[{&(0x7f00000005c0)=""/103, 0x67}, {&(0x7f0000000640)=""/43, 0x2b}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000001680)=""/46, 0x2e}], 0x4}, 0x80000001}, {{&(0x7f0000001700)=@alg, 0x80, &(0x7f0000002a00)=[{&(0x7f0000001780)=""/224, 0xe0}, {&(0x7f0000001880)=""/4096, 0x1000}, {&(0x7f0000002880)=""/73, 0x49}, {&(0x7f0000002900)=""/199, 0xc7}], 0x4, &(0x7f0000002a40)=""/109, 0x6d}, 0x40}, {{&(0x7f0000002ac0)=@tipc=@id, 0x80, &(0x7f0000004c40)=[{&(0x7f0000002b40)=""/4096, 0x1000}, {&(0x7f0000003b40)}, {&(0x7f0000003b80)=""/4096, 0x1000}, {&(0x7f0000004b80)=""/49, 0x31}, {&(0x7f0000004bc0)=""/109, 0x6d}], 0x5, &(0x7f0000004cc0)=""/111, 0x6f}, 0x1}, {{&(0x7f0000004d40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000004e80)=[{&(0x7f0000004dc0)=""/156, 0x9c}], 0x1, &(0x7f0000004ec0)=""/118, 0x76}, 0x1f}, {{&(0x7f0000004f40)=@l2, 0x80, &(0x7f00000050c0)=[{&(0x7f0000004fc0)=""/223, 0xdf}], 0x1, &(0x7f0000005100)=""/4096, 0x1000}, 0x6c72c053}, {{&(0x7f0000006100)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000006440)=[{&(0x7f0000006180)=""/250, 0xfa}, {&(0x7f0000006280)=""/230, 0xe6}, {&(0x7f0000006380)=""/166, 0xa6}], 0x3, &(0x7f0000006480)=""/4096, 0x1000}, 0x10001}, {{&(0x7f0000007480)=@in6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f00000077c0)=[{&(0x7f0000007500)=""/205, 0xcd}, {&(0x7f0000007600)=""/134, 0x86}, {&(0x7f00000076c0)=""/236, 0xec}], 0x3, &(0x7f0000007800)=""/60, 0x3c}, 0xa278}], 0x8, 0x0, &(0x7f0000007a40)={0x0, 0x1c9c380}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007a80)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@empty}}, &(0x7f0000007b80)=0xe8) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, 0x0}, 0x0) r5 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, 0x0, 0x0) r6 = syz_open_dev$swradio(0x0, 0x1, 0x2) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x1d) mount(0x0, &(0x7f0000000c40)='./file0\x00', &(0x7f00000001c0)='configfs\x00', 0x0, 0x0) r8 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000340)={'rose0\x00', r1}) setsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f00000003c0)={@remote, @dev={0xac, 0x14, 0x14, 0x12}, r9}, 0xc) accept$ax25(r6, &(0x7f0000000500)={{0x3, @bcast}, [@null, @netrom, @null, @remote, @netrom, @bcast, @netrom, @null]}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') recvfrom$rxrpc(r5, &(0x7f0000007cc0)=""/162, 0xa2, 0x1, &(0x7f0000007d80)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e24, 0x80000000, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x24) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, 0x0, 0x20000000) getdents64(r8, &(0x7f0000000100)=""/186, 0x4a9e280) preadv(r3, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) fchdir(r3) ioctl$BLKBSZGET(r3, 0x80081270, &(0x7f0000000000)) ioctl$KVM_DIRTY_TLB(r6, 0x4010aeaa, &(0x7f0000003b40)={0x8001, 0x2}) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000007bc0)={{{@in6=@local, @in6=@local, 0x4e21, 0x3, 0x4e21, 0xf76b, 0x2, 0x80, 0x20, 0x3f, r9, r2}, {0x1f, 0x8, 0x1, 0x0, 0x200, 0x8001, 0x3}, {0x3, 0xfffffffffffffffe, 0x800, 0x401}, 0xfffffffffffffffe, 0x6e6bb0, 0x0, 0x0, 0x0, 0x1}, {{@in=@local, 0x4d5, 0x6f}, 0xa, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xd}}, 0x3505, 0x6, 0x3, 0xfff, 0x8, 0xabc4, 0x2}}, 0xe8) preadv(r3, &(0x7f0000000400)=[{&(0x7f00000001c0)=""/220, 0xdc}, {&(0x7f00000002c0)=""/18, 0x12}, {&(0x7f0000000300)=""/55, 0x37}, {&(0x7f0000000340)=""/164, 0xa4}], 0x4, 0x0) 15:55:42 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) [ 260.422100][ T27] audit: type=1804 audit(1549468541.745:230): pid=10700 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir655175655/syzkaller.kubfQw/73/file0/file0" dev="loop4" ino=29 res=1 15:55:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) getpgrp(0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f00000000c0)='yam0\x00\x01\x17\x8b\x00'}, 0x30) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000180)=0x0) fcntl$setown(r0, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace(0x4207, r3) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r3, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:42 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) [ 260.655014][ T27] audit: type=1800 audit(1549468541.765:231): pid=10717 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=16871 res=0 15:55:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='h/splus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) [ 260.706940][ T27] audit: type=1804 audit(1549468541.775:232): pid=10717 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir371046656/syzkaller.8jSG1D/106/file0" dev="sda1" ino=16871 res=1 15:55:42 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x84400, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000640)={0xfff}, 0x1) clock_gettime(0x0, &(0x7f0000000780)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f00000007c0)={0x7, 0x0, 0x4, 0x80400020, {r1, r2/1000+30000}, {0x5, 0x8, 0x2, 0x1, 0xfffffffffffffffc, 0xfffffffffffffffd, "97632b51"}, 0x3, 0x7, @offset=0x9, 0x4}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r3, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f0000000680)={0x200, "4dc6cc6005a76aba51e4404b5077bb9c2fed8010d63f6b90ef08d2fa1340844a", 0x7, 0x808, 0xaf7a, 0x100000000, 0x4, 0x4, 0x6, 0x1f6}) ioctl$KVM_GET_DEVICE_ATTR(r0, 0x4018aee2, &(0x7f0000000580)={0x0, 0x9, 0x99, &(0x7f0000000540)=0x7}) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x0) preadv(r3, &(0x7f00000005c0)=[{&(0x7f00000001c0)=""/246, 0x2f}, {&(0x7f00000002c0)=""/150, 0x96}, {&(0x7f0000000380)=""/67, 0x43}, {&(0x7f0000000400)=""/79, 0x4f}, {&(0x7f0000000480)=""/166, 0xa6}, {&(0x7f0000000700)=""/101, 0x65}], 0x6, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) 15:55:42 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x141000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ipx\x00') ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000140)=r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x1011, r2, 0x4) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r4, 0x0, 0x0) ptrace(0x4207, r4) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r4, 0x20000004, &(0x7f0000000100)={0x0}) [ 260.761799][ T27] audit: type=1800 audit(1549468542.355:233): pid=10753 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16922 res=0 15:55:42 executing program 1: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) 15:55:42 executing program 0: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) [ 260.943065][ T27] audit: type=1804 audit(1549468542.365:234): pid=10753 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir655175655/syzkaller.kubfQw/74/file0" dev="sda1" ino=16922 res=1 15:55:42 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000000)) tee(r0, r0, 0x1, 0xe) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f00000001c0)=0x5, 0x4) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x4000, 0x0) ioctl$KVM_GET_CLOCK(r0, 0x8030ae7c, &(0x7f0000000200)) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) [ 261.117457][ T27] audit: type=1800 audit(1549468542.675:235): pid=10771 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=16753 res=0 15:55:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hf\nplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:55:42 executing program 5: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x80) accept$packet(0xffffffffffffffff, &(0x7f0000001ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b00)=0x14) lstat(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001c00)={{{@in=@dev={0xac, 0x14, 0x14, 0x1d}, @in=@broadcast, 0x4e22, 0x6, 0x4e20, 0x7, 0xa, 0xa0, 0x80, 0x0, r1, r2}, {0x4, 0x3f, 0xfffffffffffffffd, 0x61b81c12, 0x100000000000000, 0x2, 0x8, 0x1548}, {0x8, 0x5, 0x6, 0x9}, 0x81, 0x6e6bb3, 0x3, 0x0, 0x2, 0x2}, {{@in=@broadcast, 0x4d2, 0xff}, 0x0, @in6=@remote, 0x3507, 0x0, 0x2, 0x5, 0xf9, 0x1, 0x4e2d}}, 0xe8) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') fcntl$notify(r3, 0x402, 0x2) preadv(r3, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000240)={r4, &(0x7f00000001c0)=""/125}) [ 261.261604][ T27] audit: type=1804 audit(1549468542.675:236): pid=10771 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir371046656/syzkaller.8jSG1D/107/file0" dev="sda1" ino=16753 res=1 [ 261.340946][ T27] audit: type=1800 audit(1549468542.935:237): pid=10789 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16641 res=0 15:55:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x13, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000040)) 15:55:43 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) [ 261.588171][ T27] audit: type=1804 audit(1549468542.945:238): pid=10789 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir508517115/syzkaller.ATZLJl/122/file0" dev="sda1" ino=16641 res=1 15:55:43 executing program 5: clock_adjtime(0x7, &(0x7f00000001c0)={0x1, 0x2, 0x5, 0x9, 0xfff, 0x3, 0x5, 0x7, 0x9, 0x2, 0x7fff, 0x0, 0x6, 0x7, 0x1, 0x4, 0x1, 0x0, 0xfffffffffffffffe, 0x7fffffff, 0x5, 0x2, 0x8000, 0x1, 0x4d, 0xd}) prctl$PR_SET_TSC(0x1a, 0x1) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) 15:55:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x4000, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r3, 0x89e8) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:43 executing program 1: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) 15:55:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hf#plus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:55:43 executing program 5: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000100)='net/connector\x00') preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) 15:55:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) r3 = socket$bt_hidp(0x1f, 0x3, 0x6) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x7fffffff, 0x80000) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000040), &(0x7f00000000c0)=0x4) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:43 executing program 0: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:43 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x100000000000004c, 0x200) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, &(0x7f00000003c0), &(0x7f0000000440)=0x60) syz_read_part_table(0xff, 0x2, &(0x7f0000000380)=[{&(0x7f0000000300)="fbaf6a7bcc00e1b514a5ae5a", 0xc}, {&(0x7f0000000340)="2d986f29fe14101f001381fd7a2a26bb85d330a3813de8e8f0a5e188c50b1976868c070d8ae00c8bb818fe091b1bba2d20d34aaec13827", 0x37, 0x1fffffffc0000000}]) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, &(0x7f0000000240), &(0x7f00000002c0)=0x60) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, &(0x7f00000001c0), &(0x7f0000000000)=0x60) 15:55:43 executing program 1: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) 15:55:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x9, 0x11, r0, 0x8000000000000000) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='yam0\x00\x01\x17\x8b\x00') r1 = inotify_init1(0x80800) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x200000, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) setsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f00000000c0)=0x7, 0x4) ptrace$setregset(0x4209, r2, 0x3, &(0x7f0000000100)={0x0}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r4, 0x408c5333, &(0x7f0000000180)={0x100000001, 0x66, 0x1, 'queue0\x00', 0xffff}) 15:55:44 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hf%plus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) [ 262.520349][T10855] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 15:55:44 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)) r0 = getpgrp(0x0) r1 = syz_open_procfs(r0, &(0x7f00000002c0)='\xc0\xa84\xfd\xff\x8a\xabp\xe1-j\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe2\xcd\xca\x17\x8bWE\xea\xf4\xd3m\xc7J_') preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) 15:55:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x80000) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x71) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x80000, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000200), 0x4) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) accept4(r0, &(0x7f0000000140)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000040)=0x80, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r0}) setsockopt$TIPC_MCAST_BROADCAST(r4, 0x10f, 0x85) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) sched_getscheduler(r2) 15:55:44 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000080)=0x54) preadv(r0, &(0x7f0000000000), 0x0, 0x1fe) 15:55:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:44 executing program 1: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) 15:55:44 executing program 0: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:44 executing program 5: syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') 15:55:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x40000080007fffd) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x103002) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:45 executing program 5: r0 = accept$unix(0xffffffffffffff9c, &(0x7f0000000400), &(0x7f0000000480)=0x6e) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000004c0)={'hsr0\x00', {0x2, 0x4e22, @empty}}) r1 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x401, 0x100) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x48, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x2, @dev={0xfe, 0x80, [], 0xb}, 0x2}, @in6={0xa, 0x4e20, 0x1, @dev={0xfe, 0x80, [], 0x2a}, 0x6}, @in={0x2, 0x4e20, @broadcast}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000380)={r3, 0xc3}, &(0x7f00000003c0)=0x8) ioctl$TIOCGPTPEER(r2, 0x5441, 0x9) vmsplice(r1, &(0x7f0000000280)=[{&(0x7f0000000240)="dca898c3093a5dea949d49c43c3cb58d50c0676fddc2b5be2ce6cc78560812e12a079e02837920b62dc1ad806e273db27225a5e4c90b0c4e8bc9254f6d3f", 0x3e}], 0x1, 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) 15:55:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hf*plus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:55:45 executing program 4: geteuid() r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@bcast, @rose, @default, @netrom, @default, @rose, @rose, @netrom]}, 0x48) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) 15:55:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) lseek(r1, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) r3 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x8640) setsockopt$TIPC_MCAST_BROADCAST(r3, 0x10f, 0x85) 15:55:45 executing program 5: r0 = getpgrp(0xffffffffffffffff) syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x2, 0x101000) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r1, 0x4010641a, &(0x7f0000000280)={0x7, &(0x7f0000000180)=[0x100000000, 0x80, 0x100, 0x100, 0x0, 0x2, 0x6]}) r2 = syz_open_procfs(r0, &(0x7f00000001c0)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r2, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x2a4002, 0x0) 15:55:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) r3 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(r3, 0xc02c563a, &(0x7f00000000c0)={0x0, {0x40, 0x0, 0x8, 0x8}, {0xfffffffffffffffa, 0x0, 0x79e, 0x37d}, {0x5}}) fcntl$setstatus(r0, 0x4, 0x0) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={0x0}) 15:55:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$hfsplus(&(0x7f00000002c0)='hf+plus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@creator={'creator', 0x3d, "7e6cf2eb"}}, {@force='force'}]}) 15:55:45 executing program 1: geteuid() syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080), 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000400)="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", 0x200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r1, r2, 0x0, 0x10000) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') accept$packet(r3, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00), 0x80000) 15:55:45 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00\xaa\x98\xf2b\xccr\x03\xbb\x80\xdb\\\xbbb*\xda_\xa8w\xb2\xceU9\xcb\xce\xcb\xa0s\x06\x0e\xad\xf2B\xdfi \xaf\xea;\xc1\xd3\xb1O\x8a\xdd\xfa\xbf\xe2i\xf1\xe3\x80\xb6$\xb2\xc7\x10h\xc9\xc4J\xae[\x1f_\xaa7\x05vu^\x18N\xa5\x84\xd9\x16\xda!\xee\xb3\xc1DP\xf2\x80\x17\xc8\xc3\xed\x02\xf5\xa8\xe1\x97ie\xba\xf6\x1bub\x1b^SN\xd0\x15\xad\x9eX\xefd;J\xadP\xe7\xdb\t') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/123, 0x7b}], 0x1, 0x200) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='cubic\x00', 0x6) 15:55:45 executing program 0: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000700], 0x0, &(0x7f0000000080), &(0x7f0000000700)=ANY=[]}, 0x78) write(r1, &(0x7f00000001c0), 0xfffffef3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) unlinkat(r0, 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$RTC_AIE_ON(r3, 0x7001) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f00)={{{@in=@remote, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000001180)) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffda9, 0x4004090, 0x0, 0xfffffdb6) r4 = accept4$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14, 0x80000) clock_gettime(0x7, &(0x7f0000001240)={0x0, 0x0}) syz_genetlink_get_family_id$ipvs(0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000340)={0x0, @empty, @initdev}, &(0x7f0000000380)=0xc) recvmmsg(r2, &(0x7f0000002940)=[{{&(0x7f00000011c0)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000001280)=""/112, 0x70}}, {{0x0, 0x0, &(0x7f0000002840), 0x0, &(0x7f00000028c0)=""/87, 0xffffffffffffff4f}}], 0x45483d5a560d7693, 0x0, &(0x7f0000002a80)={0x0, r5+30000000}) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r6, 0x300, 0x0, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x40081}, 0x4000000) fcntl$notify(r4, 0x402, 0x80000010) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000400)=0x8) prlimit64(0x0, 0xf, &(0x7f00000001c0)={0x5}, 0x0) [ 264.313712][T10977] WARNING: CPU: 1 PID: 10977 at drivers/media/platform/vicodec/vicodec-core.c:151 get_q_data+0x53/0x80 [ 264.324865][T10977] Kernel panic - not syncing: panic_on_warn set ... [ 264.331439][T10977] CPU: 1 PID: 10977 Comm: syz-executor3 Not tainted 5.0.0-rc5-next-20190206 #29 [ 264.340433][T10977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.350468][T10977] Call Trace: [ 264.353736][T10977] dump_stack+0x172/0x1f0 [ 264.358068][T10977] ? vidioc_try_fmt_vid_cap+0x7d0/0x810 [ 264.363736][T10977] panic+0x2cb/0x65c [ 264.367631][T10977] ? __warn_printk+0xf3/0xf3 [ 264.372236][T10977] ? get_q_data+0x53/0x80 [ 264.376564][T10977] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 264.382802][T10977] ? __warn.cold+0x5/0x45 [ 264.387130][T10977] ? get_q_data+0x53/0x80 [ 264.391465][T10977] __warn.cold+0x20/0x45 [ 264.395701][T10977] ? get_q_data+0x53/0x80 [ 264.400039][T10977] report_bug+0x263/0x2b0 [ 264.404435][T10977] do_error_trap+0x11b/0x200 [ 264.409081][T10977] do_invalid_op+0x37/0x50 [ 264.413490][T10977] ? get_q_data+0x53/0x80 [ 264.417819][T10977] invalid_op+0x14/0x20 [ 264.421966][T10977] RIP: 0010:get_q_data+0x53/0x80 [ 264.426898][T10977] Code: 74 3a 83 fb 02 75 1e e8 2b 62 b7 fc 49 81 c4 70 02 00 00 e8 1f 62 b7 fc 4c 89 e0 5b 41 5c 5d c3 83 fb 0a 74 e2 e8 0d 62 b7 fc <0f> 0b e8 06 62 b7 fc 45 31 e4 5b 4c 89 e0 41 5c 5d c3 e8 f6 61 b7 [ 264.446492][T10977] RSP: 0018:ffff88808b73f8f0 EFLAGS: 00010216 [ 264.452548][T10977] RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc90005b67000 [ 264.460523][T10977] RDX: 0000000000000094 RSI: ffffffff84b89793 RDI: 0000000000000005 [ 264.468485][T10977] RBP: ffff88808b73f900 R08: ffff8880537f45c0 R09: ffffed101372cb32 [ 264.476463][T10977] R10: ffff88808b73fa40 R11: ffff88809b96598f R12: ffff8880a56964c0 [ 264.484427][T10977] R13: ffffffff87e20fc0 R14: 0000000000000002 R15: ffff8880a56964c0 [ 264.492402][T10977] ? get_q_data+0x53/0x80 [ 264.496750][T10977] vidioc_g_selection+0xb0/0x530 [ 264.501743][T10977] v4l_cropcap+0x39c/0x7b0 [ 264.506206][T10977] ? v4l_g_crop+0x380/0x380 [ 264.510718][T10977] __video_do_ioctl+0x7f1/0xce0 [ 264.515576][T10977] ? v4l_s_fmt+0xb40/0xb40 [ 264.519997][T10977] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 264.526235][T10977] video_usercopy+0x4c5/0x10d0 [ 264.531001][T10977] ? v4l_s_fmt+0xb40/0xb40 [ 264.535445][T10977] ? v4l_enumstd+0x70/0x70 [ 264.539897][T10977] ? __might_fault+0x12b/0x1e0 [ 264.544661][T10977] ? __fget+0x340/0x540 [ 264.549114][T10977] ? video_usercopy+0x10d0/0x10d0 [ 264.554137][T10977] video_ioctl2+0x2d/0x35 [ 264.558475][T10977] v4l2_ioctl+0x156/0x1b0 [ 264.562813][T10977] ? video_devdata+0xa0/0xa0 [ 264.567403][T10977] do_vfs_ioctl+0xd6e/0x1390 [ 264.572019][T10977] ? ioctl_preallocate+0x210/0x210 [ 264.577163][T10977] ? __fget+0x367/0x540 [ 264.581317][T10977] ? ksys_dup3+0x3e0/0x3e0 [ 264.585755][T10977] ? nsecs_to_jiffies+0x30/0x30 [ 264.590615][T10977] ? security_file_ioctl+0x93/0xc0 [ 264.595726][T10977] ksys_ioctl+0xab/0xd0 [ 264.599882][T10977] __x64_sys_ioctl+0x73/0xb0 [ 264.604497][T10977] do_syscall_64+0x103/0x610 [ 264.609097][T10977] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.614979][T10977] RIP: 0033:0x457e39 [ 264.618868][T10977] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 264.638461][T10977] RSP: 002b:00007efd334b4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 264.646865][T10977] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e39 [ 264.655318][T10977] RDX: 00000000200000c0 RSI: 00000000c02c563a RDI: 0000000000000006 [ 264.663281][T10977] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 264.671246][T10977] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efd334b56d4 [ 264.679213][T10977] R13: 00000000004c2842 R14: 00000000004d5180 R15: 00000000ffffffff [ 264.688288][T10977] Kernel Offset: disabled [ 264.692657][T10977] Rebooting in 86400 seconds..