[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 58.065500][ T26] audit: type=1800 audit(1567735247.782:25): pid=8468 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 58.107150][ T26] audit: type=1800 audit(1567735247.792:26): pid=8468 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 58.142336][ T26] audit: type=1800 audit(1567735247.792:27): pid=8468 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.156' (ECDSA) to the list of known hosts. 2019/09/06 02:00:57 fuzzer started 2019/09/06 02:00:59 dialing manager at 10.128.0.26:42463 2019/09/06 02:00:59 syscalls: 2487 2019/09/06 02:00:59 code coverage: enabled 2019/09/06 02:00:59 comparison tracing: enabled 2019/09/06 02:00:59 extra coverage: extra coverage is not supported by the kernel 2019/09/06 02:00:59 setuid sandbox: enabled 2019/09/06 02:00:59 namespace sandbox: enabled 2019/09/06 02:00:59 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/06 02:00:59 fault injection: enabled 2019/09/06 02:00:59 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/06 02:00:59 net packet injection: enabled 2019/09/06 02:00:59 net device setup: enabled 02:03:19 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfff, 0x2000) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r0, 0xc040564a, &(0x7f0000000040)={0x3, 0x0, 0x4001, 0x3, 0x800, 0x8000, 0x3}) prctl$PR_SET_SECUREBITS(0x1c, 0x10) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x4, 0x400) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x2}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000140)={r2, 0x0, 0x7, 0xb5}, &(0x7f0000000180)=0x10) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhci\x00', 0x2) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f00000002c0)={0x8000000, 0x7fffffff, 0x40}) r6 = syz_open_dev$mouse(&(0x7f0000000300)='/dev/input/mouse#\x00', 0x5, 0x142) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000340)={0x0, 0xd0, "82fd043103ff58b2a1fd5df953cf0fd42f7012f837011e4db9bd8ceb74da7e0e7975f6d82ee88c27932638d9e25fb252a503efe473defec3279d4c2d9d48e7c047a3da652b637729b57255190de52644875c738fb67113ff3b63dc9d8763a5bda99b96b53c4ef27351931f18109de29de74c19c58227a6376b8dccef3f5015a15bbcd3f2a48b5aa1f46d10fc9a6440aebc3a1b959a20e816c641b06c8a92fc9d1d4295027e750119ada9c82567b55eb0a3b9109522765c4cf1fc90a833a164e55bdcfe40818b64413f92d9c8ece5d510"}, &(0x7f0000000440)=0xd8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f0000000480)={r7, 0x7fff}, 0x8) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000004c0)={0xff, 0x0, 0x10001, 0x6}) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f0000000500)={0x3, r8}) r9 = request_key(&(0x7f0000000640)='keyring\x00', &(0x7f0000000680)={'syz', 0x3}, &(0x7f00000006c0)='\x00', 0xfffffffffffffff9) add_key$user(&(0x7f0000000540)='user\x00', &(0x7f0000000580)={'syz', 0x3}, &(0x7f00000005c0)="a8f902605ceba76d3b96aa45b5b539c399683287ff769c03c0559c44e4fddef341c04f7bf69499606d166c964d1dbe6b1534d9f65f595a75c24ffc248cf554dc1e2ae7b97ecfc19f7bf807", 0x4b, r9) prctl$PR_SET_FPEMU(0xa, 0x1) r10 = syz_open_dev$midi(&(0x7f0000000700)='/dev/midi#\x00', 0x521, 0x571100) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r10, 0x84, 0x72, &(0x7f0000000740)={r2, 0x20}, 0xc) setsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000780)=0x9, 0x1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@empty}}, &(0x7f0000000900)=0xe8) r12 = getgid() lchown(&(0x7f00000007c0)='./file0\x00', r11, r12) r13 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000940)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(r13, 0xc038563b, &(0x7f0000000980)={0x0, 0x0, {0x3, 0x4, 0x7e1d, 0x6}}) r14 = syz_open_dev$audion(&(0x7f00000009c0)='/dev/audio#\x00', 0x6, 0x10000) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r14, 0x84, 0x6f, &(0x7f0000000a40)={r3, 0x10, &(0x7f0000000a00)=[@in={0x2, 0x4e21, @multicast2}]}, &(0x7f0000000a80)=0x10) r15 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/zero\x00', 0xe29ede04c321fd73, 0x0) ioctl$MON_IOCX_MFETCH(r15, 0xc0109207, &(0x7f0000000b40)={&(0x7f0000000b00)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0xd2}) 02:03:19 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockname$unix(r0, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e) r1 = socket$xdp(0x2c, 0x3, 0x0) mount$9p_virtio(&(0x7f0000000100)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x2000000, &(0x7f00000001c0)={'trans=virtio,', {[{@version_L='version=9p2000.L'}, {@access_any='access=any'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/proc/sys/net/ipv4/vs/lblc_expiration\x00'}}, {@euid_lt={'euid<', 0xee00}}]}}) socket$xdp(0x2c, 0x3, 0x0) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000240)={0x27, 0x1, 0x1, 0x24022bfe6fa4862, 0x2e8c000000000000, 0x9, "a438e1482679df984301fec0c3c77caea35255fd8d21abb646754199cd5a44b5cde944bb64a467a7d976917c6580a3a19382cb16a277da6b13e23db5565e7e", 0x18}, 0x60) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000002c0), 0x10) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0xa00, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f0000000340)=0x3000) fcntl$setsig(r1, 0xa, 0xe) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000380)={{0x23, @local, 0x4e20, 0x4, 'dh\x00', 0x2, 0x0, 0x4c}, {@empty, 0x4e22, 0x1, 0x5, 0x8, 0x8b8}}, 0x44) r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vhost-vsock\x00', 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000440)=[r4], 0x1) pivot_root(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00') r5 = openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x4000, 0x42) setsockopt$kcm_KCM_RECV_DISABLE(r5, 0x119, 0x1, &(0x7f0000000540)=0x5a, 0x4) ioctl$PPPIOCSDEBUG(r5, 0x40047440, &(0x7f0000000580)=0x4) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_STOP(r6, 0x54a1) r7 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000600)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r7, 0xc008561b, &(0x7f0000000640)={0x500000000000000, 0x6}) mount(&(0x7f0000000680)=@filename='./file0\x00', &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)='sysv\x00', 0x20080, &(0x7f0000000740)='\xc2\x00') pipe2(&(0x7f0000000780)={0xffffffffffffffff}, 0x84800) write$FUSE_IOCTL(r8, &(0x7f00000007c0)={0x20, 0xfffffffffffffffe, 0x4, {0x8, 0x4, 0x100000000, 0x40}}, 0x20) r9 = accept(r2, &(0x7f0000000800)=@ax25={{}, [@null, @remote, @rose, @default, @netrom, @bcast, @default]}, &(0x7f0000000880)=0x80) setsockopt$MISDN_TIME_STAMP(r9, 0x0, 0x1, &(0x7f00000008c0), 0x4) keyctl$set_reqkey_keyring(0xe, 0x4) r10 = syz_open_dev$sndpcmc(&(0x7f0000000900)='/dev/snd/pcmC#D#c\x00', 0x9, 0x10200) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000940)=@assoc_value={0x0}, &(0x7f0000000980)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r10, 0x84, 0x6f, &(0x7f0000000a40)={r11, 0x78, &(0x7f00000009c0)=[@in={0x2, 0x4e21, @local}, @in6={0xa, 0x4e24, 0xdc06, @ipv4={[], [], @multicast1}, 0xfffffffffffffff9}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x4e23, @multicast2}, @in6={0xa, 0x4e20, 0x101, @rand_addr="c46a76cdbe36294edd187b62fb0b831c", 0x1}, @in={0x2, 0x4e20, @loopback}]}, &(0x7f0000000a80)=0x10) syzkaller login: [ 209.958899][ T8631] IPVS: ftp: loaded support on port[0] = 21 [ 210.134675][ T8631] chnl_net:caif_netlink_parms(): no params data found [ 210.145151][ T8633] IPVS: ftp: loaded support on port[0] = 21 02:03:19 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x20, 0x20000) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000040)={0x21, @rand_addr=0x8, 0x4e20, 0x4, 'nq\x00', 0x9, 0x1, 0x40}, 0x2c) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x48000, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f00000000c0), &(0x7f0000000100)) r2 = accept$inet(r0, 0x0, &(0x7f0000000140)) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000180)={r2, 0x0, 0x5, 0x100, 0x7}) getresgid(&(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000240)) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getgid() setresgid(r3, r4, r5) r6 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x100, 0x40000) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000380), 0x13f, 0x5}}, 0x20) r7 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0x100000000, 0x12f4d4afec922ada) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_CREATE_OPEN(r7, &(0x7f0000000500)={0xa0, 0xfffffffffffffff5, 0x6, {{0x4, 0x1, 0x5, 0x4c, 0x100000000, 0x4, {0x1, 0x10000, 0x9, 0xb9, 0x6, 0xbbaf, 0x86, 0xfffffffffffffffa, 0x8, 0x6, 0xd, r8, 0x0, 0x40, 0x30e}}, {0x0, 0x29}}}, 0xa0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0)=@assoc_value, &(0x7f0000000600)=0x8) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000640)={'ip_vti0\x00', {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000680)='/dev/snapshot\x00', 0x400000, 0x0) r9 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/dlm-monitor\x00', 0x2, 0x0) setsockopt$ax25_SO_BINDTODEVICE(r9, 0x101, 0x19, &(0x7f0000000700)=@netrom={'nr', 0x0}, 0x10) r10 = syz_open_dev$adsp(&(0x7f0000000740)='/dev/adsp#\x00', 0x9, 0x0) stat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r10, &(0x7f0000000840)={0x90, 0xfffffffffffffffe, 0x4, {0x4, 0x2, 0x9, 0x1ff, 0x0, 0x1, {0x3, 0x5, 0x7, 0x5, 0x0, 0x1, 0xffffffff, 0x20, 0xffff, 0x3ff, 0x0, r8, r11, 0x20}}}, 0x90) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ashmem\x00', 0x102, 0x0) utimensat(r6, &(0x7f0000000940)='./file0\x00', &(0x7f0000000980)={{}, {0x77359400}}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a00)={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x10) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000a40), &(0x7f0000000a80)=0x8) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/sequencer2\x00', 0x200000, 0x0) fsetxattr$security_smack_transmute(r12, &(0x7f0000000b00)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000b40)='TRUE', 0x4, 0x2) r13 = syz_open_dev$admmidi(&(0x7f0000000b80)='/dev/admmidi#\x00', 0x800, 0x40080) openat$cgroup(r13, &(0x7f0000000bc0)='syz0\x00', 0x200002, 0x0) [ 210.210529][ T8631] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.220111][ T8631] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.228212][ T8631] device bridge_slave_0 entered promiscuous mode [ 210.240789][ T8631] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.249202][ T8631] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.263791][ T8631] device bridge_slave_1 entered promiscuous mode [ 210.351463][ T8631] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 210.378824][ T8631] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 210.442971][ T8633] chnl_net:caif_netlink_parms(): no params data found [ 210.461440][ T8631] team0: Port device team_slave_0 added [ 210.496291][ T8631] team0: Port device team_slave_1 added [ 210.522666][ T8637] IPVS: ftp: loaded support on port[0] = 21 [ 210.529871][ T8633] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.537549][ T8633] bridge0: port 1(bridge_slave_0) entered disabled state 02:03:20 executing program 3: r0 = semget$private(0x0, 0x4, 0x3d1) semctl$GETVAL(r0, 0x2, 0xc, &(0x7f0000000000)=""/51) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000040)={0x3, 0x5, 0x4, 0x7, 0x7, 0x6}) r1 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x2, 0x2) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x840) fcntl$setpipe(r1, 0x407, 0x7) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000200)=',selfproc.\x00'}, 0x30) ptrace$cont(0xffffffffffffffff, r3, 0x0, 0x8000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000280)={0x0, 0xa1, "22a0aad96722d6d99f8653e5de4c939f774bab41a553fab2461d62d9d853eb5ae87e4289da81960ee7dbcc61f52898b16e763ac5b8bfe88fb0f3d8fc3fc7e43829576707b573037c102d103ee8758169df5dfbd7883176421b7a816cdd3177a4922da8b73c756024ae38cd69f30c5dd936bb6cefd993a5c998c4e1a84c0082b1db3b73e0ce9b96ecf5ee316c5959936a5654539db17dfed6a2b5e067eaf6efe71d"}, &(0x7f0000000340)=0xa9) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000380)={r4}, &(0x7f00000003c0)=0x8) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x420000, 0x0) setsockopt$MISDN_TIME_STAMP(r6, 0x0, 0x1, &(0x7f0000000440)=0x1, 0x4) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, &(0x7f00000004c0)={0x1f, 0x9, 0x2400, 0x12000, r5}, &(0x7f0000000500)=0x10) r7 = msgget(0x2, 0x6dda7a4260097f94) msgctl$IPC_INFO(r7, 0x3, &(0x7f0000000540)=""/48) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vsock\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(r8, 0x4004743b, &(0x7f00000005c0)=0x5) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000600)='/dev/cachefiles\x00', 0x2, 0x0) r10 = syz_open_dev$mouse(&(0x7f0000000640)='/dev/input/mouse#\x00', 0x6, 0x100) ioctl$FUSE_DEV_IOC_CLONE(r9, 0x8004e500, &(0x7f0000000680)=r10) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000006c0)=@ccm_128={{}, "90abf265372be5b6", "edc0fc6e4b2509df2b8e788bfa371275", "afc1139a", "8ad16da6f8c1b4e1"}, 0x28) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000700)='/dev/input/mouse#\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCSPGRP(r10, 0x5410, &(0x7f0000000780)=r11) r12 = open(&(0x7f00000007c0)='./file0\x00', 0xa00, 0x21) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r12, 0x40bc5311, &(0x7f0000000800)={0x8001, 0x1, 'client0\x00', 0x0, "fbc00cb7aa9c142a", "4b913fbb2c92e5087f994592b695034ed40368708af50d5465e0e50ec5e313ee", 0x100000000, 0x9}) r13 = syz_open_dev$mice(&(0x7f00000008c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r13, 0x400445a0, &(0x7f0000000900)=0x1) [ 210.545463][ T8633] device bridge_slave_0 entered promiscuous mode [ 210.565604][ T8633] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.573092][ T8633] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.581507][ T8633] device bridge_slave_1 entered promiscuous mode [ 210.682570][ T8631] device hsr_slave_0 entered promiscuous mode 02:03:20 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_score_adj\x00') ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x4e23, @remote}, {0x2, 0x4e24, @rand_addr=0x3ff}, {0x2, 0x4e23, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xffffffff}) setxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:ldconfig_exec_t:s0\x00', 0x25, 0x3) r1 = socket$inet6(0xa, 0x80000, 0x4) accept4$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e21, 0x2, @ipv4={[], [], @loopback}, 0x4}}, 0x4, 0xaf33}, 0x90) socket$inet6(0xa, 0x2, 0x61) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) signalfd(r2, &(0x7f00000002c0)={0xddf}, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) dup(r3) setxattr$trusted_overlay_origin(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)='trusted.overlay.origin\x00', &(0x7f0000000480)='y\x00', 0x2, 0x0) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f00000004c0)={0x9, "90bdf5236aef5fa4491ae7db1f07889ea9161e31086cae3e4e85721b2d3b8f5d", 0x20, 0x20, 0x1ff, 0xd, 0x4}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000540)=0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f00000005c0)='vboxnet1loposix_acl_access,\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={r4, r0, 0x0, 0xe, &(0x7f0000000580)='oom_score_adj\x00', r5}, 0x30) r7 = syz_open_dev$vcsn(&(0x7f0000000680)='/dev/vcs#\x00', 0x5, 0x10000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r7, 0xc0a85322, &(0x7f00000006c0)) r8 = open(&(0x7f0000000840)='./file0/file0\x00', 0x0, 0x80) perf_event_open(&(0x7f00000007c0)={0x5, 0x70, 0x6d, 0x8, 0x745, 0x8001, 0x0, 0x800, 0x20, 0x8, 0x80000000, 0x19, 0x1, 0x1, 0x9, 0x6, 0x1, 0x0, 0x1000, 0x7, 0x8, 0x1, 0x6b5a, 0x7, 0x1f, 0x8, 0x3, 0x37, 0x1, 0x7, 0x6, 0x1, 0x7, 0x2, 0x5, 0x2d, 0xb55, 0x7, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000780), 0x1c}, 0x20000, 0x4, 0xa8, 0x9, 0x80000000, 0x82}, r6, 0x1, r8, 0x4) r9 = accept4$x25(0xffffffffffffffff, &(0x7f0000000880), &(0x7f00000008c0)=0x12, 0x800) ioctl$sock_proto_private(r9, 0x89e3, &(0x7f0000000900)="14e82e5023728bf5382122c58cf0b638f348e5b16c8135893d901a0c20afae2c7647b2c8ab0b495b6215ba454e46a604a173ccfdebb175a7b1d6c54ed1a9d868b41c590025f091ec2bb39fe1ac7ed4311848d1b5966bb3906a9f087085272c64fbeb81c0b3380e0e30589d0bf30aac5d95ad364c095bc444c3221648770f93df4124944b023119daff54ff7bed69f1774156c3df1f7a9353e4ea962a9790fb842707c7ee964e") acct(&(0x7f00000009c0)='./file0/file0\x00') r10 = socket$inet(0x2, 0x9bbe5fc36260f8e7, 0x8) setsockopt$sock_timeval(r10, 0x1, 0x15, &(0x7f0000000a00)={0x0, 0x7530}, 0x10) ioctl$sock_ax25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a40)={@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x3, [@bcast, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default]}) r11 = syz_open_dev$audion(&(0x7f0000000ac0)='/dev/audio#\x00', 0x1, 0x5c900) ioctl$sock_inet_tcp_SIOCINQ(r11, 0x541b, &(0x7f0000000b00)) r12 = syz_open_dev$radio(&(0x7f0000000b40)='/dev/radio#\x00', 0x0, 0x2) getsockopt$IP6T_SO_GET_REVISION_MATCH(r12, 0x29, 0x44, &(0x7f0000000b80)={'HL\x00'}, &(0x7f0000000bc0)=0x1e) [ 210.739476][ T8631] device hsr_slave_1 entered promiscuous mode [ 210.801683][ T8633] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 210.829622][ T8633] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 210.881306][ T8640] IPVS: ftp: loaded support on port[0] = 21 [ 210.891537][ T8633] team0: Port device team_slave_0 added [ 210.908822][ T8633] team0: Port device team_slave_1 added [ 210.949963][ T8631] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.957276][ T8631] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.965153][ T8631] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.972313][ T8631] bridge0: port 1(bridge_slave_0) entered forwarding state 02:03:20 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x40140, 0x0) ioctl$KVM_S390_UCAS_MAP(r0, 0x4018ae50, &(0x7f0000000040)={0x1a7e, 0x5, 0x4}) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000080)=0x3) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f00000000c0)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000000, 0x10, r0, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f00000001c0)={0x1f, 0x1, {0x10001, 0xef5, 0x1f, 0x0, 0x2, 0x101}, 0x2, 0xfffffffffffffffb}, 0xe) modify_ldt$write2(0x11, &(0x7f0000000200)={0x8, 0xffffffffffffffff, 0x1000, 0x2, 0x2, 0x5e, 0x2, 0x8, 0x10b9, 0x100}, 0x10) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-control\x00', 0x8000, 0x0) ioctl$KDGKBLED(r2, 0x4b64, &(0x7f0000000280)) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={r0}) getpeername$tipc(r3, &(0x7f0000000300)=@name, &(0x7f0000000340)=0x10) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) clock_nanosleep(0x1, 0x1, &(0x7f00000003c0)={r4, r5+10000000}, 0x0) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r6, 0x4010641a, &(0x7f0000000480)={0x3, &(0x7f0000000440)=[0x50a, 0x9, 0x4004000000]}) r7 = socket$caif_stream(0x25, 0x1, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000008, 0x40548d7, r7, 0x0) r8 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x82c0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r8, &(0x7f0000000800)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000580)={0x21c, r9, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x30, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_MEDIA={0x11c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xcaf6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xaa4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x37df6190}]}, @TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x20}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xff}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8001}]}]}, 0x21c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000090) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000840), &(0x7f0000000880)=0x4) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000008c0)=@assoc_value={0x0}, &(0x7f0000000900)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r6, 0x84, 0x72, &(0x7f0000000940)={r10, 0x28a74aed, 0x30}, &(0x7f0000000980)=0xc) r11 = syz_open_dev$admmidi(&(0x7f00000009c0)='/dev/admmidi#\x00', 0x7ff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000a00)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r11, &(0x7f0000000a80)={0x4, 0x8, 0xfa00, {r12, 0x1}}, 0x10) prctl$PR_SET_FPEXC(0xc, 0x20000) [ 211.090232][ T8633] device hsr_slave_0 entered promiscuous mode [ 211.147413][ T8633] device hsr_slave_1 entered promiscuous mode [ 211.217479][ T8633] debugfs: Directory 'hsr0' with parent '/' already present! [ 211.246075][ T8643] IPVS: ftp: loaded support on port[0] = 21 [ 211.254801][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.262869][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.334813][ T8645] IPVS: ftp: loaded support on port[0] = 21 [ 211.367827][ T8637] chnl_net:caif_netlink_parms(): no params data found [ 211.439542][ T8631] 8021q: adding VLAN 0 to HW filter on device bond0 [ 211.553215][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 211.562710][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 211.574371][ T8631] 8021q: adding VLAN 0 to HW filter on device team0 [ 211.596210][ T8640] chnl_net:caif_netlink_parms(): no params data found [ 211.620679][ T8649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 211.632313][ T8649] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 211.640795][ T8649] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.647852][ T8649] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.660693][ T8643] chnl_net:caif_netlink_parms(): no params data found [ 211.671510][ T8637] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.679132][ T8637] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.686733][ T8637] device bridge_slave_0 entered promiscuous mode [ 211.694918][ T8637] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.702061][ T8637] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.710683][ T8637] device bridge_slave_1 entered promiscuous mode [ 211.730152][ T8640] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.737629][ T8640] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.745314][ T8640] device bridge_slave_0 entered promiscuous mode [ 211.754819][ T8640] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.762212][ T8640] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.770002][ T8640] device bridge_slave_1 entered promiscuous mode [ 211.792629][ T8640] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 211.809725][ T8640] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 211.877331][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 211.886172][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 211.894854][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.902012][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.915595][ T8637] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 211.941551][ T8643] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.949734][ T8643] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.958121][ T8643] device bridge_slave_0 entered promiscuous mode [ 211.966710][ T8643] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.974133][ T8643] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.981900][ T8643] device bridge_slave_1 entered promiscuous mode [ 211.989689][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 211.999906][ T8640] team0: Port device team_slave_0 added [ 212.006651][ T8637] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 212.026892][ T8645] chnl_net:caif_netlink_parms(): no params data found [ 212.064135][ T8640] team0: Port device team_slave_1 added [ 212.080512][ T8637] team0: Port device team_slave_0 added [ 212.102695][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 212.112215][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 212.122399][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 212.130870][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 212.148138][ T8643] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 212.158713][ T8643] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 212.168659][ T8637] team0: Port device team_slave_1 added [ 212.182206][ T8633] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.190093][ T8645] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.197861][ T8645] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.205441][ T8645] device bridge_slave_0 entered promiscuous mode [ 212.260080][ T8640] device hsr_slave_0 entered promiscuous mode [ 212.317525][ T8640] device hsr_slave_1 entered promiscuous mode [ 212.357561][ T8640] debugfs: Directory 'hsr0' with parent '/' already present! [ 212.366121][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 212.374583][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 212.396946][ T8643] team0: Port device team_slave_0 added [ 212.403118][ T8645] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.410316][ T8645] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.419943][ T8645] device bridge_slave_1 entered promiscuous mode [ 212.449474][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 212.458606][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 212.466974][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 212.475414][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 212.484169][ T8631] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 212.498989][ T8643] team0: Port device team_slave_1 added [ 212.506997][ T8645] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 212.518830][ T8645] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 212.579988][ T8637] device hsr_slave_0 entered promiscuous mode [ 212.617525][ T8637] device hsr_slave_1 entered promiscuous mode [ 212.657210][ T8637] debugfs: Directory 'hsr0' with parent '/' already present! [ 212.689189][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 212.696783][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.715180][ T8633] 8021q: adding VLAN 0 to HW filter on device team0 [ 212.789610][ T8643] device hsr_slave_0 entered promiscuous mode [ 212.838033][ T8643] device hsr_slave_1 entered promiscuous mode [ 212.877243][ T8643] debugfs: Directory 'hsr0' with parent '/' already present! [ 212.892390][ T8631] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 212.900620][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 212.919414][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.928190][ T8642] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.935221][ T8642] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.943805][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 212.953083][ T8645] team0: Port device team_slave_0 added [ 212.963306][ T8645] team0: Port device team_slave_1 added [ 213.015217][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 213.028508][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 213.036760][ T8642] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.043927][ T8642] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.052087][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 213.060818][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 213.069361][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 213.078206][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 213.086559][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 213.097833][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 213.106300][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 213.160158][ T8645] device hsr_slave_0 entered promiscuous mode [ 213.197697][ T8645] device hsr_slave_1 entered promiscuous mode [ 213.237610][ T8645] debugfs: Directory 'hsr0' with parent '/' already present! [ 213.286003][ T8649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 213.294486][ T8649] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 213.306836][ T8633] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 213.318821][ T8633] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 213.340048][ T8640] 8021q: adding VLAN 0 to HW filter on device bond0 [ 213.356193][ T8649] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 213.366695][ T8649] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 213.404083][ T8640] 8021q: adding VLAN 0 to HW filter on device team0 [ 213.423626][ T8633] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 213.442593][ T8643] 8021q: adding VLAN 0 to HW filter on device bond0 [ 213.464739][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 213.478459][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.509482][ T8637] 8021q: adding VLAN 0 to HW filter on device bond0 [ 213.545013][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 213.550784][ T8661] QAT: Invalid ioctl 02:03:23 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448f0, &(0x7f0000000080)) [ 213.561952][ T8662] QAT: Invalid ioctl [ 213.564114][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 213.576973][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.584092][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.593550][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 213.602351][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 02:03:23 executing program 0: gettid() getpgrp(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') ioctl$VHOST_GET_FEATURES(0xffffffffffffffff, 0x8008af00, &(0x7f0000000280)) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) stat(0x0, 0x0) getgroups(0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, &(0x7f0000000200)) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet(0x2, 0x1, 0x0) [ 213.611991][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.619113][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.636604][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 213.646553][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 213.661191][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 213.671277][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.682929][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 213.693747][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 213.706291][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 213.722067][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 213.731098][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 213.739283][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 213.751965][ T8669] overlayfs: conflicting lowerdir path 02:03:23 executing program 0: syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$caif_seqpacket(0x25, 0x5, 0x0) pipe(&(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) [ 213.761305][ T8643] 8021q: adding VLAN 0 to HW filter on device team0 [ 213.773720][ T8645] 8021q: adding VLAN 0 to HW filter on device bond0 [ 213.775395][ T8668] overlayfs: workdir and upperdir must reside under the same mount [ 213.794117][ T8637] 8021q: adding VLAN 0 to HW filter on device team0 [ 213.826686][ T8640] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 213.844684][ T8640] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 213.862625][ C0] hrtimer: interrupt took 34813 ns [ 213.869979][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 213.883938][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.892939][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 213.908002][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 213.916452][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.923550][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.932074][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 213.941663][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 213.950277][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 213.959299][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 213.969288][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 213.977133][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 02:03:23 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) unshare(0x40000000) r1 = accept(r0, 0x0, 0x0) write$UHID_DESTROY(r1, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video2\x00', 0x2, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) [ 214.001905][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 214.022204][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 214.045206][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.052347][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.060788][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 214.069558][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 214.079067][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.086147][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.094443][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 214.103242][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 214.112759][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 214.121850][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 214.126079][ T8679] IPVS: ftp: loaded support on port[0] = 21 [ 214.131052][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 214.145295][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 214.153797][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.160921][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.202687][ T8649] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 214.210980][ T8649] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 214.219370][ T8649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 214.229313][ T8649] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 214.238444][ T8649] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 214.251313][ T8645] 8021q: adding VLAN 0 to HW filter on device team0 [ 214.273252][ T8649] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 214.284186][ T8649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.300946][ T8649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 214.313719][ T8649] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.332488][ T8649] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 214.341492][ T8649] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 214.378859][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 214.388815][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 214.401230][ T8638] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.408346][ T8638] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.416095][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 02:03:24 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 214.425290][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 214.434082][ T8638] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.441200][ T8638] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.462841][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 214.472960][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 214.484521][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 214.493295][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 214.502456][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 214.511547][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 214.520882][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.551470][ T8640] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 214.581353][ T8649] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 214.589772][ T8679] IPVS: ftp: loaded support on port[0] = 21 [ 214.600974][ T8649] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 214.619296][ T8649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 214.629425][ T8649] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 214.643315][ T8649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 214.661678][ T8649] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 214.670765][ T8649] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 214.682292][ T8649] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 214.702871][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 02:03:24 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000002000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa00006e0000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000020000000000000000000002002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f000000000000000000000000000044fc736530000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800"/592]}, 0x2c8) [ 214.714171][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 214.736847][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 214.819159][ T8637] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 214.829814][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 214.849748][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.911172][ T8643] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 214.946269][ T8645] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 02:03:24 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 214.968207][ T8645] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 214.980906][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 214.990076][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 215.053364][ T8645] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 215.092378][ T8637] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 215.208841][ T8726] Unknown ioctl 1074033723 [ 215.300535][ T8726] Unknown ioctl 1074033723 02:03:25 executing program 3: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0)) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r0, 0x3, 0xc000, 0x8000fff5) 02:03:25 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x80050000}]}) r0 = socket$inet6(0xa, 0x0, 0x0) fcntl$notify(r0, 0x402, 0x0) 02:03:25 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000002000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa00006e0000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000020000000000000000000002002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f000000000000000000000000000044fc736530000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800"/592]}, 0x2c8) 02:03:25 executing program 4: syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$caif_seqpacket(0x25, 0x5, 0x0) pipe(&(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) [ 215.897682][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 215.897696][ T26] audit: type=1326 audit(1567735405.612:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8771 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c6ba code=0x80050000 02:03:26 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec", 0xffffffffffffff93, 0xc, 0x0, 0xfffffec1) 02:03:26 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 02:03:26 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x2, 0xc) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) poll(&(0x7f0000000040), 0x0, 0x0) write(r1, &(0x7f0000000000)="1f0000000104ff80fd4354ab07110400f30503000900016cfbab50e7a0d0ff", 0x1f) 02:03:26 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 216.667912][ T26] audit: type=1326 audit(1567735406.392:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8771 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c6ba code=0x80050000 02:03:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x10}, [@ldst={0x5, 0x3}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0xf, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x3}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f0000000140)}, 0xfffffffffffffc5d) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x3, 0x7, 0x0}, 0x20) 02:03:27 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 02:03:27 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='/selinux/mls\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c46000000000000000000c4b40003003e0000396294249c1fd83d00000000000000bade0b9b00040700000000e500000000002c380003"], 0x39) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:03:27 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000002000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa00006e0000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000020000000000000000000002002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f000000000000000000000000000044fc736530000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800"/592]}, 0x2c8) 02:03:27 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') connect$inet(r0, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) syz_genetlink_get_family_id$ipvs(0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x1ad) semget(0x3, 0x0, 0x0) semget$private(0x0, 0x0, 0x0) getrandom(0x0, 0x0, 0x2) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) 02:03:27 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RAUTH(0xffffffffffffffff, 0x0, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, 0x0) 02:03:27 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x80050000}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000009f00)=[{{&(0x7f0000007b00)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, 0x0) 02:03:27 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x80050000}]}) r0 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, 0x0, 0x0) 02:03:27 executing program 2: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) timer_create(0x0, &(0x7f0000001280)={0x0, 0x4000000000000012, 0x0, @thr={0x0, 0x0}}, &(0x7f0000001240)) unlink(&(0x7f0000000040)='./file0\x00') timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r0, 0x1000000000016) [ 217.655375][ T26] audit: type=1326 audit(1567735407.372:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8840 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c6ba code=0x80050000 02:03:27 executing program 0: [ 217.765851][ T26] audit: type=1326 audit(1567735407.472:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8845 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c6ba code=0x80050000 02:03:27 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 02:03:27 executing program 0: 02:03:27 executing program 2: 02:03:27 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='illinois\x00', 0x9) capset(0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10000000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 02:03:27 executing program 2: 02:03:27 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x335) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000140)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={r0, 0x10, &(0x7f0000000740)={&(0x7f0000000300)=""/30, 0x1e}}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={r0, 0x10, &(0x7f00000003c0)={&(0x7f00000015c0)=""/132, 0x84, 0xffffffffffffffff}}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={r1, 0x28, &(0x7f00000004c0)}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, r0, 0x0, 0x1, &(0x7f00000002c0)='\x00'}, 0x30) sendmsg$kcm(r1, &(0x7f0000000580)={&(0x7f0000000000)=@ipx={0x4, 0x0, 0x8, "f3cbafb12fc1"}, 0x80, 0x0}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x74366e517f7a26f5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xa3d1437a764324d5, 0x0, 0x2, 0x6, 0x20, 0xffffffffffffffff, 0x10000, [], 0x0, r1, 0x3, 0x4}, 0x3c) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000880)={0x4, &(0x7f0000000840)=[{0x800, 0xfffffffffffffff7, 0x35, 0x3}, {0x8, 0x80, 0x9, 0x1}, {0x1, 0xfffffffffffff9cf, 0x3, 0x3}, {0x0, 0x26, 0x2, 0x8}]}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) gettid() ioctl$TUNGETSNDBUF(r1, 0x800454d3, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x1802a140) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000280)=r0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000480)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) 02:03:27 executing program 2: 02:03:28 executing program 2: [ 218.445436][ T26] audit: type=1326 audit(1567735408.162:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8840 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c6ba code=0x80050000 [ 218.551872][ T26] audit: type=1326 audit(1567735408.272:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8845 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c6ba code=0x80050000 02:03:28 executing program 5: 02:03:28 executing program 3: 02:03:28 executing program 0: 02:03:28 executing program 2: 02:03:28 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 02:03:28 executing program 0: 02:03:28 executing program 2: 02:03:28 executing program 4: 02:03:28 executing program 5: 02:03:28 executing program 2: 02:03:28 executing program 3: 02:03:28 executing program 0: 02:03:28 executing program 5: 02:03:28 executing program 2: 02:03:28 executing program 3: 02:03:29 executing program 0: 02:03:29 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 02:03:29 executing program 4: 02:03:29 executing program 2: 02:03:29 executing program 5: 02:03:29 executing program 3: 02:03:29 executing program 4: 02:03:29 executing program 5: 02:03:29 executing program 2: 02:03:29 executing program 0: 02:03:29 executing program 3: 02:03:29 executing program 4: 02:03:29 executing program 5: 02:03:29 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 02:03:29 executing program 2: 02:03:29 executing program 0: 02:03:29 executing program 3: 02:03:29 executing program 5: 02:03:29 executing program 4: 02:03:29 executing program 5: 02:03:30 executing program 0: 02:03:30 executing program 3: 02:03:30 executing program 2: 02:03:30 executing program 4: 02:03:30 executing program 0: 02:03:30 executing program 1: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 02:03:30 executing program 3: 02:03:30 executing program 4: 02:03:30 executing program 5: 02:03:30 executing program 2: 02:03:30 executing program 0: 02:03:30 executing program 5: 02:03:30 executing program 4: 02:03:30 executing program 3: 02:03:30 executing program 0: 02:03:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "9645e89650196a1a", "45b6e022dbf1fb07ff029bb594c2dcd09a59ebdbe2da06595dfd2797fa4d91bc", "b2d2c111", "b2134e61152bd8a8"}, 0x38) sendmsg$sock(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@txtime={{0x18}}, @mark={{0x14}}], 0x28}, 0x0) 02:03:30 executing program 4: gettid() getpgrp(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') ioctl$VHOST_GET_FEATURES(0xffffffffffffffff, 0x8008af00, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) stat(0x0, 0x0) getgroups(0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, &(0x7f0000000200)) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet(0x2, 0x1, 0x0) [ 221.311113][ T9006] overlayfs: conflicting lowerdir path [ 221.373503][ T9012] overlayfs: workdir and upperdir must reside under the same mount 02:03:31 executing program 1: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000002000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa00006e0000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000020000000000000000000002002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f000000000000000000000000000044fc736530000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800"/592]}, 0x2c8) 02:03:31 executing program 3: gettid() getpgrp(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') ioctl$VHOST_GET_FEATURES(0xffffffffffffffff, 0x8008af00, &(0x7f0000000280)) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) stat(0x0, 0x0) getgroups(0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, &(0x7f0000000200)) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet(0x2, 0x1, 0x0) 02:03:31 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000003c0)={[{0x0, 'c\x89\x06\x00\x00\x02\x00\x00\x00\f\x1b\xd1c\x0fK\x9c\xdd\xbbh +#\x01n(\xa7\xf10s\xb2\xc3\xe0\xa6\xfd\xe7\x80\x03\x8e\xaadkt\xea\xf4\xa9\x15QQ9@h\x94\xf3\x1a\b\x19C@P\'\xe3\xec\xb2\x81\r\x03$\xc3~\xaa\x9a\x18\x15?\x86\xee\xab\xeeQpM\x9e$\x1a\xf0\x93\xf9\xf4\xe2\x85M\x89H\xd4_\xc07\x9c}\xc7\x89\x16\xae\xcb\xdf\xd7\r9\xce)/6\rz\x1f\xd7\xe1i)9\xb3!\xe4~\xc0\xd1<\xce\xf6\x0e\x1dx\v\x8a\xfd\x13\xc5\xc3@\x10\xc0\x18Q\xbf5\r\xc6\xd2\x17M\xbb\xb3\xca\"\x93Q\x98\xe2\xadk\xaa\xdd\x02\xc8\xe5\xe2\x13}\xf3\v\xfe\xc7\x1a'}]}, 0xb4de) 02:03:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f00000001c0)=0x0) syz_open_dev$sndctrl(&(0x7f0000000240)='/dev/snd/controlC#\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000005, 0x0, r0, 0x0}]) 02:03:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) write$P9_RXATTRWALK(r1, &(0x7f0000000040)={0x5, 0x9}, 0xf) r2 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) sendmsg$nfc_llcp(r2, &(0x7f0000002900)={&(0x7f0000000180)={0x27, 0x1, 0x2, 0x2, 0xffffffffffffff60, 0x4a, "9814efbf375453c8245395a353cd2942d343bcec31a4beb76cd947af77adb355be84979fcf45c955f324e9e2c269f514ecd72c6d30cfc1a55284c7cf0a2d3f", 0x8}, 0x60, &(0x7f0000002740)=[{&(0x7f0000000200)="2126a99a2e67c444f0bf990f3ba25f9782509452f202266a62c690a7b6542d66bec506366ab817e5f19e3e96d1f09aa7d844ea766d6774fccd02199f79990fb572ada751ffc21033b5a5304fee786aa8d3fb1898fad7057acf1ae9c156223c8c78334ef1b6", 0x65}, {&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000001280)="561beeaef2b537beb1b85e7b981a58cb2fb2ad96e09c4bef1f6f61444cae5c9fe420bba1506d89101552a3e65079d75ebf62adf6f8b0d940195fa42b6622e1d828ff4320180ee23cea3df6150fa537feada5989d7554fba6f328c6ca26680843356ef2dff18381030c856293283ccb0a0551de297c3205abdaec17fb7a8b83dbf125aab12bf64b4a7625a3eda0a56230247631b48958dc1c3d0c3e6d59e9e308d63780a5b8b0ceb3759b4d0881b4482d7542a050e94428d5aa1a96a5a3b22a80aa16dedf46dba0b623683ba537322d11cec80ac18aeb4733b81966083b994ee79812", 0xe2}, {&(0x7f0000001380)="02ed84d8643ff6af3d91690110e45b328ea267076e0cf8d4bc3b9343678675b219a788f5799e4037ac345e15445622f69b411f778445a8d318cdbe9a13206508bb84efe074fe3693037de932fc67319b52ebfde56b6de8310f1fe8a5e20da866c918b95b31b1f41e7c753a0cc0e581f815e748aa92374f237d21727fc886e9ed83e20624507651503c2c89324b5277ef07efbce12fe5e5893242315e9c43aa75f1c7aad3a776514a264d190f087c4c3c12e41e3bec82bdb045ba8e8de225791899c2f7e807a3747d9fac045167739d5fc2c09450a173878d10", 0xd9}, {&(0x7f0000001480)="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", 0x1000}, {&(0x7f0000002480)="0562eee862f39fff2ac274b406fea4133988da9459dc971074844e963c9a9565c91a016bfe7ad5b20b17ed543baefaa0d8b9ea69b3f21297cc1064c27f37c4aa77951c45c629460199c55a6798c5abad429bcd46d1abd52e7de27545cfa0f81458da832696d0ff8ca46ff7b8865177ffb12abaf4ee093094b462ce92afffe2e52cba94a0335230f61c51d132882dc22048c22899862bfaec324c2b49d7b5763f34aaa3b934b75e99dbc6e8fceb", 0xad}, {&(0x7f0000002540)="956b478031b24c0b4bdd459dd5bfd7d6b4959edd5049adc57516", 0x1a}, {&(0x7f0000002580)="d1a39249a60d23c4ed107114b3cbc40d86746ae43e1eef47312350d75285d2be33a089395f5138d6e99f46361de6acbb8f5b920ef91285ac56a6e2a6d320b1921f25df6f63ace8c03f743a178d6bb6a67d", 0x51}, {&(0x7f0000002600)="6f2cc52e40c48c7d0d52d2b05a7b711ca0ef4f0da9ba47871afc4d60e1ec0ad3ff572323790da7e6695f6ab5bb07219e63d7db2a1fab1f89118211c0f27e2a84c39524f44292becb9cf3d7078f888c36e0bdd30b8c3f94f1e496696d51c3201d7e011eb27a9fb6a76c6d7a3d2251d5653d64ec147f555a90001f3f60589c8b772c257876a7348650f45e26ca4ed7a49365bde39e0e28", 0x96}, {&(0x7f00000026c0)="cd1b184cf885ee75614bbc2c6374b90c515f9a60f4fb58008705eca8d81081ed8c3840bb1126a3724cc1955026b4aabc1c140111e02c9929a2167aaae4350d6b4892485a", 0x44}], 0xa, &(0x7f0000002800)={0xf8, 0x102, 0x1, "63535044af1c3bca0b1d770fe23e60ec683a345da0df1b07ae0c3d9a14e80fda8e402cbbd37ef454953097532bd0795446529f4fb218fe6a3c185c54cdf7a2f9d92783f94935512d1062a9de3681e646bfc1d932680c838d4b39cec91fd5e2fdc6890f6506b8b35e58ef008c520642193230729df552a6384cbc4ee13f4aabdf38d21768f19cd907e8b510c5126bc70c2fedb101cdc86a81832b165a81ef1feb68b7040c06de274573f6244bd5b269c53a2ec7c2632f7f168c54b39d9bccd530fd536c904baab0a86a4f55ecc117d7889f015e7d4621b6eda1ba571d9ef5615220156602dc5ae8cc"}, 0xf8, 0x45085}, 0x4000000) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x8a1c0, 0x0) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f0000000100)) ioctl$CAPI_NCCI_OPENCOUNT(r3, 0x80044326, &(0x7f00000000c0)=0xa51f) 02:03:31 executing program 4: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x810, &(0x7f00000014c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 221.578675][ T9023] device nr0 entered promiscuous mode 02:03:31 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) epoll_create(0x2) r1 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000000)=0x3) dup2(r2, r1) r3 = open_tree(r1, &(0x7f00000000c0)='./file0\x00', 0x801) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000180)={0x10000000}) 02:03:31 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x134, &(0x7f0000000080)={0x0, 0x41}}, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f000000dfaa)="5500000018007f5300fe01b2a4a280930a800000000000000000000039000900350002000000000019000500fe800010000000dc1338d54400009b84132000000083de448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f000000dfaa)="5500000018007f5f00fe01b2a4a280930206000100000001000000003900090035000c", 0x23}], 0x1}, 0x0) r0 = socket(0x10, 0x200080002, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 221.828160][ T9029] overlayfs: filesystem on './file0' not supported as upperdir [ 221.837329][ T9035] ISOFS: Unable to identify CD-ROM format. [ 222.321860][ T9023] device nr0 entered promiscuous mode [ 222.337538][ T9035] ISOFS: Unable to identify CD-ROM format. 02:03:32 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') socket$kcm(0x29, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0}) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="9e78c041b8c08f5accee3380f950ca46f8847a36150938c5e6d3a3a9707cdfdbf9b58de778b1c3ab114347faa89ea87072d2e6a51b3d3a0fd058319925e24508000000000000002f904147e1adb899d3d7c887935920f21b165c4205958255ddbebf37bdb3f3eff42d5b3cbe6121a3e39d71145082b24305b9c64f159947d6b7536b56509a8a7ab5fa09dbf6a151448a37c62e0fed8fe6c2548477eceeba0550226ada8a48476834000000000000000000e35819d949ab695c131977a41f3e4d9a3e2460f1a8b86ec2d9327c88c30939648a5f7ce8ed5d886c63afa982839ee4043fbad97e871c577d0f347e94420ee11e", @ANYRES32=r2, @ANYBLOB="000000005500000008001a005bff000089bb4461942e8a3594ebf38704644b3a77a49a8a7fd5f970622f96b52da8d1046980312b3bee2dbaf7e9c1c8b68d72e507f05df395787a5007169bffad5a7c078362b2cc58b31b44a70079"], 0x28}}, 0x0) setxattr$security_smack_transmute(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x97cf6c9feaf821cd) r3 = socket(0x10, 0x5, 0x800000000) sendmmsg$alg(r3, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) accept4$rose(r3, &(0x7f0000000040), &(0x7f0000000140)=0x1f6, 0x0) 02:03:32 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 02:03:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)=0x3) r3 = dup2(r2, r1) write$FUSE_IOCTL(r3, &(0x7f0000000280)={0x20}, 0x20) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000040)) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') r4 = socket(0xa, 0x80002, 0x0) setsockopt$inet_int(r4, 0x0, 0xb, &(0x7f00000000c0)=0x1002, 0x4) sendto$inet(r4, 0x0, 0xffe5, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) recvmsg(r4, &(0x7f0000000140)={&(0x7f0000000180)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0xfffffffffffffe06, 0x0}, 0x2001) 02:03:32 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r0, 0x29, 0x19, 0x0, 0x2a0) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000000)=0x1f, &(0x7f0000000040)=0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r2, 0x29, 0x19, 0x0, 0x2a0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000080)={0x0, @speck128}) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x22086604, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x7, 0x0) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') sendmsg$NBD_CMD_STATUS(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x44, r4, 0x20, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x45c4}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x5}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x264}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x513c4af83b2703df) 02:03:32 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x42000, 0x0) r1 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000000)=0x3) r3 = dup2(r2, r1) write$FUSE_IOCTL(r3, &(0x7f0000000280)={0x20}, 0x20) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r3, 0x4018620d, &(0x7f0000000140)={0x73622a85, 0x1, 0xfffffffffffffffd}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000000)) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r4, 0x29, 0x19, 0x0, 0x2a0) signalfd4(r4, &(0x7f0000000100)={0x6}, 0x8, 0x800) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r5, 0x29, 0x19, 0x0, 0x2a0) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000000040), 0x4) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) 02:03:32 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x19, 0x0, 0x2a0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)={0x8, 0xac0, 0x4, 0x5, 0x7, 0xdb0}) sendto$rxrpc(0xffffffffffffffff, &(0x7f0000000100)="1cc43036f124041ddc2c14b88c4c6ed972a5d1a0a41bdd224ca11a761e6d289b604a529e07e981576538ae848ce84d130de71b7def7e9e4f9d4f039a1162f7cef920680113d3c6158e2b778da865c83ee1b6de3b8f62ec7fcf067c61f77fdbb595728a4e70ff8342cfadba0da635dc228a940a6aed8275d4a0dd2d91b7ce908b01660e084a0e9d0129d5107ed8e7e71b5dc513131fa6c40601542a8ec2dbfaed15721e0400066ac3341a5374850e1066bc2e53e7ff92977435aae6641f1d150d9fd458c2c6ee28633c9bd4a53623b7dfcf00f6fd7f8618174dfce0750f1a72f8", 0xe0, 0x10, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e20, 0x3, @mcast2, 0x7}}, 0x24) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, 0x0, &(0x7f00000000c0)) 02:03:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x24048000, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1a) listen(r0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'icmp6\x00'}, &(0x7f0000000140)=0x1e) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)="580000001400add427323b470c45b45602067fffffff80004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac71082300000ffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 223.214862][ T26] audit: type=1804 audit(1567735412.932:38): pid=9095 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir919711032/syzkaller.9k6ASL/14/file0" dev="sda1" ino=16568 res=1 [ 223.343148][ T26] audit: type=1804 audit(1567735413.052:39): pid=9104 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir734535609/syzkaller.4ZmHLb/16/file0" dev="sda1" ino=16605 res=1 02:03:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x163, 0x11, 0xc}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) r1 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0x75, &(0x7f00000001c0)={r4, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000080)=0x98) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={r4, 0x4}, 0x8) 02:03:33 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000240)={0x0, 0x102000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x276, 0x0, 0x0, 0xfffffe3d) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x60, 0x0, 0xfffffdb0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000e80)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb8dfafc1d3f56bc543ab87321e12cca08a744a2d128b00634bc882151d36809229a96bc3437ef159489384ade077ba295eac2882dbfd3781dd4d4e609c42628dbb709b3eb1fa030009045dd98b9e6d77b6cec9ceb685595d43995e0f04c32260943add79831e661c6a351dedc8b9d220fbf9fb6e44fb6a629ce9a82025124fec9f3ee751f7da0cd7e799be88ddbdac20b48e890ff81d7fa28c2d017d7932f2569038740461accd4582f576e4fdb6150a3399f8266bc19eb943648ad1ad81420ed6c382436e474390c8995e829e4f9df43eed8", 0x103, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1850, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) socket(0x0, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(0xffffffffffffffff, 0x28, 0x6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, 0x0) 02:03:33 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in6={0xa, 0x4e22, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xfec0000000000000], [], @local}}, @in={0x2, 0x0, @remote}], 0x2c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e22, @remote}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x20) sendmsg$inet6(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000000)="1aa4806bfbbb5e210268ca5d1ae09ddd2af66a9707a53c4a766d59621dd413af04141593c3f788e8a46bdd56b87b2d973ddb8202f697969cc813a467a18cc8d3fe91d3260a134f0c701ae0bb0cb1ad584b3a73097934e3e6f708be947b50db15c352d729ab15218d7b8ce945fe95856c28c4bcfdd7f3fc4945af0af7b1d79db6fb0d6261edc28f4c59e7323fc3cfda32792f886a", 0x94}, {&(0x7f0000000180)="768f39f19876d06996a609f13208324a367909d9cf856a6917534f6fc402c84685b83fd889cebc118d044926dcfcb99a88781caaebefabe7e0e07b9f07f67bda0831ee2c6a7d18d39d4d200563cd45c86001842ded5560d056e8ed7f35c508f0291b8efcd1a7b76095d6ad2ab00ed949fdb905f708710566bb87902bf25c061c20a7c71a4c7e12b2178b179ca59ce64f4e8f2a22c594e881a383cc4b400e14394a3a98bc7b535dfdbf1c7cb278", 0xad}, {&(0x7f0000001240)="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", 0x9f0}], 0x3}, 0x0) getrusage(0x0, &(0x7f00000000c0)) [ 223.615679][ T9122] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 02:03:33 executing program 2: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6, @in=@local}}, {{@in=@initdev}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, 0x0) sched_setattr(0x0, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = getpgid(0xffffffffffffffff) ptrace$getenv(0x4201, r0, 0x81, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaaa6, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = socket$inet(0x10, 0x3, 0xc) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37e", 0x3f}], 0x1}, 0x0) pipe(0x0) 02:03:33 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x20000000000007) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f0000000480)=0x4000000000007, 0x62) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x1ff, 0x402800) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{}, {}, {}]}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, &(0x7f0000000280), 0x1, 0x0, 0xffffffffffffff21}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="bd03000000000000180100000000000002000000beaa5d2ca9144896339dc4bbbf1d0e1463ea406aa68b1e65d622a771f6e806ed1498252bb67d24ed84c44f539835c9bdad3a0000"], 0x3e7}}], 0x2, 0x0) gettid() 02:03:33 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000002000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa00006e0000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000020000000000000000000002002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f000000000000000000000000000044fc736530000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800"/592]}, 0x2c8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000002000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa00006e0000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000020000000000000000000002002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f000000000000000000000000000044fc736530000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800"/592]}, 0x2c8) 02:03:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r0, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000140)=0x80, 0x1800) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000180)={0x1}, 0x1) ioctl(r0, 0x11000008912, &(0x7f0000000000)="11dca50d6c0bcfe47bf070") r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x82) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000580)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_RUN(r5, 0xae80, 0x0) dup3(r3, r4, 0x0) ioctl$KVM_SET_CPUID(r5, 0x4008ae89, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000009f000040000018833b"]) dup2(r2, r5) 02:03:33 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x7fffffff, 0x40000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x2c, r2, 0x605, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x10, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, '\x00'}}}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10020408}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r2, 0x800, 0x70bd2d, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0xfff, 0x200, 0xfffffffffffffff7, 0x4}}}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000}, 0x4028014) ioctl$sock_ifreq(0xffffffffffffffff, 0x8947, &(0x7f0000000080)={'s\x00\x00\xef\xff\xff\xff\xf2\xff\xff\xff\x00', @ifru_flags}) [ 223.990274][ T9145] Enabling of bearer rejected, illegal name 02:03:33 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000000)=0x3) r2 = dup2(r1, r0) write$FUSE_IOCTL(r2, &(0x7f0000000280)={0x20}, 0x20) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r3, 0xc00caee0, &(0x7f0000000140)={0x81}) r4 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r4, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14) [ 224.039035][ T9147] Enabling of bearer rejected, illegal name 02:03:33 executing program 2: openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x800, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x300}) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 02:03:33 executing program 0: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000800)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1300000036ffff018000000600395032303030"], 0x13) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfe47bf070") mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c00f0a50bec55e68aae33e87e7e3e91a75d75944528848a6890a7ddd48bd33c2122380d8fc608ee63751343df786afc5c13085e54f238fe094c313a149e512b6c9f247026e39ee18615eb541d6a3e00000000"]) 02:03:33 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 02:03:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'sit0\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x806, r2, 0x1, 0x0, 0x6, @dev}, 0x14) clone(0x200, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="45e46f4c9bd099e3383d456f15624f626bc77b7065735010a4") sendmmsg(r1, &(0x7f0000000d00), 0x400004e, 0x0) 02:03:34 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x8000, 0x0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000080)=""/220) 02:03:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x100000b, 0x1010, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x11, 0x82, 0x0, &(0x7f0000000080)) [ 224.536798][ T26] audit: type=1804 audit(1567735414.252:40): pid=9153 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir734535609/syzkaller.4ZmHLb/18/file0" dev="sda1" ino=16611 res=1 02:03:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="d5bef78c18b958ffc2620b3800a6239ebce1d9f19058cf65e92250aba302cec5f8c9e02282097339154a6a75fd257f13d60f7478045294fdebc97cabf28fec9ef3806dc01117df2d11ce741ae50fd457e1"], &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x8000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f00000002c0)={0x5, 0x9, 0x1f, 'queue1\x00', 0xffffffff80000000}) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:03:34 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)) syz_open_pts(r0, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @mcast1}, 0x1c) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x1f}}, r6}}, 0x30) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000240), r6, 0x20}}, 0x18) vmsplice(r3, &(0x7f0000000000), 0x60, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:03:34 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f00000000c0)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x24) listen(r0, 0x9) listen(r0, 0x0) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2) 02:03:34 executing program 0: setpgid(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = dup(0xffffffffffffffff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000000000000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) setxattr$security_ima(0x0, 0x0, &(0x7f0000000080)=@v2={0x3, 0x0, 0x0, 0xffffffffffffff29, 0x1d, "e1994f5f6c7f8c5859447b10dc16304dbe62af9ec16ae05bf99cfc70a5"}, 0x27, 0x4) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104320, &(0x7f00000000c0)={0x3, &(0x7f0000000280)="bbc44964775d085f2615ba53014e01ab4ff08e1cbdb1f7005c399953959a7b4e50b247100b74d29fa1c68f10cd4c90ff972c20eae6af2e43542f2a2b59d2e8d2fd5ba3ce1c9ffbbe502b048fc711e923d6fdaea8a22474f25db22e515cad441a4c5fd587b41f74d816281a1d817504b632661daa0882fde219fbbd9bc829aa36dc6ad262d82983d045803400bd19ab8e4107"}) 02:03:34 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x2c8) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 02:03:34 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x61345a7b02a0160d, 0x43) r2 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x4, 0x401, 0xfffffffffffffff8, 0x7, 0x6}, &(0x7f0000000180)=0x14) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000240)=r3, 0x4) r4 = syz_open_dev$dspn(&(0x7f00000002c0)='/dev/dsp#\x00', 0x3a38000, 0x242000) openat(r4, &(0x7f0000000300)='./file0\x00', 0x101002, 0x4) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mtu(r5, 0x0, 0xa, &(0x7f0000000280)=0x4, 0x4) fanotify_init(0x0, 0x181a00) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000040)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f00000001c0)={0x0, 0x0, 0xfffffffffffffff9}) 02:03:34 executing program 4: socket$netlink(0x10, 0x3, 0x4) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x685c2b3d, 0x880) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x7, [@default, @null, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x80, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x43, &(0x7f0000000100)={0x0, 0x7530}, 0x10) 02:03:34 executing program 0: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000180)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_GET_SERIAL(r0, 0xc0104307, &(0x7f0000000080)=0x10000) r1 = dup(0xffffffffffffffff) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000000)) 02:03:35 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x11) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r1, 0x29, 0x19, 0x0, 0x2a0) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000400)) sendmsg$sock(r0, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) recvmsg$kcm(r0, &(0x7f0000000980)={&(0x7f0000000280)=@in6={0xa, 0x0, 0x0, @local}, 0x80, 0x0}, 0x2000) r2 = syz_init_net_socket$ax25(0x3, 0x3, 0xc3) sendmsg$sock(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="88d748a435cdf91cfaf14d9c196ecc6404ef34f2bc36e987c239481e64d6dd55b63dbdd19565deecfe2cd172f3e123b9757cc45aa8d4fe1dc2f9916b6666fc51ace9488a0ab01952826949a356fd702e1deb57e590991a579617964967cb0de8cdcc5f43095360278349fc873749e3bfc0459dcf8f4b59cdedcc67a2e504f8a90abc96ea9f0501e0c48ce5", 0x8b}, {&(0x7f00000000c0)="65065f121b18ffcb1a908336593623f09eedf23cb251a6243b12c9e0262717bde19cbb56bb72f2afe9e3de3c586579f0ff516b8d8fb5efc0bdcb8a79b098fe19708d44110a23a5c22b9a3d595c1c0c09451be5f393149034f3a6361c2754c551316a6b7355ba5b9d25acc01fbaa1c4733b7571901798901f7e32ceed86e23681ee17aec0e5d76a3e5ee536dbdfb1122db2acdd6eec9106c5943e79fb38526b9510f152e6e65b22c0d27e106e52b510d46839a4ca9eebb9c53f3cc8b98c831a27dd1685310f8d7e1e5ce4b9", 0xcb}, {&(0x7f00000001c0)="e8447b4da9f85f0ae6d0ac0e091249dfa2ec6726b49ec2c2c17ae31b367164bbab6567b60aded156a72238694f3b1170840d31f04ecdee8e137604597ba0b8783b3a15ca7ebd1b7a3f14866d91d2380586137fbbaaa333b3ae", 0x59}], 0x3, &(0x7f0000000300)=[@timestamping={{0x14, 0x1, 0x25, 0x7ff}}, @txtime={{0x18, 0x1, 0x3d, 0x88c0}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x100000001}}], 0xa8}, 0x4000110) 02:03:35 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000380), 0x10) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$can_raw(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@can={{0x4, 0x2, 0x8, 0x1000}, 0x20000000008, 0x3, 0x0, 0x0, "d3dfe7c3bfbab782"}, 0x10}}, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x400000, 0x0) bind$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e20, 0x8, @loopback, 0x400}, 0x1c) r2 = socket(0x10, 0x800000000080002, 0x0) r3 = socket$inet6(0xa, 0x4, 0x0) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0x75, &(0x7f00000001c0)={r6, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000080)=0x98) setsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000180)={r6, 0xffffffff, 0x7, 0x3}, 0x10) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000080)=0x100, 0x4) 02:03:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x5000, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000280)="11dca50d5e0bcfe47bf070") r2 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000100)=0xffffffff, 0x4) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xd1, &(0x7f00000001c0)=0x3f, 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/hwrng\x00', 0x800, 0x0) r3 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000000)=0x3) r5 = dup2(r4, r3) write$FUSE_IOCTL(r5, &(0x7f0000000280)={0x20}, 0x20) r6 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r7 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000b00)=@random={'user.', 'eth1\x00'}, &(0x7f0000000b40)=""/215, 0xd7) fcntl$F_SET_FILE_RW_HINT(r7, 0x40e, &(0x7f0000000000)=0x3) r8 = dup2(r7, r6) write$FUSE_IOCTL(r8, &(0x7f0000000280)={0x20}, 0x20) ioctl$TCXONC(r8, 0x540a, 0x80) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001d00810ee00f80ecdb4cb9e307f029a00d0000002f003efb0a0002000300000000000f00060005000600", 0x2e}], 0x1}, 0x0) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r9, 0x29, 0x19, 0x0, 0x2a0) sendmsg$inet6(r9, &(0x7f0000000a80)={&(0x7f0000000180)={0xa, 0x4e21, 0xfffffffffffffff7, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x6}, 0x1c, &(0x7f0000000780)=[{&(0x7f00000002c0)="87279af7f2ffdda1ea9bdc528e9bf7846f02bc06f95c25904db5b330fe39b6029b0c578384a9478dab7869f07e5f0d95b16c9c70ec197dd4690a8145f1d8ad68d0873cec03ed597dee9e622dea822196125a9fe2188d8eeb3251f9ae9ff186ac9c90f15452dea8a948737a1f5661606c38a4fd2b6e959d3c6720ffcc86c3bd3027f419dcad3241970b0c44a176acbf076534adcba8a33be48c795347f17697a1c36548ee79d86222036a7aa5926cb131da6ddc9c9d18886a74e5f677fdfbcae76150644cccaf80fcf28a79f3ffcb9993561e8b011d8fd4d5de0a", 0xda}, {&(0x7f00000003c0)="ef79366e0594af4d3fa53f0ea49b890c3365958baa07bba29367e0faa99caa78f3c531713886307cbccbb20c60dec33386d99e2cc3c4a2fa06133fdf7c956a58260b393d646bc0c75bdd3fb6da95112bee1669a0eb525113ea1927d607752a9ed87e23abb94aa3ee8689765264df1e63a081db74a371520e39448b0161b8b27b2a8fdc1e0091589213c1c6b6bd96a6b9bcb391e5e682a4041532b9829573fe1c4d12b56c756c1f2e58cd065e91d7f83642692eb7c7ec9f1ead9f9839acc5329caa171c335037c22186751164b7c80fcdeee23280e49c5d6f83ec4b21ed08d0cb5a0185", 0xe3}, {&(0x7f0000000240)="f124fbe405d3d6f14ed18732af0665cedfddfc442dda26cbd3d618f81d79ec58742f1864d17d", 0x26}, {&(0x7f00000004c0)="c4f12b5ed86a2b89d73cd7a81ff3c9fe644dbf0b5fc4c74e4d3101f390df589a92e2ea2bc4ce840f4b18c0903d2dcdbc8d21c4668798a177005f348b853f0c3b4d9298c3ab02f3020286c6b8588a34b3bea97bb96b3a0ed2995111552aa2c7d80d6a50a1cd8b4f6cd508a02d075d446d6f4e7b08020f9a6452ecda2e27deb3464e72afffdedb068bb5b8a40f7c6aed94e06fbf4e9e3c69064d4ca3dd31ec86f25e29", 0xa2}, {&(0x7f0000000580)="08e55938ab2d3710e0d7c8d1e4aa39b5f3b3ef8c772a8d379bdab0b4be402977d2", 0x21}, {&(0x7f00000005c0)="af72a7635d656700539b7ec37238ee3b172d34be9b0c5e322cc73a29cb299487c2384b25d3a377118fb859a420417b121e934f391ec7427f96205d5127b801176afcf14bd02aa5185c92efc42058a4", 0x4f}, {&(0x7f0000000640)="da1399995c6a157f9a783b616566d59c76d9875755965dca4c7b281b50becb14b21bb721cd8826b51b84139abf06d43513964573f02bc6c806c93fb14042a8c5d55df31340e6243e076373f5b16600320bfec74d40cbd39cc2d953bbcb29a1", 0x5f}, {&(0x7f00000006c0)="e52177f349eca7ccc6b1956b662bb9abbd490b6d5aacec634a9bcee693f75ae9127b1982f6d85f39f08e7df1677379e5a61725cbdd4d8e7c6cabd4e0c1227f9bf0fe3a6852bf1fdd2645c228d1032ceeef4e56db449a5f29092bc46310762865f9031f24b3e5806445163d046ed0afca329a28ac44e133af96ea58ec54c896ddfdcbd9ba7bbd6f2090c05f28b1", 0x8d}], 0x8, &(0x7f0000000800)=[@rthdr_2292={{0xa8, 0x29, 0x39, {0x0, 0x12, 0x5, 0xfff, 0x0, [@loopback, @mcast2, @local, @mcast1, @local, @remote, @mcast2, @loopback, @empty]}}}, @dstopts_2292={{0x168, 0x29, 0x4, {0x2c, 0x29, [], [@calipso={0x7, 0x20, {0x0, 0x6, 0x2, 0x38000000000000, [0x4, 0x0, 0x4]}}, @enc_lim={0x4, 0x1, 0x9}, @pad1, @generic={0x2, 0x50, "e5c926f1788ea6309ecb2ac143e268f4c2eb5661df22b6fe61905d6306e4e931f9db5aa2ae99b8af73406e3eb2f49ff1b0f9b8f9969e051d58ee564d9d55ad4c4fe51ec53ac2feb0449a48c327cf02bc"}, @calipso={0x7, 0x40, {0xffffffff, 0xe, 0x9, 0x100, [0x0, 0x7, 0x100, 0x91, 0x1ff, 0x8b6d, 0x2]}}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, [], 0x2b}}, @jumbo={0xc2, 0x4, 0x100}, @calipso={0x7, 0x18, {0x200000000, 0x4, 0x6, 0x10000, [0xa0, 0x4]}}, @calipso={0x7, 0x50, {0x3, 0x12, 0x7, 0x8, [0x4, 0x7f, 0x3, 0x80000000, 0x3, 0xbf, 0x7, 0x7f, 0x6]}}, @padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @dstopts_2292={{0x48, 0x29, 0x4, {0x3b, 0x5, [], [@hao={0xc9, 0x10, @rand_addr="d45cf28221ef00957346e9c2c9992bc3"}, @jumbo={0xc2, 0x4, 0xfa}, @hao={0xc9, 0x10, @empty}]}}}], 0x258}, 0x800) 02:03:35 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x2c8) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 02:03:35 executing program 5: r0 = socket$inet6(0xa, 0x9, 0x8010000000000084) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$describe(0x6, r1, 0x0, 0xffffffb0) add_key(&(0x7f0000000040)='trusted\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="be4facba94acd5327e6f418199cd91070611c7b55ba2ad61d8bd8b39374890ca086740b8057844ec06e72ed879910f6faec4325cc674633538fc553214be66a306069d4c0bc169a43b04029cfac1370c70edaf2e3ef29339636c962eafddcea234f8f71752c4c08eab215e4074e4634192408367d68bae0c4783a0bbd4af09b64630224d00754ee5bbd3c833af50b9c962dc1a06f4698bd6798fe26d46c3db9c054d4cc0031a08cbdf0448a2e54d8c0c3888278725ee5a6d6e44032c155e4a", 0xbf, r1) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x20) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) accept4(r0, 0x0, 0x0, 0x0) r3 = gettid() r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r5 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) r6 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e22, 0x7, @remote}}, 0x4, 0x8, 0x0, 0x3, 0x30}, &(0x7f0000000300)=0x98) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000340)={r7, 0x7, 0x3, [0x95, 0xb6, 0xfff]}, &(0x7f0000000380)=0xe) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) clock_gettime(0xe, &(0x7f00000001c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r8+30000000}}, 0x0) tkill(r3, 0x20000000016) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 225.491250][ T26] audit: type=1804 audit(1567735415.212:41): pid=9235 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir329384342/syzkaller.5B3dct/21/file0" dev="sda1" ino=16605 res=1 [ 225.522475][ T9235] bridge: RTM_DELNEIGH with unconfigured vlan 6 on bridge0 [ 225.582932][ T9247] bridge: RTM_DELNEIGH with unconfigured vlan 6 on bridge0 [ 225.602638][ T26] audit: type=1804 audit(1567735415.242:42): pid=9235 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir329384342/syzkaller.5B3dct/21/file0" dev="sda1" ino=16605 res=1 [ 225.711140][ T26] audit: type=1804 audit(1567735415.302:43): pid=9235 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir329384342/syzkaller.5B3dct/21/file0" dev="sda1" ino=16605 res=1 [ 225.774511][ T26] audit: type=1804 audit(1567735415.302:44): pid=9248 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir329384342/syzkaller.5B3dct/21/file0" dev="sda1" ino=16605 res=1 02:03:35 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x1) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x100000890f, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") close(r0) r2 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, r2, 0x401, 0x3, 0x7, 0x5e87}) r3 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000000)={0x6, [0x2, 0x2, 0x101, 0x3f, 0x100, 0x5]}, 0x2cf) 02:03:35 executing program 4: r0 = creat(0x0, 0x54) setsockopt$inet6_buf(r0, 0x29, 0xdb, &(0x7f0000000640)="ecc8c57ce5d4de778bd8ec0f268410b124922727f3e31b7b8f4531115d47523ee6f169d085bb568c16d4b1972a785c69e7aa0f22d1937e5e9f6c9a55667c9a5d918a0251c8ab4207de4b86b08a01df0a392b83c851bbc911cc190cb5ba0c145840d6cf191addf6183601", 0x6a) write$binfmt_aout(r0, &(0x7f0000000500)={{0xcc, 0x0, 0x10000, 0x0, 0x82, 0x0, 0x0, 0x149}, "bcc7373affd2d51975edcaa0c20ef85176906e26f8ed2843752f32e8841665ee4ce473a48b8251c4616d92820a4e82edc7538709"}, 0x54) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) write$cgroup_subtree(r1, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88d\xc4W\x8a\xd7\x00k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x89\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xb6\xe9\xd3\x0f\bZ'}]}, 0x7f) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f0000000080)) sendto$inet6(0xffffffffffffffff, &(0x7f0000000a40)="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", 0x529, 0x8000, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) getpid() pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$zero(0xffffffffffffff9c, &(0x7f0000000700)='/dev/zero\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000436000/0x18000)=nil, &(0x7f0000000780)=[@text16={0x10, &(0x7f0000000740)="0f01c9360f00d4f30fc732b85c008ec8baf80c66b826f7188666efbafc0cb84dbeeff20f0119ba400066b80c00000066ef26f080a898000cb8ff008ed8f4", 0x3e}], 0x1, 0x1a, &(0x7f00000007c0), 0x0) semget$private(0x0, 0x0, 0x0) r3 = dup(0xffffffffffffffff) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000002c0)) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0xfff, 0x200, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x1000, 0x7, 0x1ff, 0x7fffffff, 0x0, 0x5, 0x0, 0x3, 0x3, 0xff, 0x0, 0x9, 0x3, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={&(0x7f0000000440), 0x4}, 0xc2, 0x63, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x2, 0xffffffffffffffff, 0x9) creat(&(0x7f0000000040)='./file0\x00', 0x0) syncfs(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x5) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000003c0)={'filter\x00'}, &(0x7f0000000000)=0x54) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/attr/current\x00', 0x2, 0x0) read(0xffffffffffffffff, &(0x7f00000007c0)=""/19, 0x13) [ 225.840755][ T26] audit: type=1804 audit(1567735415.302:45): pid=9235 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir329384342/syzkaller.5B3dct/21/file0" dev="sda1" ino=16605 res=1 02:03:35 executing program 2: r0 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000000)=0x3) r2 = dup2(r1, r0) write$FUSE_IOCTL(r2, &(0x7f0000000280)={0x20}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', r2}, 0x10) r3 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r3, &(0x7f0000000000), 0x3) ioctl$int_in(r3, 0x800000c0045009, &(0x7f0000000100)=0x3) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f00000001c0)=0x4, 0x8) ioctl$int_in(r3, 0x800060c0045005, &(0x7f0000000140)=0x5ad) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r4, 0x29, 0x19, 0x0, 0x2a0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r5, 0x29, 0x19, 0x0, 0x2a0) sendfile(r4, r5, &(0x7f0000000200), 0x47a47d94) 02:03:35 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002700)=""/146, 0x92}, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) getresuid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@multicast2, @in=@multicast1}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f00000004c0)=0xe8) syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000040)='./bus\x00', 0x8, 0x3, &(0x7f0000000240)=[{&(0x7f0000000080)="7aa955766f0e35a6378aa4642a38ce9cb69a774450f16d8fab0964a18c56cc322a5962c95e", 0x25, 0x3}, {&(0x7f0000000180)="d4193ba06d83712b939526c1e9b3c58efc4786be9a3c68d59f2106866d914d19b458cda57b0ce608331b470fac16a53e05fe0c7a5279a3c8c0986d48fee2280ebeb205c3257e74efe785b7386618c03b148735820823eac6b9b16215330e214e4ebb69bfbd11863600b237f03158cf23e3d7e1", 0x73, 0x4}, {&(0x7f0000000100)="25e7ec0f1a5c279057c6f4a8bdb3f473cff03afa62f45789b599fcce59bcd9d4d7d9ebb6", 0x24}], 0x1800b, &(0x7f0000000880)={[{@fault_injection={'fault_injection', 0x3d, 0x5}}, {@fault_injection={'fault_injection', 0x3d, 0x101}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}, {@smackfstransmute={'smackfstransmute'}}, {@euid_eq={'xuid'}}, {@appraise_type='appraise_type=imasig'}, {@obj_type={'obj_type', 0x3d, '+%'}}, {@subj_type={'subj_type', 0x3d, 'cpusetproc%\'::'}}, {@fsmagic={'fsmagic'}}]}) r1 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000840)={0x5, &(0x7f0000000800)=[{0x33847c51, 0xa93}, {0x5, 0x7}, {0xffff, 0x12bbd335}, {0x3f, 0x7}, {0x8, 0x7f}]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000200)={0x0, 0x100000001, 0x1}, &(0x7f0000000600)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f0000000640)={0x4, "f60233a996d74c5264b0a0c5264b24876bc53ae9a6067c0465aa9d2e90d609ab", 0x1, 0x638, 0x9, 0x100000, 0x1dc8880dcc24d5cd}) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) sendto$llc(r0, &(0x7f00000006c0)="a6bba1ec3c90d8778bf172ccbd574c8bbb3c17dbbd2c79346084d0f9d5f06a8fe3458bb2286f2c322c04709db0e177836d6d170873fca4f67a22c2748e727ac6f3ccb4", 0x43, 0x0, &(0x7f0000000740)={0x1a, 0x7d4e, 0x100000001, 0x7, 0x0, 0x33c, @dev={[], 0x11}}, 0x10) syncfs(r2) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x10, &(0x7f00000000c0), 0x4) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) 02:03:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r2, 0x0, 0x1, &(0x7f0000000080)=0x400, 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r3, 0x0, 0x1, &(0x7f0000000080)=0x400, 0x4) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xffffffffffffffbb) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={r4, @loopback, @remote}, 0xc) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={r6, @loopback, @remote}, 0xc) sendmsg$nl_route(r0, &(0x7f00000087c0)={0x0, 0x0, &(0x7f0000008780)={&(0x7f00000000c0)=@newlink={0xfffffffffffffeff, 0x10, 0x505, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1000, 0xbc98ea1c9f68c508}, [@IFLA_LINKINFO={0x84, 0x12, @erspan={{0xc, 0x1, 'erspan\x00'}, {0x74, 0x2, [@IFLA_GRE_REMOTE={0x8, 0x7, @broadcast}, @gre_common_policy=[@IFLA_GRE_ENCAP_SPORT={0x8, 0x10, 0x4e23}, @IFLA_GRE_ERSPAN_VER={0x8, 0x16, 0x1}, @IFLA_GRE_LINK={0x8, 0x1, r4}], @IFLA_GRE_LOCAL={0x0, 0x6, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IFLA_GRE_LOCAL={0x8, 0x6, @empty}, @gre_common_policy=[@IFLA_GRE_IKEY={0x8, 0x4, 0x3ff}, @IFLA_GRE_LINK={0x8, 0x1, r6}, @IFLA_GRE_ERSPAN_DIR={0x8, 0x17, 0x1}, @IFLA_GRE_TTL={0x8, 0x8, 0x3}, @IFLA_GRE_ERSPAN_INDEX={0x8, 0x15, 0xe9b12}], @IFLA_GRE_REMOTE={0x8, 0x7, @rand_addr=0xfffffffffffffff9}, @IFLA_GRE_LOCAL={0x8, 0x6, @multicast1}]}}}]}, 0xa4}}, 0x0) 02:03:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) get_robust_list(0x0, 0x0, &(0x7f0000000040)) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x1, @random="5fa60adba055", 'hsr0\x00'}}, 0x1e) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, 0x0, 0x0) sendmmsg(r0, &(0x7f000000d180), 0x2000bda443fd3c7, 0x0) [ 226.191259][ T9288] erofs: fill_super, device -> loop3 02:03:35 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x2c8) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000002000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa00006e0000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000020000000000000000000002002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f000000000000000000000000000044fc736530000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800"/592]}, 0x2c8) [ 226.239516][ T9288] erofs: options -> fault_injection=0x0000000000000005,fault_injection=0x0000000000000101,smackfsfloor=GPL,smackfstransmute=,xuid=00000000000000000000,appraise_type=imasig,obj_type=+%,subj_type=cpusetproc%'::,fsmagic=0x0000000000000000, 02:03:36 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(0x0, 0x0, 0x2) r2 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r3, 0x40e, &(0x7f0000000000)=0x3) r4 = dup2(r3, r2) write$FUSE_IOCTL(r4, &(0x7f0000000280)={0x20}, 0x20) ioctl$UI_ABS_SETUP(r4, 0x401c5504, &(0x7f0000000000)={0x8, {0x9, 0x8, 0x3f, 0x100000000, 0x8c1}}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{}, {}, 0x2, 0x1, 0x4}) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x1b17) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl(r5, 0xffffffffffffffb2, &(0x7f0000000000)) socket$nl_route(0x10, 0x3, 0x0) dup3(r1, r0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x80) [ 226.427257][ T9288] erofs: cannot find valid erofs superblock [ 226.471363][ T9288] erofs: unmounting for loop3 [ 226.492711][ T26] audit: type=1804 audit(1567735416.212:46): pid=9302 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir329384342/syzkaller.5B3dct/23/file0" dev="sda1" ino=16551 res=1 02:03:36 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, &(0x7f0000000000)='rw\x00', 0x0, 0x0) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, 0x0, &(0x7f0000000240)=0x15b) r1 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000000)=0x3) chdir(&(0x7f0000000200)='./file0\x00') r3 = dup2(r2, r1) write$FUSE_IOCTL(r3, &(0x7f0000000280)={0x20}, 0x20) write$P9_RVERSION(r3, &(0x7f00000001c0)={0x15, 0x65, 0xffff, 0x8001, 0x8, '9P2000.L'}, 0x15) r4 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x400, 0x100000) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r4, 0x810c5701, &(0x7f0000000080)) [ 226.614128][ T9294] erofs: fill_super, device -> loop3 [ 226.671706][ T9294] erofs: options -> fault_injection=0x0000000000000005,fault_injection=0x0000000000000101,smackfsfloor=GPL,smackfstransmute=,xuid=00000000000000000000,appraise_type=imasig,obj_type=+%,subj_type=cpusetproc%'::,fsmagic=0x0000000000000000, 02:03:36 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(0x0, 0x1000, 0x200800) r2 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x100, 0x0, 0x100000000000, 0x5, 0x0, 0x0, 0x6, 0x0, 0x0, 0x10000080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200004, 0x0, 0x3, 0x712e, 0x8c703a5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x3, 0x4, 0x0, 0xfffffffffffffffd, 0x0, @perf_config_ext={0x438e, 0x400000000}, 0x1, 0x0, 0x0, 0xa9038bd476d50bd8, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x8) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000001c0)={0x8000}, 0x4) sendmmsg(r2, &(0x7f00000092c0), 0x400000000000064, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000140)={0x10, 0x0, 0x4}, 0x10) syz_open_pts(r0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) recvfrom$netrom(0xffffffffffffffff, 0x0, 0x25f, 0x6d376d3c5af79cf2, 0x0, 0xffffffffffffff9f) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') r3 = syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x4, 0x2ce2b32e220f3e3) fsetxattr$security_capability(r3, &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000300)=@v3={0x3000000, [{0x2d4, 0x6}, {0x6, 0x7}], 0xee00}, 0x18, 0x2) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4068aea3, &(0x7f0000000200)={0x0, 0x0, [0x7, 0x8, 0xff, 0x5f3a000000000000]}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x80000, 0x0) ioctl$PPPIOCSMRU1(r4, 0x40047452, &(0x7f0000000180)=0x3) 02:03:36 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x85\xeb\xe6e', 0xc00, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/92, 0x5c}], 0x1) [ 226.845633][ T9294] erofs: cannot find valid erofs superblock [ 226.888675][ T9294] erofs: unmounting for loop3 02:03:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3093a10a, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000100)={0x2, 0x3, "7fe917"}) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x18) uname(&(0x7f0000000440)=""/64) socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000300)=@gcm_256={{}, "8eae1f73110b9da0", "0246437c665aa356857fb21bffbdb7e65ee74bc45b815802db0f9af4ac0e7541", "51562085", "139891f89421801e"}, 0x38) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(r0, &(0x7f00000004c0)='stat\x00') ioctl$VHOST_GET_VRING_BASE(r5, 0xc008af12, &(0x7f0000000500)) removexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB='security@/trusted\x00']) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) setsockopt$ALG_SET_AEAD_AUTHSIZE(r3, 0x117, 0x5, 0x0, 0x50000000000) ioctl$DRM_IOCTL_SET_MASTER(r3, 0x641e) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x9, r0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r6+30000000}, 0x0) accept4$packet(r3, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0, 0x800) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000340)={0x1, 0x7, 0x61e9}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$RTC_PLL_SET(r3, 0x40207012, &(0x7f00000005c0)={0x0, 0x5, 0x0, 0x2, 0x9, 0xac7}) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[]}}, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f00000002c0)=0x100000) 02:03:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mlockall(0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200a00, 0x0) clone(0x804400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) fcntl$getown(r1, 0x9) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x7fffffff, 0x600000) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x500, 0x0) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0xf) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3000000010000108ae8bc38408000002000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800180000000000"], 0x30}}, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000000), 0x4) 02:03:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x60000008, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = gettid() tkill(r2, 0x3f) select(0x40, &(0x7f0000000040)={0x0, 0x9, 0xbed, 0x3, 0x92, 0x7, 0x9, 0x2}, &(0x7f0000000080)={0x0, 0x9, 0x1, 0x5, 0x1, 0x1000, 0x0, 0x7}, &(0x7f00000000c0)={0x1, 0x0, 0xffffffffffffff9d, 0x8, 0x7, 0x9, 0x3f, 0x2}, &(0x7f0000000100)={0x0, 0x7530}) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) write$P9_RGETLOCK(r1, &(0x7f0000000140)={0x33, 0x37, 0x1, {0x2, 0x7fffffff, 0x8, r3, 0x15, '/proc/self/net/pfkey\x00'}}, 0x33) r4 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r5 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r5, 0x40e, &(0x7f0000000000)=0x3) r6 = dup2(r5, r4) write$FUSE_IOCTL(r6, &(0x7f0000000280)={0x20}, 0x20) r7 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r8 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r8, 0x40e, &(0x7f0000000000)=0x3) r9 = dup2(r8, r7) write$FUSE_IOCTL(r9, &(0x7f0000000280)={0x20}, 0x20) write$apparmor_current(r9, &(0x7f0000000240)=@profile={'stack ', '/proc/self/net/pfkey\x00'}, 0x1b) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000200)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r10}}, 0x18) 02:03:38 executing program 4: socket$inet(0x2, 0x100002, 0x3) socket$vsock_dgram(0x28, 0x2, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0xff}, 0x0, 0x0) r2 = dup(r1) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000040)={0xb5, @multicast1, 0x4e23, 0x3, 'ovf\x00', 0x24, 0x401, 0x76}, 0x2c) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:03:38 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r1, 0x29, 0x19, 0x0, 0x2a0) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x10e4a566, 0x4) bind$x25(r0, &(0x7f0000000000)={0x9, @null=' \x00'}, 0x12) 02:03:38 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x0, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0}, 0x2c8) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 02:03:38 executing program 3: clock_settime(0x5, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r0, 0x29, 0x19, 0x0, 0x2a0) recvmmsg(r0, &(0x7f0000000240)=[{{&(0x7f0000000000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000080)=""/161, 0xa1}, {&(0x7f0000000140)=""/49, 0x31}], 0x2}, 0x2}], 0x1, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}) [ 228.694543][ T9348] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 02:03:38 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$bt_hci(r0, 0x84, 0x80, &(0x7f0000000080)=""/4096, &(0x7f0000000040)=0xfffffffffffffe4a) 02:03:38 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x0, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0}, 0x2c8) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 02:03:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="18020000ebffffff000000000000000085000000360000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1076, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001300)={r4, 0x0, 0xe, 0x0, &(0x7f0000000100)="a050c96ba4852f1a9c573105fd3a", 0x0, 0xe67}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', r4}, 0x10) fcntl$F_SET_FILE_RW_HINT(r3, 0x40e, &(0x7f0000000000)=0x3) r5 = dup2(r3, r2) r6 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r7 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r7, 0x40e, &(0x7f0000000000)=0x3) r8 = dup2(r7, r6) write$FUSE_IOCTL(r8, &(0x7f0000000280)={0x20}, 0x20) ioctl$VIDIOC_SUBDEV_G_EDID(r8, 0xc0285628, &(0x7f0000000240)={0x0, 0x200, 0x0, [], &(0x7f00000001c0)=0x101}) write$FUSE_IOCTL(r5, &(0x7f0000000280)={0x20}, 0x20) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000040)=""/121) openat$null(0xffffffffffffff9c, &(0x7f0000001340)='/dev/null\x00', 0x101000, 0x0) r9 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_NMI(r9, 0xae9a) ioctl$KVM_SET_MP_STATE(r9, 0x4004ae99, &(0x7f0000000000)=0x3) ioctl$KVM_RUN(r9, 0xae80, 0x0) [ 229.603182][ T26] kauditd_printk_skb: 1 callbacks suppressed [ 229.603196][ T26] audit: type=1804 audit(1567735419.322:48): pid=9367 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir498492816/syzkaller.Q11zhP/33/file0" dev="sda1" ino=16634 res=1 [ 229.751990][ T26] audit: type=1804 audit(1567735419.322:49): pid=9367 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir498492816/syzkaller.Q11zhP/33/file0" dev="sda1" ino=16634 res=1 02:03:39 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000000)=0x3) r5 = dup2(r4, r3) write$FUSE_IOCTL(r5, &(0x7f0000000280)={0x20}, 0x20) ioctl$MON_IOCQ_URB_LEN(r5, 0x9201) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f00000001c0)=ANY=[@ANYBLOB="020000000000000001000000e9bb9e08000000000000c940f99ccc2932"]) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000000c0)={0x7b, 0x5, [0x480, 0x11e57ed0], [0xc1]}) [ 229.874645][ T26] audit: type=1804 audit(1567735419.462:50): pid=9369 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir498492816/syzkaller.Q11zhP/33/file0" dev="sda1" ino=16634 res=1 02:03:39 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x2, 0x0, 0xfffffffffffffc5d) [ 230.001694][ T26] audit: type=1804 audit(1567735419.472:51): pid=9369 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir498492816/syzkaller.Q11zhP/33/file0" dev="sda1" ino=16634 res=1 02:03:39 executing program 5: socket$kcm(0x10, 0x4000000002, 0x10) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e0000002c008151e00f80ecdb4cb904014865160b0001410180ffff000000110e0006001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x101100, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0x75, &(0x7f00000001c0)={r4, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000080)=0x98) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={r4, 0x5}, 0x8) [ 230.186400][ T26] audit: type=1804 audit(1567735419.492:52): pid=9369 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir498492816/syzkaller.Q11zhP/33/file0" dev="sda1" ino=16634 res=1 [ 230.238060][ T26] audit: type=1804 audit(1567735419.902:53): pid=9376 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir329384342/syzkaller.5B3dct/27/file0" dev="sda1" ino=16635 res=1 02:03:40 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x0, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0}, 0x2c8) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 02:03:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5000008912, &(0x7f0000001600)="11dca50d5e0bcfe47bf070") socketpair(0x18, 0x0, 0x1, &(0x7f0000000180)={0x0, 0x0}) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000040)="508084469c618b53afea6ce80a9a02acec27d78e455d0fde9801b00b28ddb9e036f694c0d41b112291eb7da554010b40ab5c66efc6159c5feb279e42a9ec47cba1ff0a1bb118447d2f4e2805a73532bec415427debbded0db1a86c3d04039f6fb06c7751ee379e9dc12ae35629c01f12c6465bbadd3c779204602bc52b8d959cd27e1bdf1a3580f889165ca06f2e82089d8f373bc82ee01cb3fbd74951422516a554c798cc5f23834131f0bf7e2ead4fc1c9694dc90eb7e26c8b6b81e0b0f05117b2d087dfecf9c5a3d3") setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x6, 0x4) r1 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000000)=0x3) r3 = dup2(r2, r1) write$FUSE_IOCTL(r3, &(0x7f0000000280)={0x20}, 0x20) ioctl$TIOCSIG(r3, 0x40045436, 0x1b) 02:03:40 executing program 3: r0 = socket(0x10, 0x2, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r1, 0x29, 0x19, 0x0, 0x2a0) poll(&(0x7f0000000000)=[{r0, 0x8212}, {r1, 0x72}], 0x2, 0xffffffffffffffda) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(r0, &(0x7f000018efdc)="1100000052001f0014f9f4070009040002", 0x11) [ 230.387035][ T26] audit: type=1804 audit(1567735420.102:54): pid=9391 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir498492816/syzkaller.Q11zhP/34/file0" dev="sda1" ino=16646 res=1 02:03:40 executing program 4: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000000c0)=@ipx, 0x80, 0x0}}], 0x3fffffffffffe7e, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\x03\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\t\x870x0}, &(0x7f00000003c0)=0xc) fchownat(r5, &(0x7f0000000200)='./file1\x00', 0xee00, r6, 0x1000) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) 02:03:41 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x0, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[]}, 0x78) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 231.350171][ T9422] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 231.361913][ T9420] IPVS: length: 210 != 8 02:03:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mlockall(0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200a00, 0x0) clone(0x804400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) fcntl$getown(r1, 0x9) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x7fffffff, 0x600000) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x500, 0x0) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0xf) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3000000010000108ae8bc38408000002000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800180000000000"], 0x30}}, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000000), 0x4) [ 231.385064][ T26] audit: type=1804 audit(1567735421.102:55): pid=9420 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir919711032/syzkaller.9k6ASL/21/file0" dev="sda1" ino=16668 res=1 02:03:41 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000000)=0x3) r5 = dup2(r4, r3) write$FUSE_IOCTL(r5, &(0x7f0000000280)={0x20}, 0x20) ioctl$VIDIOC_S_INPUT(r5, 0xc0045627, &(0x7f0000000080)=0x6) sendto$inet6(r0, &(0x7f0000000100)="0503032206063e0000000200c52cf7c25975e605b02f08067f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3fb2, 0x0, 0x0, 0x0) 02:03:41 executing program 5: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000001f306d5f91a6a0260e092a8757b576979875373c589d97c964a1d7643c2b36b354a2f7f3db9e4e"], 0x20) close(r0) close(r1) [ 231.483867][ T9424] BFS-fs: bfs_iget(): Unable to read inode loop2:00000002 02:03:41 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02000f00000a01100000ff07000000ffffffee0000000000000000000000000000004200000000000000000000000000000000000000000000000000d3776150", 0x40, 0x1c0}]) r0 = syz_init_net_socket$llc(0x1a, 0x3, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf={0x9a, &(0x7f00000000c0)="44692155e561b3e396507029368eba9af3a1ca25959c505c571497a8977b7e3f83c590513cfed50be9ddbf35e288d0a36edde31deaf4497bd94423bbade0e5f5bafe2e4a6c7c4b59c424fd50058ebd0c7c4e4215dfda5199d9b58fd6afebcb54a67017ad482bbfffb990cd3a5930f12505cc038e6634d0daba00d725a08bc6b0a5bcb10d93a31bcab526519f9d0732a73ed992124ee52bdfac97"}) syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x5, 0x4ca0) 02:03:41 executing program 2: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0xc0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000000)=0x3) r2 = dup2(r1, r0) write$FUSE_IOCTL(r2, &(0x7f0000000280)={0x20}, 0x20) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r2, 0x80045300, &(0x7f0000000100)) syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@map_off='map=off'}]}) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0xde2, 0x40000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x400101, 0x0) ioctl$PPPIOCGFLAGS1(r3, 0x8004745a, &(0x7f00000000c0)) [ 231.637610][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 231.643831][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:03:41 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x0, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[]}, 0x78) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 231.779468][ T9448] loop5: [ICS] [ 231.779715][ T26] audit: type=1804 audit(1567735421.502:56): pid=9446 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir734535609/syzkaller.4ZmHLb/27/file0" dev="sda1" ino=16615 res=1 [ 232.007405][ T9454] ISOFS: Unable to identify CD-ROM format. [ 232.030227][ T9448] loop5: [ICS] [ 232.145149][ T26] audit: type=1804 audit(1567735421.862:57): pid=9454 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir498492816/syzkaller.Q11zhP/36/file0" dev="sda1" ino=16671 res=1 [ 233.074530][ T9472] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 233.145627][ T9469] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 02:03:43 executing program 0: r0 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000000)=0x3) r2 = dup2(r1, r0) write$FUSE_IOCTL(r2, &(0x7f0000000280)={0x20}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xf, 0xffffffa0}}, &(0x7f0000000200)='GPLz', 0x5, 0xc3, &(0x7f00000006c0)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0xfffffffffffffffd, 0x3}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000100)={{0xa, 0x4e22, 0x6, @rand_addr="393fc46cf4827e1728910bfbf50c2f49", 0x3ff}, {0xa, 0x4e21, 0x100, @rand_addr="014fa416a306582d5cfc3b5e754dc24a", 0x4}, 0x4e, [0x851c, 0x2, 0x5, 0xffffffffffff0001, 0x100000000, 0x5, 0xfffffffffffffffc, 0x772067a7]}, 0x5c) 02:03:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mlockall(0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200a00, 0x0) clone(0x804400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) fcntl$getown(r1, 0x9) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x7fffffff, 0x600000) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x500, 0x0) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0xf) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3000000010000108ae8bc38408000002000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800180000000000"], 0x30}}, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000000), 0x4) 02:03:43 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffff9, 0x80002) ioctl$FS_IOC_FSGETXATTR(r0, 0x80085504, &(0x7f0000000080)={0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x7ff0bdbe}) syz_open_dev$evdev(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0xfffffffffffffecf) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x40) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x20200, 0x102) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) memfd_create(&(0x7f0000000500)='/dev/usbmon#\x00', 0x1) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000600)=0x4) r4 = dup2(r3, r2) write$FUSE_IOCTL(r4, &(0x7f0000000280)={0x20}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x111, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f00000002c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r5, 0x1}}, 0x18) accept$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket$rxrpc(0x21, 0x2, 0x0) getgid() ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x2, 0xce) socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) r6 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x2a40) ioctl$RNDADDENTROPY(r6, 0x40085203, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/269]) r7 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r7, 0xffffffffffffffff) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000280)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = dup(0xffffffffffffffff) fchown(r10, r8, r9) getgid() 02:03:43 executing program 3: r0 = socket$inet6(0xa, 0x802, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x30, 0x0, &(0x7f0000000180)) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) 02:03:43 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x0, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[]}, 0x78) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 02:03:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r3, 0x40e, &(0x7f0000000000)=0x3) r4 = dup2(r3, r2) write$FUSE_IOCTL(r4, &(0x7f0000000280)={0x20}, 0x20) ioctl$KVM_GET_XCRS(r4, 0x8188aea6, &(0x7f0000000440)=ANY=[@ANYBLOB="060000002000000005000000000000000300000004000000010000000000000004000080000000000900000000000000c4000000000000003a08000000000000a15d0000000000007f0000000000000001000000000000000100000000000000cd22000000000000"]) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ftruncate(r5, 0x200004) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x2}, 0x8) ioctl$SIOCRSACCEPT(r5, 0x89e3) ioctl$TIOCSPGRP(r5, 0x5410, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x1, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x101000, 0x0) r6 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r7 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r7, 0x40e, &(0x7f0000000000)=0x3) r8 = dup2(r7, r6) write$FUSE_IOCTL(r8, &(0x7f0000000280)={0x20}, 0x20) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r8, 0xc0bc5310, &(0x7f00000004c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f00000003c0)={0x21d5, 0x4, 0x2, {0x0, 0x989680}, 0x1f, 0x9}) r9 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r10 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r10, 0x40e, &(0x7f0000000000)=0x3) r11 = dup2(r10, r9) write$FUSE_IOCTL(r11, &(0x7f0000000280)={0x20}, 0x20) r12 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r13 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r13, 0x40e, &(0x7f0000000000)=0x3) r14 = dup2(r13, r12) write$FUSE_IOCTL(r14, &(0x7f0000000280)={0x20}, 0x20) r15 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r16 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r16, 0x40e, &(0x7f0000000000)=0x3) r17 = dup2(r16, r15) write$FUSE_IOCTL(r17, &(0x7f0000000280)={0x20}, 0x20) ioctl$KVM_GET_API_VERSION(r17, 0xae00, 0x0) r18 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r18, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r18, 0x84, 0x64, &(0x7f00000002c0)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x29}}, @in6={0xa, 0x4e24, 0x27d, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7}, @in6={0xa, 0x4e22, 0x0, @remote}, @in6={0xa, 0x4e24, 0xffffffff80000000, @remote, 0xf109}, @in={0x2, 0x4e22, @multicast2}, @in6={0xa, 0x4e22, 0x1, @empty, 0x4}, @in6={0xa, 0x4e22, 0x7fffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7fff}, @in6={0xa, 0x4e23, 0x1, @empty, 0x4}], 0xc8) sendfile(r0, r5, 0x0, 0x80001d00c0d0) 02:03:43 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x100008d, 0x20a000) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x5382, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = accept$unix(r1, &(0x7f0000000080), &(0x7f0000000100)=0x6e) connect$unix(r2, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) 02:03:43 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f00000000c0)=0x7, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x1000000000004e23, @local}, 0x10) sendmsg$sock(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000002400)="18", 0x1}], 0x1}, 0x0) r1 = dup2(r0, r0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000180)='f', 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x1, 0x0) write$apparmor_exec(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="ca82a8666574317fb959af18ee94fa78efdddce08ff882b70be2ba75de2f09b24b0e2b6198fce248f7dd7ebf87ebf1c1817ab6d6e798f3e8d415892dd7a07997c5f9bc8104b7993cc76b5a3db8151ae9abc0d19420f6f51e0b80167f64db262c99d2a7ae5708d4012ba5650ff2e2546a00d07354316014409b435bd44cf8ebc9a9c04a940839f5a52bad1e094c89ad2018bf3f8f89a38b10bb168215373c02fbdedb34671fd51b78d1b5972d865b92da074b01ffc7961072c4bc6aaf480b63e96f8d334e05faba7dab43b3c2abc1b09dc9ac92b30f48bc7bbe0f0566b280bee9c7f9"], 0xc) r4 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r5 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r5, 0x40e, &(0x7f0000000000)=0x3) r6 = dup2(r5, r4) write$FUSE_IOCTL(r6, &(0x7f0000000280)={0x20}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000000040)={0x1ff, 0x2, 0x12006, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) 02:03:43 executing program 3: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x44880, 0x0) r0 = getpid() ptrace(0x10, r0) waitid(0x1, r0, 0x0, 0x80000002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r1, 0x29, 0x19, 0x0, 0x2a0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000000)=0x0) setpgid(r0, r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(r4, 0xaea3) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000640)=@broute={'broute\x06\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/368]}, 0x1e8) 02:03:43 executing program 5: socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = syz_init_net_socket$llc(0x1a, 0x3, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r2, 0x29, 0x19, 0x0, 0x2a0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r3, 0x29, 0x19, 0x0, 0x2a0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r4, 0x29, 0x19, 0x0, 0x2a0) r5 = accept$ax25(0xffffffffffffffff, &(0x7f0000000300)={{0x3, @rose}, [@remote, @null, @rose, @default, @rose, @remote, @netrom, @netrom]}, &(0x7f0000000380)=0x48) r6 = getpid() r7 = getpid() ptrace(0x10, r7) waitid(0x1, r7, 0x0, 0x80000002, 0x0) r8 = getpid() ptrace(0x10, r8) waitid(0x1, r8, 0x0, 0x80000002, 0x0) ptrace(0x10, r6) waitid(0x1, r6, 0x0, 0x80000002, 0x0) fstat(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x2a40) r11 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r11, 0x29, 0x19, 0x0, 0x2a0) ioctl$RNDADDENTROPY(r10, 0x40085203, &(0x7f00000002c0)=ANY=[@ANYRES64]) r12 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r12, 0xffffffffffffffff) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000280)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r10, r13, r14) r15 = fcntl$getown(0xffffffffffffffff, 0x9) r16 = geteuid() r17 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x2a40) ioctl$RNDADDENTROPY(r17, 0x40085203, &(0x7f0000000540)=ANY=[@ANYBLOB="bc0e00008f0000007624cef9f8cb1951518903774a9c0724fab4f086829647a47a7c2a7328afa84a51cdcbacde241817eb6169a0495fc39eafb306698319ae092db4f5df600017888a30d4d51c9e0ad39ce88ba131834a2d4bfeeceed15bdf16fb191d41a72314fea6a6eef433121c078fcd5c35055dc94e0862449330e252ea2330e31f31eba15d509de8b2f11518b82a871ecc37a55b20c6756b75eac872be879f"]) r18 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r18, 0xffffffffffffffff) getsockopt$sock_cred(r18, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000280)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r17, r19, r20) r21 = socket$kcm(0x29, 0xf, 0x0) r22 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r23 = openat$audio(0xffffffffffffff9c, &(0x7f0000000440)='/dev/audio\x00', 0x18000, 0x0) r24 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r24, 0x29, 0x19, 0x0, 0x2a0) r25 = accept4(0xffffffffffffffff, &(0x7f0000000500)=@isdn, &(0x7f0000000580)=0x80, 0x0) r26 = socket$nl_generic(0x10, 0x3, 0x10) r27 = socket$rxrpc(0x21, 0x2, 0xa) r28 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r28, 0x29, 0x19, 0x0, 0x2a0) r29 = getpid() ptrace(0x10, r29) waitid(0x1, r29, 0x0, 0x80000002, 0x0) r30 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r30, 0x29, 0x19, 0x0, 0x2a0) getsockopt$sock_cred(r30, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, &(0x7f0000000600)=0xc) r32 = getgid() sendmsg$unix(r0, &(0x7f0000000740)={&(0x7f0000000180)=@file={0x885b1eb98eb8fbf3, './file0\x00'}, 0x6e, &(0x7f00000002c0), 0x0, &(0x7f0000000640)=[@rights={{0x18, 0x1, 0x1, [r1, r2]}}, @rights={{0x18, 0x1, 0x1, [r3, r4]}}, @rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {r6, r9, r14}}}, @cred={{0x1c, 0x1, 0x2, {r15, r16, r20}}}, @rights={{0x34, 0x1, 0x1, [r21, r22, 0xffffffffffffffff, r23, r24, r25, r26, r27, r28]}}, @cred={{0x1c, 0x1, 0x2, {r29, r31, r32}}}], 0xe0, 0x40014}, 0x4) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r33 = open$dir(&(0x7f0000000100)='.\x00', 0x800, 0x0) mkdirat(r33, &(0x7f0000000200)='./file1\x00', 0x0) mkdirat(r33, &(0x7f0000000280)='./file1/file0\x00', 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) renameat2(r33, &(0x7f0000001700)='./file0\x00', r33, &(0x7f0000000000)='./file1/file0/file0\x00', 0x1) r34 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x798899ffe16d16ca, 0x0) ioctl$TIOCGSID(r34, 0x5429, &(0x7f0000000080)) 02:03:43 executing program 0: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x88000000000805, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r0, 0x29, 0x19, 0x0, 0x2a0) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x8, 0x913201) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ashmem\x00', 0x200, 0x0) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) setsockopt$sock_timeval(r0, 0x1, 0x43, &(0x7f00000000c0)={r2, r3/1000+10000}, 0x10) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x8) getsockopt$sock_timeval(r4, 0x1, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0xfffffffffffffdeb) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000100)=ANY=[], &(0x7f0000000140)) r6 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r7, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r8 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x9, 0xbc44a7237ef6b847) r9 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r10 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r10, 0x40e, &(0x7f0000000000)=0x3) r11 = dup2(r10, r9) write$FUSE_IOCTL(r11, &(0x7f0000000280)={0x20}, 0x20) ioctl$KVM_GET_MSRS(r11, 0xc008ae88, &(0x7f00000004c0)={0x4, 0x0, [{}, {}, {}, {}]}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r8, &(0x7f0000000440)={0x7, 0x8, 0xfa00, {r12, 0x80}}, 0x10) r13 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r13, 0x84, 0x1d, &(0x7f0000000000)=ANY=[@ANYBLOB="70e7fce859c59e99d4000000000000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r7, 0x84, 0x75, &(0x7f00000001c0)={r14, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000080)=0x98) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000340)={r14, @in6={{0xa, 0x4e24, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x10000005}}}, 0x90) 02:03:43 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x0, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB]}, 0x78) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 02:03:43 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0x75, &(0x7f00000001c0)={r4, @in={{0x2, 0x0, @multicast2}}}, &(0x7f0000000080)=0x98) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000000c0)={r4, @in={{0x2, 0x4e20, @broadcast}}}, &(0x7f0000000000)=0x84) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040)={r5, 0x2}, 0x8) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x2, @link_local, 'vxcan1\x00'}}, 0x1e) sendmmsg(r0, &(0x7f0000005b40), 0x4000000000001b2, 0x0) 02:03:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e02cfe47bf070") timer_create(0x100000000003, 0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000000)={0x2000000000000078, &(0x7f0000000040)}) timer_delete(0x0) 02:03:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r3, 0x40e, &(0x7f0000000000)=0x3) r4 = dup2(r3, r2) write$FUSE_IOCTL(r4, &(0x7f0000000280)={0x20}, 0x20) write$FUSE_NOTIFY_INVAL_INODE(r4, &(0x7f0000000000)={0x28, 0x2, 0x0, {0x4, 0x10001, 0x400}}, 0x28) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000002c0)=@nat={'nat\x00', 0x19, 0x0, 0xc0, [0x20000140, 0x0, 0x0, 0x20000170, 0x200001a0], 0x0, 0x0, &(0x7f0000000140)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0x7fffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x138) 02:03:44 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000280)={{0x3, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\xfa\x00<\x00'}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0, 0xfffffffffffffff9}) r1 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000000)=0x3) r3 = dup2(r2, r1) write$FUSE_IOCTL(r3, &(0x7f0000000280)={0x20}, 0x20) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r3, 0x4008642b, &(0x7f0000000080)={r4, 0x3e}) 02:03:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r3, 0x40e, &(0x7f0000000000)=0x3) r4 = dup2(r3, r2) write$FUSE_IOCTL(r4, &(0x7f0000000280)={0x20}, 0x20) ioctl$KVM_GET_XCRS(r4, 0x8188aea6, &(0x7f0000000440)=ANY=[@ANYBLOB="060000002000000005000000000000000300000004000000010000000000000004000080000000000900000000000000c4000000000000003a08000000000000a15d0000000000007f0000000000000001000000000000000100000000000000cd22000000000000"]) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ftruncate(r5, 0x200004) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x2}, 0x8) ioctl$SIOCRSACCEPT(r5, 0x89e3) ioctl$TIOCSPGRP(r5, 0x5410, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x1, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x101000, 0x0) r6 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r7 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r7, 0x40e, &(0x7f0000000000)=0x3) r8 = dup2(r7, r6) write$FUSE_IOCTL(r8, &(0x7f0000000280)={0x20}, 0x20) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r8, 0xc0bc5310, &(0x7f00000004c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f00000003c0)={0x21d5, 0x4, 0x2, {0x0, 0x989680}, 0x1f, 0x9}) r9 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r10 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r10, 0x40e, &(0x7f0000000000)=0x3) r11 = dup2(r10, r9) write$FUSE_IOCTL(r11, &(0x7f0000000280)={0x20}, 0x20) r12 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r13 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r13, 0x40e, &(0x7f0000000000)=0x3) r14 = dup2(r13, r12) write$FUSE_IOCTL(r14, &(0x7f0000000280)={0x20}, 0x20) r15 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r16 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r16, 0x40e, &(0x7f0000000000)=0x3) r17 = dup2(r16, r15) write$FUSE_IOCTL(r17, &(0x7f0000000280)={0x20}, 0x20) ioctl$KVM_GET_API_VERSION(r17, 0xae00, 0x0) r18 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r18, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r18, 0x84, 0x64, &(0x7f00000002c0)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x29}}, @in6={0xa, 0x4e24, 0x27d, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7}, @in6={0xa, 0x4e22, 0x0, @remote}, @in6={0xa, 0x4e24, 0xffffffff80000000, @remote, 0xf109}, @in={0x2, 0x4e22, @multicast2}, @in6={0xa, 0x4e22, 0x1, @empty, 0x4}, @in6={0xa, 0x4e22, 0x7fffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7fff}, @in6={0xa, 0x4e23, 0x1, @empty, 0x4}], 0xc8) sendfile(r0, r5, 0x0, 0x80001d00c0d0) [ 235.030493][ T26] kauditd_printk_skb: 19 callbacks suppressed [ 235.030509][ T26] audit: type=1804 audit(1567735424.752:77): pid=9556 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir498492816/syzkaller.Q11zhP/38/file0" dev="sda1" ino=16658 res=1 [ 235.147735][ T26] audit: type=1804 audit(1567735424.752:78): pid=9556 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir498492816/syzkaller.Q11zhP/38/file0" dev="sda1" ino=16658 res=1 [ 235.192608][ T26] audit: type=1804 audit(1567735424.772:79): pid=9556 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir498492816/syzkaller.Q11zhP/38/file0" dev="sda1" ino=16658 res=1 [ 235.227601][ T26] audit: type=1804 audit(1567735424.772:80): pid=9556 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir498492816/syzkaller.Q11zhP/38/file0" dev="sda1" ino=16658 res=1 [ 235.255259][ T26] audit: type=1804 audit(1567735424.772:81): pid=9556 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir498492816/syzkaller.Q11zhP/38/file0" dev="sda1" ino=16658 res=1 [ 235.287361][ T26] audit: type=1804 audit(1567735424.782:82): pid=9556 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir498492816/syzkaller.Q11zhP/38/file0" dev="sda1" ino=16658 res=1 [ 235.312464][ T26] audit: type=1804 audit(1567735424.782:83): pid=9556 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir498492816/syzkaller.Q11zhP/38/file0" dev="sda1" ino=16658 res=1 [ 235.338851][ T26] audit: type=1804 audit(1567735424.792:84): pid=9556 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir498492816/syzkaller.Q11zhP/38/file0" dev="sda1" ino=16658 res=1 [ 235.348027][ T9515] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 02:03:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mlockall(0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200a00, 0x0) clone(0x804400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) fcntl$getown(r1, 0x9) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x7fffffff, 0x600000) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x500, 0x0) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0xf) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3000000010000108ae8bc38408000002000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800180000000000"], 0x30}}, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000000), 0x4) 02:03:45 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) syz_emit_ethernet(0x1, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaa6563083ee5d4397e487b004a231894"], 0x0) r1 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000400)=[@op={0x18}, @iv={0x1018, 0x117, 0x2, 0x1000, "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"}], 0x1030}], 0x1, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000080)={@local, @empty, 0x0}, &(0x7f00000000c0)=0xc) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000200)={r2, 0x1, 0x6, @remote}, 0x10) r3 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000000)=0x3) r5 = dup2(r4, r3) write$FUSE_IOCTL(r5, &(0x7f0000000280)={0x20}, 0x20) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r5, 0xc058534f, &(0x7f0000000240)={{0x3, 0x3181}, 0x0, 0x1, 0x9, {0x8, 0x1}, 0xffffffffffffff8a, 0x5}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xffffffff, 0x2, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20]}}}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc058565d, &(0x7f0000000300)={0x0, 0x2, 0x0, {0x0, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}}) 02:03:45 executing program 0: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x100000000014b03e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r3, 0x40e, &(0x7f0000000000)=0x3) r4 = dup2(r3, r2) write$FUSE_IOCTL(r4, &(0x7f0000000280)={0x20}, 0x20) r5 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r6 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r6, 0x40e, &(0x7f0000000000)=0x3) r7 = dup2(r6, r5) write$FUSE_IOCTL(r7, &(0x7f0000000280)={0x20}, 0x20) r8 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r9 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r9, 0x40e, &(0x7f0000000000)=0x3) r10 = dup2(r9, r8) write$FUSE_IOCTL(r10, &(0x7f0000000280)={0x20}, 0x20) r11 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r12 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r12, 0x40e, &(0x7f0000000000)=0x3) r13 = dup2(r12, r11) write$FUSE_IOCTL(r13, &(0x7f0000000280)={0x20}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x1) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000000)={0x0, 0x0, 0x79c4}) r14 = fcntl$dupfd(r0, 0x0, r0) write$tun(r14, 0x0, 0xaf) write$input_event(r1, &(0x7f0000000040)={{}, 0xe, 0x1, 0x5}, 0x18) 02:03:45 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x0, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB]}, 0x78) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 02:03:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r3, 0x40e, &(0x7f0000000000)=0x3) r4 = dup2(r3, r2) write$FUSE_IOCTL(r4, &(0x7f0000000280)={0x20}, 0x20) ioctl$KVM_GET_XCRS(r4, 0x8188aea6, &(0x7f0000000440)=ANY=[@ANYBLOB="060000002000000005000000000000000300000004000000010000000000000004000080000000000900000000000000c4000000000000003a08000000000000a15d0000000000007f0000000000000001000000000000000100000000000000cd22000000000000"]) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ftruncate(r5, 0x200004) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x2}, 0x8) ioctl$SIOCRSACCEPT(r5, 0x89e3) ioctl$TIOCSPGRP(r5, 0x5410, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x1, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x101000, 0x0) r6 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r7 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r7, 0x40e, &(0x7f0000000000)=0x3) r8 = dup2(r7, r6) write$FUSE_IOCTL(r8, &(0x7f0000000280)={0x20}, 0x20) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r8, 0xc0bc5310, &(0x7f00000004c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f00000003c0)={0x21d5, 0x4, 0x2, {0x0, 0x989680}, 0x1f, 0x9}) r9 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r10 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r10, 0x40e, &(0x7f0000000000)=0x3) r11 = dup2(r10, r9) write$FUSE_IOCTL(r11, &(0x7f0000000280)={0x20}, 0x20) r12 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r13 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r13, 0x40e, &(0x7f0000000000)=0x3) r14 = dup2(r13, r12) write$FUSE_IOCTL(r14, &(0x7f0000000280)={0x20}, 0x20) r15 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r16 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r16, 0x40e, &(0x7f0000000000)=0x3) r17 = dup2(r16, r15) write$FUSE_IOCTL(r17, &(0x7f0000000280)={0x20}, 0x20) ioctl$KVM_GET_API_VERSION(r17, 0xae00, 0x0) r18 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r18, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r18, 0x84, 0x64, &(0x7f00000002c0)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x29}}, @in6={0xa, 0x4e24, 0x27d, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7}, @in6={0xa, 0x4e22, 0x0, @remote}, @in6={0xa, 0x4e24, 0xffffffff80000000, @remote, 0xf109}, @in={0x2, 0x4e22, @multicast2}, @in6={0xa, 0x4e22, 0x1, @empty, 0x4}, @in6={0xa, 0x4e22, 0x7fffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7fff}, @in6={0xa, 0x4e23, 0x1, @empty, 0x4}], 0xc8) sendfile(r0, r5, 0x0, 0x80001d00c0d0) 02:03:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r3, 0x40e, &(0x7f0000000000)=0x3) r4 = dup2(r3, r2) write$FUSE_IOCTL(r4, &(0x7f0000000280)={0x20}, 0x20) ioctl$KVM_GET_XCRS(r4, 0x8188aea6, &(0x7f0000000440)=ANY=[@ANYBLOB="060000002000000005000000000000000300000004000000010000000000000004000080000000000900000000000000c4000000000000003a08000000000000a15d0000000000007f0000000000000001000000000000000100000000000000cd22000000000000"]) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ftruncate(r5, 0x200004) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x2}, 0x8) ioctl$SIOCRSACCEPT(r5, 0x89e3) ioctl$TIOCSPGRP(r5, 0x5410, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x1, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x101000, 0x0) r6 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r7 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r7, 0x40e, &(0x7f0000000000)=0x3) r8 = dup2(r7, r6) write$FUSE_IOCTL(r8, &(0x7f0000000280)={0x20}, 0x20) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r8, 0xc0bc5310, &(0x7f00000004c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f00000003c0)={0x21d5, 0x4, 0x2, {0x0, 0x989680}, 0x1f, 0x9}) r9 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r10 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r10, 0x40e, &(0x7f0000000000)=0x3) r11 = dup2(r10, r9) write$FUSE_IOCTL(r11, &(0x7f0000000280)={0x20}, 0x20) r12 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r13 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r13, 0x40e, &(0x7f0000000000)=0x3) r14 = dup2(r13, r12) write$FUSE_IOCTL(r14, &(0x7f0000000280)={0x20}, 0x20) r15 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r16 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r16, 0x40e, &(0x7f0000000000)=0x3) r17 = dup2(r16, r15) write$FUSE_IOCTL(r17, &(0x7f0000000280)={0x20}, 0x20) ioctl$KVM_GET_API_VERSION(r17, 0xae00, 0x0) r18 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r18, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r18, 0x84, 0x64, &(0x7f00000002c0)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x29}}, @in6={0xa, 0x4e24, 0x27d, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7}, @in6={0xa, 0x4e22, 0x0, @remote}, @in6={0xa, 0x4e24, 0xffffffff80000000, @remote, 0xf109}, @in={0x2, 0x4e22, @multicast2}, @in6={0xa, 0x4e22, 0x1, @empty, 0x4}, @in6={0xa, 0x4e22, 0x7fffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7fff}, @in6={0xa, 0x4e23, 0x1, @empty, 0x4}], 0xc8) sendfile(r0, r5, 0x0, 0x80001d00c0d0) [ 235.658219][ T26] audit: type=1804 audit(1567735425.382:85): pid=9572 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir240905306/syzkaller.1ajdlq/40/file0" dev="sda1" ino=16703 res=1 [ 235.686180][ T9563] use of bytesused == 0 is deprecated and will be removed in the future, [ 235.739867][ T9563] use the actual size instead. [ 235.775999][ T26] audit: type=1804 audit(1567735425.412:86): pid=9572 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir240905306/syzkaller.1ajdlq/40/file0" dev="sda1" ino=16703 res=1 02:03:45 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x0, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB]}, 0x78) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 02:03:45 executing program 0: ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) r0 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000000)=0x3) r2 = dup2(r1, r0) write$FUSE_IOCTL(r2, &(0x7f0000000280)={0x20}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000001400bfa30000000000000703000000feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000811e6403000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r3, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=r4, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)=r4, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0xffffffffffffffff, r2, 0x0, 0x1e, &(0x7f0000000200)='proc[${$]selinux$#selinux[em1\x00', r4}, 0x30) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000d00)={&(0x7f0000ffe000/0x2000)=nil, 0x4, 0x2, 0xa5, &(0x7f0000ffd000/0x2000)=nil, 0x7}) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/282], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r6, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=r7, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)=r7, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000cc0)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000c80)='^\x00', r7}, 0x30) setpgid(r5, r8) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="140000001e0001000000000000000000070010001924983359856d921740b41c0f363685dc844e5b6dda4025d720c0a2a42d9bb933e9026567bd7a79243baf788346cbf201cdd2f7055b0176210f273d6df628d1f332633e4f808507cf384afd2678cb3cd39a4e45a3e248239847a0e27b26ac09412b930b2681e9d65d6bc8fdd4692dc8114d3e85e15ee3066827d129d1c3148424c4a7"], 0x14}}, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000b40)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x4, {0xa, 0x4e23, 0xc1, @mcast1, 0x83}}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000240)="f6cccfef2a147683965b6521c689f44e08843c5d1543fa7977e6cac60bce1bea7e5b2e945f5dd7b269d6978a7caf455942226748b0d3dcac54145e6645226b68fad38eca20f95aaf8200e12ae029f3f19de155cbfa360f6919e9bd81504882a92ae02084af01a107b3cf73523aea55dcffc8db31759ad31f1deb4e382844c26e4d83419951e8bd48f833041d525a076ed89c77f8f77ab0850e0542880a", 0x9d}, {&(0x7f00000001c0)="bed79b07647d7d4cb3c67819fbd8b9960d1f3eaa8adcfbbdf6f43c0d2423978d1cb5eccf292ba825c39c54627dfef761f0b7eac2a94cd9f40f71ed", 0x3b}, {&(0x7f0000000300)="69a4d0cee4fdf1ecccedf3c08bb1c05135dc8eaa7b4a690e4a5d8f486516fc0a32b377405a663af33e9bbb84e8ebd2dc89ff5ed16f567d9bb93b248238a63cef998465fbed924ec62069b7c67f8723b1cb0dd88a06992ee78a83405786dcd74b9ceb864adc6042eecc", 0x69}, {&(0x7f0000000380)="68f60506b3c78e82c541ff52e2e2d27574c5389ab337b8afbee1c55188ae8f07b9d4a1620bcfb7fc50a05f27ab1c4e3a44be89c0a3078b785c1c6e68ab173c752d145c358fe2f4e0afe172a3eca5a6c71de8b8d4716b28133813e812c204a47a7255f11b03ad663674ff690bd89f3e71a6c63b4d98398a37c76294ff8e565f183fbef97f4e9b57fcb59a8465abb92ca7ca932c48dc09357d54ef7356d6b2cfc6ed54ae9b", 0xa4}], 0x4, &(0x7f0000000480)=[@mark={{0x14, 0x1, 0x24, 0xfffffffffffff747}}, @mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0xe}}], 0x48}}, {{&(0x7f0000000500)=@tipc=@id={0x1e, 0x3, 0x2, {0x4e23, 0x1}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000580)="96fa320f340ff93f51fd92de53120d0dc48f6832d0701e27be4c13f239942b6984bd9893f6e84e068cf1197f1dc29450784db80ca61c2924c62159c6f5f3caa4aa935d71ef5576d5783d38963b4f2ce8bcbcf50cd325c0ca009459cec4a2bc4d892be590b0fd36da14f2e6c4c16ece1ae629f3c00def4b14002b9adc7336c89e89b682aad0dbcd536fa587f1fe11acc60e4d7ede334af77bdced62fcc39e74c52e8e86ba24000b138b6fb2c3e0b1902998", 0xb1}, {&(0x7f0000000640)="3cfc671eac42ad516702bbee9c1f9995078342ada3ec31c51ded34b7b4a6ad764b6923dce4b8124ef8c871d744317a321a9aa3ff88945856554fc88cadb0da1c26c85c0e786d01c85562135b3a4e8a8cb2c23856cc9b68c26b5edad1a14de4f5b880e9ed4ec3eaa6", 0x68}, {&(0x7f00000006c0)="b1de93746624bc3d0b1b7fd8c5b38bca08f72e38e3fd0533ab95d457307b27f548c7b8a71e47995ac5df4b0a4599d27cc9027b03b3ef8b0fb1fafa76dfd32ae8b14eb7aa885a99452982c714e1f1766ec92514317fbf9788b91b6b78c29c0c0abaa130065403fcbba557a49390e27aea8f2c0c7bc3aa23beaf25e5", 0x7b}, {&(0x7f0000000740)="98c4e37ebe0b60a485d2a50be3a7379d25a9437c2bde27194bab2761c6b3704da15498b5105f82d7a4", 0x29}, {&(0x7f0000000780)="2270c2ae9d919ee27ccf7b08ab70e7546a0a197ef15fa0e0c8dec15e5d2c28815f2a674013cc1f3e7aa6799c2572433df93b1e91a3e70217e4773cb12657b26d91acbfc2d5b0afb336042410176df1827466fceeb43ae4071ea2", 0x5a}, {&(0x7f0000000800)="579cbd15b03e541a42d5900a49908c", 0xf}, {&(0x7f0000000840)="eb58d94ed4a92b5aa46aca", 0xb}, {&(0x7f0000000880)="87ac6f510695ac4a458ee584413eae77a25ad93f386a280a8312c3358b38c3e9cb60ae8dd9c9f1e038ad40b6ea7af979c0047696ba4e751ddff287bea728680d9d14ab35eb9685305c8307593cac", 0x4e}, {&(0x7f0000000900)}, {&(0x7f0000000940)="6b8984ac1e9423897d6b1920f937ed5e7b559c568081a074cbde856450d33a64b16bda5972336e62bb8f244f26c01a488a75de1cbc3ac1a9d16c7222b9a9aaf5ffe4f9763b1b5565279f56d5fedf8cdc5c082a2ab76ded5ea6120b56d90916e45ced06b5d8faadc434ca7aa739feb2efbd1cd022cd7f047d4db339184503f51be314c27dc44cce4ccc0ba852c511ddb43984e9226bef8ab494ed3e8bec3c54cf64a806c6f286070a3c642b2fd6199f43ae", 0xb1}], 0xa, &(0x7f0000000ac0)=[@timestamping={{0x14, 0x1, 0x25, 0x4}}, @txtime={{0x18}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0xfff}}], 0x60}}], 0x2, 0x40400) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x7}], 0x78}], 0x1, 0x0) 02:03:45 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer2\x00', 0x4000, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000004c0)=[@in6={0xa, 0x4e21, 0x7, @local}, @in={0x2, 0x4e23, @broadcast}, @in6={0xa, 0x4e21, 0xfffffffffffff81b, @empty, 0x8}], 0x48) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000000)=0x3) r5 = dup2(r4, r3) write$FUSE_IOCTL(r5, &(0x7f0000000280)={0x20}, 0x20) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r6 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x2, 0x400) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r9 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r9, 0x0, 0x1, &(0x7f0000000080)=0x400, 0x4) setsockopt$IP_VS_SO_SET_TIMEOUT(r9, 0x0, 0x48a, &(0x7f0000000240)={0x7, 0x6, 0x1800}, 0xc) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_MON_SET(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)={0x18, r8, 0x39296c73170e9169, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}]}, 0x18}}, 0x0) sendmsg$TIPC_NL_NET_SET(r6, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20400}, 0xc, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="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", @ANYRES16=r8, @ANYBLOB="000126bd7000fcdbdf250f000000640004000c0007000800040056090000540007000800030003000000080001000000000008000100060000000800020000000080080003000100000008000300070000000800010007000000080002000700000008000100130000000800030004000000"], 0x78}, 0x1, 0x0, 0x0, 0x24000820}, 0x4000000) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x520081, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000000)={0xa8, 0x0, [0x0, 0x20000000, 0x0, 0xffffffffffffffff]}) 02:03:46 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="148100002e003304008f7b25338665a9140096b265417c662f08fe93060008000080230e83cdbc5663b1ab631c9f1689c0a6d78705d5af40b5aee5519972ad2f5b287e9a801125aa9cce8f97d4bd8db485c9bccceff845f77222e6303464486a379fd4cbc67fd87dc2b13b853da8c15b5cada6f219754562f5c76d89b3090e527100e1e5e46e3758c5b177a5935a9a60d5b0cff7"], 0x16f}}, 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='system.posix_acl_default\x00', &(0x7f0000000280)=""/4, 0x4) write(0xffffffffffffffff, &(0x7f0000000000)="24000000210005ff006b000421ed382002190008000000000010ffea080001", 0x1f) r0 = open(&(0x7f0000000080)='./file0\x00', 0x20000, 0x20) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r1, 0x29, 0x19, 0x0, 0x2a0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r2, 0x29, 0x19, 0x0, 0x2a0) sendfile(r1, r2, &(0x7f0000000380), 0x3) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x42}) r3 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) sendto$ax25(r3, &(0x7f00000002c0)="f6b24a418c5c10c4cfc180c3e1c9", 0xe, 0x10, &(0x7f0000000300)={{0x3, @default, 0x7}, [@null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000140), 0x0, 0x0) 02:03:46 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x1c, &(0x7f0000000000)={0x2000000004, {{0xa, 0x0, 0x0, @empty}}}, 0x88) 02:03:46 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000000)=0x3) r2 = dup2(r1, r0) write$FUSE_IOCTL(r2, &(0x7f0000000280)={0x20}, 0x20) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f0000000300)={0x8, 0x6, 0x4, 0x84c1abf0b44c2e13, {r3, r4/1000+10000}, {0x1, 0x0, 0x3, 0x9, 0x1, 0x2, "3d43ab59"}, 0xfd, 0x2, @fd, 0x4}) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x18}]}, 0x30}}, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r6, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xfffffffffffffed7, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x64) r7 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r7, &(0x7f0000000140), 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r7, 0x28, 0x1, &(0x7f00000001c0)=0xaa4, 0x8) connect$netrom(r5, &(0x7f0000000080)={{0x3, @default, 0x3}, [@bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}, 0x48) listen(r5, 0x0) [ 236.599440][ T9611] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 236.802045][ T9611] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 237.150797][ T9585] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 02:03:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mlockall(0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200a00, 0x0) clone(0x804400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) fcntl$getown(r1, 0x9) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x7fffffff, 0x600000) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x500, 0x0) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0xf) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3000000010000108ae8bc38408000002000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800180000000000"], 0x30}}, 0x0) 02:03:47 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000000)=0x3) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$VIDIOC_S_OUTPUT(r3, 0xc004562f, &(0x7f0000000300)=0x8001) r4 = dup2(r2, r1) write$FUSE_IOCTL(r4, &(0x7f0000000280)={0x20}, 0x20) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000600)={"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"}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) close(r5) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000340)=0x850, 0x4) r6 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x81, 0x90c02) getsockopt$IP6T_SO_GET_REVISION_MATCH(r6, 0x29, 0x44, &(0x7f00000000c0)={'IDLETIMER\x00'}, &(0x7f0000000100)=0x1e) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000005c0)) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x3f00) sendmsg$IPVS_CMD_SET_CONFIG(r5, 0x0, 0x20000004) 02:03:47 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000000), 0x10) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) fchmodat(r1, &(0x7f0000000080)='./file0\x00', 0x0) sendmsg$can_bcm(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x5, 0x2, 0x0, {0x77359400}, {0x0, 0x2710}, {0x0, 0x0, 0x100}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "47251e80b32a390e"}}, 0x48}}, 0x0) 02:03:47 executing program 3: r0 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x2, 0x101000) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000100), &(0x7f0000000140)=0xb) r1 = socket$inet_udp(0x2, 0x2, 0x0) recvfrom$inet(r1, &(0x7f0000000000)=""/91, 0x5b, 0x513cd397f0de13c3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) 02:03:47 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x128, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 02:03:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000500)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xf1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r0, r0, r1}, &(0x7f0000000280)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000b40)={'sha256-avx\x00'}}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000140)={0x74, 0x0, [0x3, 0x1, 0x200]}) 02:03:47 executing program 3: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000000)=0x3) r3 = dup2(r2, r1) write$FUSE_IOCTL(r3, &(0x7f0000000280)={0x20}, 0x20) ioctl$VIDIOC_ENUM_FRAMESIZES(r3, 0xc02c564a, &(0x7f00000000c0)={0x4, 0x50323234, 0x2, @discrete={0x6, 0x6}}) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f0000000000)={0xff, 0x4, 0x2f, "4d8f6fba3985349b739b50b0719cd4a6409bd35ed2b10786a0c76bd523ccfd3deafa76a2b54a2e0883a574976740c13201be9d4413d898a808769d9f", 0x3a, "5c2668867fce03a2db6d62ff3fa042e8b99a17ca14c4323dc393934fdd1c03ec01aa5449914ac98d17647e1d96b8274a762c619e018528eb91cefaec", 0x9e25dce5ede32fc9}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) [ 237.420103][ T9624] QAT: Invalid ioctl 02:03:47 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) msgget(0x0, 0x509) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x1, &(0x7f0000000080)=0x400, 0x4) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000340)=0xe8) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x2a40) ioctl$RNDADDENTROPY(r2, 0x40085203, &(0x7f0000000540)=ANY=[@ANYBLOB="bc0e00008f0000007624cef9f8cb1951518903774a9c0724fab4f086829647a47a7c2a7328afa84a51cdcbacde241817eb6169a0495fc39eafb306698319ae092db4f5df600017888a30d4d51c9e0ad39ce88ba131834a2d4bfeeceed15bdf16fb191d41a72314fea6a6eef433121c078fcd5c35055dc94e0862449330e252ea2330e31f31eba15d509de8b2f11518b82a871ecc37a55b20c6756b75eac872be879f"]) r3 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r3, 0xffffffffffffffff) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000280)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r2, r4, r5) syz_mount_image$ntfs(&(0x7f0000000140)='ntfs\x00', &(0x7f0000000180)='./bus\x00', 0x10000, 0x4, &(0x7f0000000540)=[{&(0x7f0000000200)="dfd86db1a34b7dff161ba51fdcd4e603673c7ac90d0f0c2116c06d74f9fa38d8544d96c258aaf4a1754334be6ebd6613526c65f66c6d3f6a025e2ee4fe2d4bb727d892d3525f1b4696e32258160cab93e181ec89b23896ac900fb6abdd9ea95afd8e22cc292342578a9d8b976478b756cba16ae2c11fb15346d4", 0x7a, 0x123}, {&(0x7f0000000280)="3cdeccdb2452ec99884fc3ad061ecb50fae8e99ece972e91cf5d7ea5e5733a0124a81f9055aa4b9fef4a1d11ad95dfaa4ea464827d9942b1256ef9d9534609dfce4a6058d87b", 0x46, 0x9}, {&(0x7f00000003c0)="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", 0xfc, 0x40}, {&(0x7f00000004c0)="66a9dbc9718aee7fe696f8103bd509c8ff7b27b56670cae4b81af10bc7ba90488ba0c4d160f5b48b816765147686679d31b5496813ac2232560530e70829a9e1dea4c1d6e964fe68bcc87358f9688545a68c9f9fbee48471fa9ab8a1ac32c0e58a1042b429aef1d69b0be1e342e7c4d0", 0x70, 0x5}], 0x804008, &(0x7f00000006c0)={[{@fmask={'fmask', 0x3d, 0x8}}, {@uid={'uid', 0x3d, r1}}, {@utf8='utf8'}], [{@uid_gt={'uid>', r4}}, {@obj_user={'obj_user', 0x3d, 'stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00'}}, {@subj_role={'subj_role', 0x3d, ')*selinuxem0security'}}]}) getresuid(0x0, &(0x7f00000001c0), 0x0) getpgid(0xffffffffffffffff) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x801) openat$vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vsock\x00', 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)='ext2\x00', 0x8000, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x4000, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x2, 0xc0000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1048}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000300)='./file0\x00') mknod(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) fallocate(r6, 0x0, 0x0, 0x110001) 02:03:47 executing program 0: openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000180)='./file1\x00', 0xa821fc, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000000)=0x3) r2 = dup2(r1, r0) write$FUSE_IOCTL(r2, &(0x7f0000000280)={0x20}, 0x20) ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f0000000000)=0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x80, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="0801ffdf36020000c2000000040000000400000006000000000000000000000021a2132aea8917a9a7c710bc1faa5cebfc6a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000"/562], 0x232) clock_gettime(0x0, 0x0) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffb000/0x3000)=nil) r4 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r5 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r5, 0x40e, &(0x7f0000000000)=0x3) r6 = dup2(r5, r4) r7 = open(&(0x7f00000001c0)='./file1\x00', 0x4a000, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r7, 0xc0585604, &(0x7f0000000200)={0x3, 0x0, {0x80, 0x6, 0x100d, 0x3, 0x2, 0x0, 0x2, 0x6}}) r8 = getpid() ptrace(0x10, r8) waitid(0x1, r8, 0x0, 0x80000002, 0x0) capget(&(0x7f00000002c0)={0x20080522, r8}, &(0x7f0000000300)={0xffff, 0x9, 0xf47, 0x6, 0x3, 0x101}) write$FUSE_IOCTL(r6, &(0x7f0000000280)={0x20}, 0x20) write$P9_RCLUNK(r6, &(0x7f00000000c0)={0x7, 0x79, 0x2}, 0x7) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 02:03:47 executing program 3: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000000018000000010000000c000000090000000100000500000000080000000400000001000080e8ff9f00f5ff2e2e003c2e00"], &(0x7f0000000080)=""/175, 0x3c, 0xaf, 0x1}, 0x20) ppoll(&(0x7f0000000780)=[{r0}], 0x1, &(0x7f0000000800), 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0xd) 02:03:47 executing program 3: r0 = socket(0x1, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'team0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="4c00000000000000000000030000000000010000000000000000000000000000000000000000000000df2b3100df0c00"]}) 02:03:47 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x128, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 238.154266][ T9624] QAT: Invalid ioctl [ 238.773998][ T9665] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 02:03:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mlockall(0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200a00, 0x0) clone(0x804400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) fcntl$getown(r1, 0x9) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x7fffffff, 0x600000) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x500, 0x0) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0xf) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3000000010000108ae8bc38408000002000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800180000000000"], 0x30}}, 0x0) 02:03:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer\x00', 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) r3 = syz_open_pts(r2, 0x0) write$binfmt_aout(r2, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r3, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffd, 0x0, 0x0, 0x100000009b4b62b}) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000080)=""/33) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000040)={0x17}) 02:03:48 executing program 2: r0 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000000)=0x3) r2 = dup2(r1, r0) write$FUSE_IOCTL(r2, &(0x7f0000000280)={0x20}, 0x20) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r3, 0x29, 0x19, 0x0, 0x2a0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@mcast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000180)=0x7c) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}}, &(0x7f0000000100)='\xee\xcd\xc0$\xa6{\x84\xfd\xd3\xd3*~]\x0f\x88\x15\x8a\x9d<\xe4\xb2\x99\xd8\xdd\xc3\x0eb\xe4\x9aA\xcdD2\xf3\x00\x89G\xcb\x90i\xad\xe5+\xb4Y\x9c\x05\xf7\xc2.,Ao\xa5\x03s\xd6\x05\\\xf7\x12\xc9\xcd\xaa\xa2\xaf\xb5\x00*\x8e\xc5{\x90^ZZW\xa9&\xeb\'\x90\x8c]\xec\xfc\xf4\"\xba\xf9\xb2\x10\xc8\xc98\xf52\x86\x15\xa0\x7f\xa3\x95\"\xac\xb6\x8d\v\xbb\f\x19\x82S&gU\\l\x88x\xb4\x00\x00\x00\x00\x00\x00\x00', 0x20000000001, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x1, [], r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8000000200000000, 0x3}, 0x10}, 0x70) 02:03:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) write$vnet(r0, &(0x7f0000000280)={0x1, {&(0x7f00000000c0)=""/104, 0xfffffffffffffd22, 0x0, 0x0, 0x2}}, 0x68) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0) ioctl$TIOCGSID(r1, 0x5429, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r2, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}}) 02:03:48 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x128, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 02:03:48 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) lstat(&(0x7f0000000f00)='./file0\x00', 0x0) socket$inet(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e21, @multicast2}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000180)=[{r2}, {r2}, {}], 0x3, &(0x7f00000001c0), 0x0, 0x0) fsetxattr$system_posix_acl(r0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='\b\x00', @ANYBLOB, @ANYRES32, @ANYBLOB="a7493547e85b5e71e64614a28cb099802b4eb9615222bab928d16de7bcc102882232dd7df62396d96152d2e344326c8282cabaee1c900667b1665c438173a9fc8f787d7049a15379d5a4356968a6e3", @ANYBLOB], 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={0x0, r2, 0xb, 0x1}, 0x14) sendto$inet(r1, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r3 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000240)="a844c5aad96113dd06e4c6a098844d5c05489dd75e15591f1cb0b8c6289994e17799b5da07d2788b684fcd5d1eee4c8c64fac4e45e7f46f26ab332e7e7481b87ea6b1b324e71b1e371c59ffab23a1cc4e8a555f70a23551f177878a04f512648a9882c314ae38dc5e56a82a0174d9dce64080fc610ba91877c90c19cd319a3cb7a9d93d034f3d4c2c4d40402442d2de64ef1026c2a60db46bbe3b8b35d164ad2124d3e9cb5093e4fb76734fcfcd320156f0325736776", 0xb6}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendfile(r1, r3, 0x0, 0x102000002) 02:03:48 executing program 2: r0 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000000)=0x3) r2 = dup2(r1, r0) write$FUSE_IOCTL(r2, &(0x7f0000000280)={0x20}, 0x20) ioctl$KDENABIO(r2, 0x4b36) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000000c0)=0x60, 0x9a8f472e1dd0f995) ioctl$sock_ifreq(r4, 0x8991, &(0x7f0000000200)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_mtu}) r5 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x10000, 0x400000) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000140), 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x2, 0x3) ioctl$sock_ifreq(r4, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_mtu=0x5}) r6 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x1800, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x4c0100, 0x0) ioctl$PPPIOCSPASS(r7, 0x40107447, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0xfffffffffffffffe, 0xffff, 0x366, 0x2}]}) mmap$binder(&(0x7f0000feb000/0x13000)=nil, 0x13000, 0x1, 0x11, r6, 0x0) 02:03:48 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 02:03:49 executing program 2: r0 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000000)=0x3) dup2(r1, r0) execveat(r0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='vmnet0wlan0/em1,\x00'], &(0x7f00000004c0)=[&(0x7f00000002c0)='/dev/cec#\x00', &(0x7f0000000300)='/dev/sequencer\x00', &(0x7f0000000340)='\x00', &(0x7f0000000380)='security.ima\x00', &(0x7f00000003c0)='system%\x00', &(0x7f0000000400)='$(-ppp1]\x00', &(0x7f0000000440)='/dev/sequencer\x00', &(0x7f0000000480)='security.ima\x00'], 0x400) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x800, 0x0) r2 = io_uring_setup(0xa4, &(0x7f0000000080)) r3 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) fsetxattr$security_ima(r2, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000100)=@sha1={0x1, "c54911f064fd3205bfc7682435d289b53f6f3705"}, 0x15, 0x2) r4 = syz_open_dev$cec(&(0x7f0000000500)='/dev/cec#\x00', 0x3, 0x2) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r5, 0x29, 0x19, 0x0, 0x2a0) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r5) io_uring_register$IORING_REGISTER_EVENTFD(r2, 0x4, &(0x7f0000000180)=r3, 0x1) 02:03:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000380)={0x79, 0x0, [0x2]}) 02:03:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1, 0x10, 0xffffffffffffffff, 0x2) r1 = gettid() process_vm_writev(r1, &(0x7f0000000580)=[{&(0x7f0000000100)=""/127, 0xffffff76}], 0x1, &(0x7f0000000d40)=[{&(0x7f0000001880)=""/4096, 0x20000502}], 0x1, 0x0) 02:03:49 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x1bc, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x234) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 240.551242][ T9724] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 02:03:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mlockall(0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200a00, 0x0) clone(0x804400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) fcntl$getown(r1, 0x9) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x7fffffff, 0x600000) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x500, 0x0) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0xf) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3000000010000108ae8bc38408000002000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800180000000000"], 0x30}}, 0x0) 02:03:50 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x200000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000a5510700bfa30000000000001503000028feffff720af0fff8ffffff71a4f0ff00000000b706000001edff9fbd400200000000000406000001ed000071185400000000002d640000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000040000000000000079fc9e94af69912461917adef6ee1c8a2b4f8ef1e50beca090f32050e436fe275daf11efd601b6bf01c8e8b1b5e4fef3bef7054815ae98743d1ace4c46631256dd19aed0d600c095199fe3ff3128e599b0eaeba9d940a891b2a0cefc646cb77900000000000000"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) getresuid(&(0x7f0000000480), &(0x7f0000000680), 0x0) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000880)={{{@in=@initdev, @in=@multicast1}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @dev}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@loopback}}, 0x0) getresuid(0x0, &(0x7f0000000b40), 0x0) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getresgid(0x0, &(0x7f0000000cc0), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0, 0x0}, &(0x7f0000000d80)=0xc) lstat(0x0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000e80)=[0x0, 0x0, 0xee00]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0)={0x0, 0x0, 0x0}, &(0x7f0000000f00)=0xc) r7 = getegid() fstat(r0, &(0x7f0000000f40)) getresgid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)=0x0) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='system.posix_acl_default\x00', &(0x7f0000001100)={{}, {0x1, 0x2}, [{0x2, 0x2}, {0x2, 0x1}, {0x2, 0xff0cfc594f4cfe1c, r2}, {}, {0x2, 0x509c9ea0197a8b2, r3}, {0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x1, r4}, {0x8, 0x0, r5}, {0x8, 0x2}, {0x8, 0x4, r6}, {0x8, 0x7, r7}, {0x8, 0x1}, {0x8, 0x1, r8}], {0x10, 0x5}}, 0x94, 0x3) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x18}]}, 0x30}}, 0x0) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r10, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="fb5ee1f4", @ANYRES16=r11, @ANYBLOB="699100000000000000001100000004000900"], 0x18}}, 0x0) sendmsg$TIPC_NL_NODE_GET(r9, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x104}, 0xc, &(0x7f00000000c0)={&(0x7f00000011c0)={0x104, r11, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x0, 0x5, [@TIPC_NLA_MEDIA_PROP={0x0, 0x2, [@TIPC_NLA_PROP_PRIO={0x0, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x0, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x0, 0x2, 0x76c}, @TIPC_NLA_PROP_PRIO={0x0, 0x1, 0xd}]}, @TIPC_NLA_MEDIA_NAME={0x0, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x0, 0x2, [@TIPC_NLA_PROP_TOL={0x0, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x0, 0x3, 0xffffffffffffff07}, @TIPC_NLA_PROP_TOL={0x0, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x0, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x0, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x0, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x0, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x0, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x0, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x0, 0x2, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x0, 0x2, [@TIPC_NLA_PROP_MTU={0x0, 0x4, 0x77b}, @TIPC_NLA_PROP_TOL={0x0, 0x2, 0x539}, @TIPC_NLA_PROP_MTU={0x0, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x0, 0x1, 'ib\x00'}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xf9f8681}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x0, 0x1, 0x80000000007}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4d4}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) execve(&(0x7f0000000140)='./file0\x00', &(0x7f00000004c0)=[&(0x7f0000000740)='\x00\x00\x00', &(0x7f00000003c0)='securityself\x04proc\'ppp0#wlan0keyring\x00', &(0x7f0000000700)='vmnet0\x00', &(0x7f0000000640)='keyring\x00', &(0x7f00000006c0)='ppp0msystem]\'md5sum-em1posix_acl_access+-selinux(\x00'], &(0x7f00000005c0)=[&(0x7f0000000500)='keyring\x00', &(0x7f0000000600)='/dev/full\x00']) close(0xffffffffffffffff) ioctl$PPPIOCGDEBUG(r1, 0x80047441, 0x0) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='/dev/full\x00', 0xfffffffffffffffe) 02:03:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) write$vnet(r0, &(0x7f0000000280)={0x1, {&(0x7f00000000c0)=""/104, 0xfffffffffffffd22, 0x0, 0x0, 0x2}}, 0x68) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0) ioctl$TIOCGSID(r1, 0x5429, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r2, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}}) 02:03:50 executing program 2: r0 = fsopen(&(0x7f0000000000)='tmpfs\x00', 0x0) r1 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000000)=0x3) r3 = dup2(r2, r1) write$FUSE_IOCTL(r3, &(0x7f0000000280)={0x20}, 0x20) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000040)='silent\x00', 0x0, 0x0) 02:03:50 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x1bc, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000002000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa00006e0000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000020000000000000000000002002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c"]}, 0x234) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 02:03:50 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x500, 0x0, &(0x7f0000000080)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) write$cgroup_subtree(r1, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88d\xc4W\x8a\xd7\x00k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x89\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xb6\xe9\xd3\x0f\bZ'}]}, 0x7f) r2 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r3, 0x40e, &(0x7f0000000000)=0x3) r4 = dup2(r3, r2) write$FUSE_IOCTL(r4, &(0x7f0000000280)={0x20}, 0x20) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r4, 0x81785501, &(0x7f0000000100)=""/222) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r5, 0x29, 0x19, 0x0, 0x2a0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0x6) ioctl$TUNSETGROUP(r1, 0x400454ce, r6) [ 240.843927][ T26] kauditd_printk_skb: 40 callbacks suppressed [ 240.843941][ T26] audit: type=1804 audit(1567735430.562:121): pid=9751 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir498492816/syzkaller.Q11zhP/45/file0" dev="sda1" ino=16761 res=1 [ 240.856345][ T9756] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 240.920488][ T26] audit: type=1804 audit(1567735430.612:122): pid=9755 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir498492816/syzkaller.Q11zhP/45/file0" dev="sda1" ino=16761 res=1 02:03:50 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000000)={'\xf3yj'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x182) r4 = memfd_create(&(0x7f0000000380)='iC;`\xb6p+\x10', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x4058534c, &(0x7f00000003c0)={0x1, 0x100000001, 0x5, 0x9, 0x6, 0x4}) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendfile(r3, r3, 0x0, 0x2000005) ioctl$KDENABIO(r1, 0x4b36) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$BLKFLSBUF(r2, 0x1261, &(0x7f00000002c0)=0x10) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x650402, 0x0) ioctl$KVM_S390_VCPU_FAULT(r5, 0x4008ae52, &(0x7f0000000080)=0x3287) r6 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$describe(0x6, r6, 0x0, 0xffffffb0) r7 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'\xbf\x03\xff', 0x1}, &(0x7f00000000c0), 0x0, r6) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r7, r7}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) [ 241.061655][ T26] audit: type=1804 audit(1567735430.782:123): pid=9763 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir240905306/syzkaller.1ajdlq/48/file0" dev="sda1" ino=16762 res=1 [ 241.143304][ T26] audit: type=1804 audit(1567735430.782:124): pid=9764 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir240905306/syzkaller.1ajdlq/48/file0" dev="sda1" ino=16762 res=1 02:03:51 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x1bc, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000002000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa00006e0000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000020000000000000000000002002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c"]}, 0x234) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 241.244500][ T9760] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 02:03:51 executing program 0: r0 = memfd_create(&(0x7f0000000000)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\x9c\xa6\xa4k\x052>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97k\t~\xf3Y\x12\"p^\xc1\x0fk\xc8F\xa8\x87;\xd0E\x90\x1c\x95\x16\xba\xfb\xa5i\xe7^\xb6\xacTH\x9b<\xc6\xe8\xaeq\x96\xa6\bD\x9b\xb8\x8dZ\r\xad\xa80x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000300)={r4, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={r5, @remote, @loopback}, 0xc) r6 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000300)={r7, @loopback, @remote}, 0xc) r8 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) getsockopt$inet_pktinfo(r8, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r8, 0x0, 0x8, &(0x7f0000000300)={r9, @loopback, @remote}, 0xc) r10 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) getsockopt$inet_pktinfo(r10, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r10, 0x0, 0x8, &(0x7f0000000300)={r11, @loopback, @remote}, 0xc) r12 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r12, 0x29, 0x19, 0x0, 0x2a0) getsockopt$inet6_IPV6_IPSEC_POLICY(r12, 0x29, 0x22, &(0x7f0000003a80)={{{@in6=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@dev}}, &(0x7f0000003b80)=0xe8) sendmmsg$inet(r1, &(0x7f0000004300)=[{{&(0x7f0000000080)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000b80)="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", 0x1000}, {&(0x7f00000000c0)="986c621a35f75a237f3d73c8c81435e39ab31340af8d2398fdac948b21b93d7ae1cad025e1479387bc050cedb4b50612a9e9831279374beb66af95c3e35aed8f8968dc4a93a3d02e3b18f057097a833c7466f61c1210c769ac6a6ace398b39e9e84dab2cd6dec4989ffefeb242a3eefc1f5a116b504173651febfa378133252d573799e7b033e16947538366750d8ee4b36cfc9ce37eafbc92d6ff2941495234ae1d355c5095e12a996be6464cc66d43", 0xb0}], 0x2, &(0x7f00000001c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @loopback, @multicast2}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x80}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x2}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @multicast2, @local}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r9, @multicast1, @multicast1}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x8}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x20}}], 0xf0}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000002c0)="116285911da2cef695711a386864ffe1c235ee3071ff2e04b1af266e214d83e4cad933689fb10b086d13de0a24ef62132341433be50cebf3", 0x38}, {&(0x7f0000000300)="f0ebdcd1a6c610608cc5ee26488452af846302967f6f4cd58f329a000a53867a9fe5210b43d8afbdfdce60a51893df1f038797b6571b2fe624a65601afa486f16834258beecb2b1252c57c32b5f6fdb272967ea75acdfd4d58089991fc60a157d2a8d00b8d2312d67c5b4062efedddee7a1da98c776006bac9675ba3b3c426cb806baafadbd963c203103356cc0ca41237197e92d12cc5d7", 0x98}, {&(0x7f00000003c0)="a2cf3c4b510f89449a38d474987cecb82f7e559e7fcafc6ff3927393a0e7eac18738d4f1a376b94db80cff60e05553e3b2c60a934e534410e14b2753f28b3b92049435", 0x43}], 0x3}}, {{&(0x7f0000000480)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000740)=[{&(0x7f00000004c0)="6c6902e3c9e2aaa3f5a56e8f88cca94c9b42ba9ed6f59836c68c39d799aa59d83b2ced87dd334dd53bbd19667d8be5213f3e260b8dbbc6064880eac7cb460555fc7750cc65a035d3c6876937aba146681d41878a8b212ef2901177b890da3497d27dbaf58c733a17cadca6a23d30d944fb1cf9aaebaad2c7a1403222b5d8", 0x7e}, {&(0x7f0000000540)="1fb5e06e3238b0d9c21c9ab5c10e2b5f2634d051cade9f763509ee3c3f5071a7df7165c7de32d80d90ca72961ba072602027e64bccb98451178cc2648be34ea519c15ff2826a91b90f1a10395bef6e06c6dd4098d03c", 0x56}, {&(0x7f00000005c0)="f5c29b696c9bb2197d2367befe18107d8550903b93d5afcfd2", 0x19}, {&(0x7f0000000600)="a38fcbfaa975bf4748c55372bf04c7995261bed151cec7e2467060816f740fd986942e1e295b9a4da6cdff13d2d7215e63208cc06f2922a5d7fdebb46a60ba566c5e37c04e36084b817a92", 0x4b}, {&(0x7f0000000680)="6f8d9c893c36b05bc7f94bb70422e6721ae984ffacfaef08e9b6aab37cfb4bac7aee355134d44c5cc57cce903f6a6ea6d25d1a00272b696c9164785e97aaa15cac822a411377cf64bdb5e3f73ad1bf9b017a76116097c0ebfb5ad9a20b7e2abc680722face5d59af443eeff5f79848a58b53ccfe0420e28feec9d096701293bd64f32787829f70945cf68843f0fd", 0x8e}], 0x5, &(0x7f00000007c0)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x2}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1ff}}], 0x30}}, {{0x0, 0x0, &(0x7f0000001c80)=[{&(0x7f0000000800)="9c3142e35d1e3f1d31c17d99e9cd619ad77bd3819683e6089f7ac206eb3bee1dd054a31d49b861178410a482484961d226d5564d3e86f7609b0edf4b6be4026bf928ce05141d2185", 0x48}, {&(0x7f0000000880)="8a8c24da6a63806c16c30dd56ce2903908ae719ba194b2294c8ac90ddfb7308bb259d6f6bc64882e1acc2d2977b8200705b055c48c7aa41b8a77d5920345f6379921a11224fbdd6dabe5061e550abd2cf24cd9203255be4191e6f77685b89dbdb52f17738872c2fe3e9babc30adf6f8b9d253b364d3d98c9ce6b8d42c3f7e39309b5de96fab20b4615ea8979d5c173b18ed419c56a97daaac320bfc80ecbb269bc7f", 0xa2}, {&(0x7f0000000940)="c9c7b4c2256d00a9df63a5dd5a9c68afe950c02a41375fc7aa0380c592c5c7c4bed13a301f9c6eb0c41132e360c7003aa868464518b1245868bfa1a952b8f4736ee7e16681d59bb0bd9ed20475cbb4f38b35ef67869a76666762eb20e43c202df3121e91a07d89bc38943cc6f14b23f27be106bda6fea0ab1bb163f664fa142a6d8e5b9e0cd211d23329ef9079f328577b36dafce1af7499d839907b1589db59ba98ce7724c47b600259c80fbb7f0533b0bc4d97ce8bdd1c40bf", 0xba}, {&(0x7f0000000a00)="a2467f6a160d789a3278f01811134b25bdb4fdc4a973590694f77a0f0156fdb80ec036fa3787d1b82237f640f22f3f84a313e82e8657a2db665809152ce157613233c692c3441654843827a57654c569019378ce4096187fda50f8e4b02340ded513790f8011ac269c1102d3292e3c2d99e7c2931b2bea755e8b63a75d59d86eb494ff3ec84bd534e182bac97b535f0d45e07bf50d5776c2775ddfa0ba8a3c3473db42971bc165b822e553b2", 0xac}, {&(0x7f0000001b80)="090984bd5f35f57bafdf9bbb7db52d259453e5fb6e4e629c418d074025deb74e315217e47f11aba5576ee996e2d8ab38dadbc54e2cd2831983d90f10a7b784fb6017f5d481899ee294464af71ea5e3553496ea69b41dd310a4a3f7bfad7ac7d5fe4844da3194629741a7112f21a3c46d221b7a1886f2c43f872f0caf9b160706527c9a3bdb16c1ffa64b257dec778b50e197c70fc59c323da9fabb62c7421e2d3181658885d4542a0eca0af0c4632b83dddd89063acc7f32c443e42f686f4e487c15235011d84f7c39686008e56633e31ac3949acdd9311574ee344dd759ec2ef2331f2cd9e8", 0xe6}], 0x5, &(0x7f0000001d00)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r11, @loopback, @multicast2}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7fffffff}}], 0x50}}, {{0x0, 0x0, &(0x7f0000003000)=[{&(0x7f0000001d80)="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", 0x1000}, {&(0x7f0000002d80)="47778c82798b6b316f7dab6fef40b14f06910f4d4a7b67f53c198be5c16edac3da2dba88d8172d8d5f1376d0dce44d082de5283dee31776677611b1c9a86c9ea606425d4221633e8c56ae9c7710e44782ff95a640e95ccbd26465a13464a0c4630d71e136abfe3fccde44149c937fcd7fd4613345e450e8f6e76cc105416b3080a7217e64d54845f792207e9c87ed6fc10e5c60659634d5f3d539abdb0", 0x9d}, {&(0x7f0000002e40)="c3ba7eedbb71384a0fbbaa86240155c82f39707626317930c2729d9942a57c9f9102af94d82bc1900ae9522dc944da5ea2117792308f555f3df730056f8d100ff50b676ac1578aac", 0x48}, {&(0x7f0000002ec0)="3bbcac3d6afdf7c00c9e967b9ef176ad849150aa9e129570c433c0402d29f062ac983b2c5fad5c542a7bc7b6f599ff5cfc68770ddfeeaa3e2ff4c15df124332ab1f865e7207cad", 0x47}, {&(0x7f0000002f40)="e6a412d231e4fa8165dbec001b73f159d3780441169279ef1868102d8ca93ee9ea28a3a100104d19d72d11ff4e229ba19b5faed76dc94f812953f8d39d1e8af386529c3a9befc15fb1777a64094b21d6a6a93f5683cfe24ff0438d8ede72d73be75e8dd20d0d57812cbdf6ed942e6a339ff5e7de52ffaddd444afa7327e80610530edb6c6a2ce9a561b44460", 0x8c}], 0x5, &(0x7f0000003080)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_retopts={{0x70, 0x0, 0x7, {[@generic={0xfb43f3a96810d96, 0x9, "44fba88a32ad84"}, @generic={0x0, 0xa, "5ce469464f3e055c"}, @ra={0x94, 0x6, 0x7}, @timestamp={0x44, 0x1c, 0x2, 0x1, 0x4, [{[@multicast2], 0xda}, {[@dev={0xac, 0x14, 0x14, 0xd}], 0x2}, {[@remote], 0x8}]}, @noop, @cipso={0x86, 0x28, 0x588, [{0x7, 0x2}, {0x0, 0x10, "0286093717da37dc597efea1fb6d"}, {0xe2f559bcfc42452d, 0x10, "922ceadf181142ab1c522043486e"}]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9}}], 0xa0}}, {{&(0x7f0000000ac0)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000003200)=[{&(0x7f0000003140)="cb2733a30f9b6c1608919cc862538abe5cec2e258d25f7a22113b2afb16bcca6acb9a45f8d4639534e0d21a0719f696919daa4f2b4b295ed6ed024f8bcd57f66c5a4edef48f83cff005c1b2e386646f7e98b7bd2913b52c6f350dcc0aeb3f620a239b18a73b350f6c98ca2d3f6d76af180c9b9ea51ace503bda474ca911c7603d96b1e74ef7d4068a943a79aea", 0x8d}], 0x1}}, {{&(0x7f0000003240)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000003280)}}, {{0x0, 0x0, &(0x7f0000003740)=[{&(0x7f00000032c0)="b702f6ba46d430f24a595e32c79a0e88277692ae2ae315fb5a4586cd6ea266826af09ef1f908dbc86fa456e8f28a80ad456c6c4860c2c4373124943baade666af94cd4c753f22cd2123fb07c2fc3b055418c175303889cd831fd57c7aa8ebf630cdce48beb804ab5967d49d8779bab16dde13f902e74fab5cff2144befa67c69dbef88b2dd4633e6e494abed318198bac0d37ea00ccc534e3732eb8f82d12a08319cf29c7f16127124080aef5693d7a43b11e399d85fae3389f788e76f4be25e19f01b2fd919908a77af6f13a7971c9dbad6958af79f08e325a2d8275b340e", 0xdf}, {&(0x7f00000033c0)="29e7cd614b7782d7e99da2c0cf58b2a35ab0df5e9121f99997d9fac120f0d6002436ee21ef88246fe1a0ce7e5e0d5ea9b3b1b87a305bb860342cf27711484ec024cbf3258b9f2d08ca893c7c318ef852f5fbd6634e2a0774016a1dde", 0x5c}, {&(0x7f0000003440)="240e47190b4b12ac79ed581f5a5cf8eb8e612fc883cae9970261ceeb26e87653178b38d8f4f9903034281fce8ae7386fce45970776f9be060fe2c4482fd5b01864eb76a808abd60e4ef1b5475da8073104acff41bfe2c512cf73c3ff742db40de016c70fbb0ceefa66a14df03982b3c240bfbdf19bad33be930797ba7ec67ab3d77efaa269fb7796dd8246435c7907ec3ee7be50edcc403ce37b16bf613c7c2b0110e9d804c1a955c50c424135d8000c4bf116569d86433457564f6347adbfa0abdf59b03c79bf5960e08fc3853df2821253eb2a3ffdaf36d86501430730e98112faa97b441d", 0xe6}, {&(0x7f0000003540)="cb25adbb31fb9afaa52889989a5531497ecd63a79ba67e75925da5190ae814032a77909a8c003e0cbf215b34c58e0aa7e6b772cb3914fbe149a703f9751443f5352868f9af0fede5c6b61beeef53d6b70196c1340c52280ec03f9fe23e68635df8d54fc8dd1a1d84ac4b396c40dcfba38a9c94aec7a15405cbfff16d91f504c34ba287afc96e4024341a50ab943eec52", 0x90}, {&(0x7f0000003600)="af9d8f90a7cbaa3e3b5144b0086b7f336594a45cf267ac6e9c1ecb69aa2971ecbfc554f775f1c50484d4b0d4e7d1ad98571cfc4faaa21db52b53f8dc40558f146b3e099cffe7712d680faa4b3e47ade33bebe9d08445b7b95f7003b7e1474fdaa5e456e29e422c05bbc9755fa6eb0d985fa5eabf179cf249842843a72ab72659bb13c958c3e1738ad40f1c2d1be7208e33004e49d82672bb363b0382acdd2438b18b63006243ae424bbde9feeb48b436d1d998beae93012234542e74772228a07a41fdcf11b1b9dca78e1d5ba0413d13f2c305a41d0996a2ee0d45dc", 0xdc}, {&(0x7f0000003700)="b337e8c43f2bccc556847eec55e9fca9f6f1a6b22f", 0x15}], 0x6, &(0x7f00000037c0)=[@ip_retopts={{0x6c, 0x0, 0x7, {[@ra={0x94, 0x6, 0xd87}, @cipso={0x86, 0x38, 0x5, [{0x6, 0x6, "0d5ed53e"}, {0x0, 0x9, "cdb4af0815ac08"}, {0x1, 0x7, "5b6071cf94"}, {0x2, 0x5, "e649e7"}, {0x7, 0xb, "dd6671b1d9c21a4d5f"}, {0x6, 0x8, "4a5cbcd80dda"}, {0x7, 0x4, "aab5"}]}, @ssrr={0x89, 0x1b, 0x9, [@rand_addr=0x6, @multicast2, @multicast1, @loopback, @rand_addr=0x5, @dev={0xac, 0x14, 0x14, 0x26}]}]}}}, @ip_retopts={{0x14, 0x0, 0x7, {[@noop]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x406d}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1000}}, @ip_retopts={{0x44, 0x0, 0x7, {[@rr={0x7, 0x13, 0x80, [@remote, @multicast1, @multicast2, @local]}, @noop, @noop, @timestamp={0x44, 0x1c, 0x100, 0x0, 0x3, [{[], 0x9}, {[@rand_addr=0x7], 0x9}, {[@loopback], 0x5}, {[], 0x80000000}]}, @noop]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x2d5}}], 0x118}}, {{&(0x7f0000003900)={0x2, 0x4e24}, 0x10, &(0x7f0000003a40)=[{&(0x7f0000003940)="acd7224906dc58b0403826d1fe4c27fa1c1389943ba06f752f05a294785c398cf8cf9a1f2d8ef930797e13034c8279fafe9d127c74aa3230e217101b1e14deb55e9f5eb54c681c7d8c233331b593a37cf5f66ed1a4f7f51f96361cfd24a465a016dc4eaacbeb327feb344b4d1180c15d6d01069f8cc96bf56626aea81606fa145e1f4bd7a9d20967bf4e129228fbed83408040b109ab144b72a9a445868f6017ee82d0ed2a8854018bd12b7b8fedb7a1", 0xb0}, {&(0x7f0000003a00)="be5e438064993c591f", 0x9}], 0x2, &(0x7f0000003bc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r13, @broadcast, @multicast1}}}, @ip_retopts={{0x5c, 0x0, 0x7, {[@end, @rr={0x7, 0x27, 0xf68, [@dev={0xac, 0x14, 0x14, 0x1f}, @remote, @dev={0xac, 0x14, 0x14, 0x1c}, @multicast2, @empty, @rand_addr=0x7fff, @multicast1, @local, @broadcast]}, @generic={0x47, 0x3, "04"}, @ssrr={0x89, 0x1f, 0x4, [@loopback, @remote, @loopback, @multicast2, @rand_addr=0xffffffff, @multicast1, @multicast2]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xd5d}}], 0xc8}}, {{&(0x7f0000003cc0)={0x2, 0x4e20, @remote}, 0x10, &(0x7f0000004200)=[{&(0x7f0000003d00)="7d8b1fec690429b21e18e3528f07b8f1d084958d7b5569f69994a978e97769a373806966f2f2811b74763f731aeeb9e059408d86ed1215430f2da5ddfbd080d22c3f8cfd91", 0x45}, {&(0x7f0000003d80)="41945f7ab2546985bf5d549eb6976980269d", 0x12}, {&(0x7f0000003dc0)="87e20af90cd919ac98226f944499a8f3bacad212d9b42919cbc855802111d5570790a0fe3e602b9a1f76874f581bfbd5a00e40fca906d4b64166aeb29ccdcf7f4c6ede626db7407707f0c2bdac1c7042a41c5d8674de2d474b89a8c1358517101e536febde45f8d2c212460ca1f57ce3382fe0b48bceb6b58843fcbc8a06eaaeb66bcd7a1794c5f5d842654228f76b8cf01207a075d4e21a57007cf25fd2629c615c176dc3c642266a7cedfc4bd0889cef8b07d2c4814f9e944218ba9a91e7b97cf0ce484a320ab214a82d988ac3aaa6b37079ae206aea1288af02891023f8e45c8b", 0xe2}, {&(0x7f0000003ec0)="4a704c7743fa5aec57c3b02f9dc7a1867375c5cc75f787205333c601b8f189465e5ef68d14a3dc1ac274d500b4f572dedd0654cb01ffb6081a78acc866b0e4406aefe8cc38ee4ab422c10619a0c32849ee9720d7193720020894205046bd41986d85a2f0c6e661ae15134a589d58341aa202ce2c219523626572c3fc578484fa709a52d5f85c31c465cc34a18cbc8b6f241ba18df7c097f562a7748ba8ee476a277f", 0xa2}, {&(0x7f0000003f80)="5360d4a095c8d545e35e0af5745645a7be42b8a37ac29c56b308bef23360f93111", 0x21}, {&(0x7f0000003fc0)="ef20a5e05e7917c86a15bc78507237a36c6472da77a01dcedf14b93d7df364e24825b7461c5cab1c374aa6ca2ea7cb7b5b1e2e852c4558ea81daf0908ab0efd483c34ccb391ec8c1615e3c1e5d251746ec82a5751a53c172dc79ef7e930f6a72e33b7ff388761fd3d9b35f83ad378693abec3ea42875db44d0f9d5e67575f57c346665a8c0f172c75701fe0f481cf0921e9286ebcc03b5467f9af1ea5bcb807dbae889d5061b9536241d0c70ed847fb5f89b2c6296650d344f9bf09cb6dabc0b582d8dcf695e39238a651b2b787e439abcd3c5428bfaeb", 0xd7}, {&(0x7f00000040c0)="17144719b3f1374883cba4984d3eddc0e999d3f02da420e237b3a851164b6c7c4708656a5e29e61fdffadc27e7ec3a7feaa2f24752dce80d7414", 0x3a}, {&(0x7f0000004100)="0f9b2d280385f167b487a593538f036fd3836858b6fa07f94e90ff9085c134f07112108c0b0c569f36084b303626a2193a05d9da6c83ea835271e41f6338fde50be7ccda291aa9f5a0e2dc0dad47dfd4111070bc07392da1522c5f2c4d3bd3a92985ed5c8c1b37fb30395e5cb75348e0c65758a9d8708698ee6191f14e74623ce213ce45f96a3573b3434e2f4d8d52762a0c4c0fe9717b1fb344bba07a5f4c79f42db131af4d0746f38bf95021d5744214881b9cef53bef435b721933eb4aa", 0xbf}, {&(0x7f00000041c0)="569d0a752da105a0d573886a", 0xc}], 0x9, &(0x7f00000042c0)}}], 0xa, 0x40) syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) [ 241.901614][ T26] audit: type=1804 audit(1567735431.622:126): pid=9802 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir734535609/syzkaller.4ZmHLb/39/file0" dev="sda1" ino=16752 res=1 [ 242.425815][ T9772] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 02:03:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mlockall(0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200a00, 0x0) clone(0x804400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) fcntl$getown(r1, 0x9) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x7fffffff, 0x600000) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x500, 0x0) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0xf) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000000), 0x4) 02:03:52 executing program 2: getpid() r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xd497, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0xa, 0x13012, r1, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x4042, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x8, 0x1f, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x2000, 0x20, &(0x7f0000ff0000/0x2000)=nil) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000000080)) r4 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) fsetxattr$security_smack_entry(r3, &(0x7f0000000000)='security.SMACK64IPOUT\x00', &(0x7f0000000040)='[\x00', 0x2, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x0, 0x3f00, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000300)={r7, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000140)={r8, @remote, @loopback}, 0xc) ustat(0x4, 0x0) fcntl$getown(r5, 0x9) r9 = getpid() ptrace(0x10, r9) waitid(0x1, r9, 0x0, 0x80000002, 0x0) fcntl$lock(r4, 0x4d, &(0x7f0000000280)={0x1, 0x3, 0x5ba, 0x3f, r9}) setsockopt$sock_timeval(r4, 0x1, 0x14, &(0x7f00000002c0)={0x77359400}, 0x8) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$FICLONE(r2, 0x40049409, r5) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r2, 0xc0305602, &(0x7f0000000040)={0x0, 0x3, 0x2024, 0x1}) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/163, 0x43}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) 02:03:52 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x100000001, 0x400000) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000340)=0xff, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000000c0)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@newqdisc={0x24, 0x24, 0x1, 0x70bd28, 0x25dfdbff, {0x0, r1, {0x0, 0xb}, {0x7, 0x10}, {0xfff2, 0xfff3}}}, 0x24}, 0x1, 0x0, 0x0, 0x50819d4d929e832a}, 0x2800) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7f2000)=nil, 0x7f2000, 0x3, 0x31, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) vmsplice(r2, &(0x7f0000e79000)=[{&(0x7f00003fb000), 0x138f}], 0x1, 0x0) mbind(&(0x7f00003b5000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x3) 02:03:52 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x4, 0x2005) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f0000000040)={0x10, 0x1, 0xb968}) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000005fc0)=[{{0x0, 0x0, 0x0}}], 0x280, 0x0, 0x0) 02:03:52 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x206, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000002000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa00006e0000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000020000000000000000000002002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f000000000000000000000000000044fc736530000000000000000000000062726964676530000000000000000000ffffffffffff000000000000"]}, 0x27e) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 02:03:52 executing program 0: r0 = shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000140)=""/122) r1 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_emit_ethernet(0x34, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaaaaaaaa1aaaaaaaaaaaaa8137ffff002602150000616400000000000075e500000000ffffffffffff0005f6de6f6ce247734ae7e8c766c6032c084391196e17454cd9514347dd3eaa8b252700e28a9cbad3a24c0d769e85"], &(0x7f0000000100)={0x0, 0x1, [0xaf6, 0x58, 0x8db, 0xe93]}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x48, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0dbca3aa97630000d9cc0d434bb1a3115164e6a661aa333210f598e01cbefa1b6e50094046c7bde9b621da80dcf8dc47710b5e56003ada4e95d4023c20fc7884abe48991db4f84482984a454cd57b025d03d75da6341891e3c9d8e85dc098b4817f3dd8c7439f7e52aaeb7ad72282b065eecdb68c146e6e288ed9f54a547a520bb3f613a62ca9510aa43eb6975383a7b8fbcf78690d75ca63d9a627c7abe2e4b6675fcbe0fc4b444c2c53f1c14c0b9021a58493fa634f3"], 0x0, 0x0, 0x0}) [ 242.642430][ T9814] binder: 9813:9814 unknown command -1432110067 [ 242.667396][ T9814] binder: 9813:9814 ioctl c0306201 20000000 returned -22 02:03:52 executing program 0: r0 = msgget$private(0x0, 0x8) msgsnd(r0, &(0x7f0000000040), 0x8, 0x400) msgsnd(0x0, &(0x7f0000000300)={0x0, "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"}, 0x1008, 0x0) msgrcv(r0, &(0x7f0000000200)={0x0, ""/210}, 0xda, 0x3, 0x2000) msgsnd(r0, &(0x7f00000000c0)={0x1}, 0x8, 0x0) 02:03:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0xffffffffffffff29}, {0x80000006, 0x0, 0x3}]}, 0x10) 02:03:52 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x100000001}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 02:03:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_crypto(0x10, 0x3, 0x15) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x101000, 0x0) sendto$ax25(r1, &(0x7f00000000c0), 0x0, 0x4004000, &(0x7f0000000140)={{0x3, @default, 0x1}, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) sendmsg$nl_crypto(r0, &(0x7f00000003c0)={0x0, 0x2, &(0x7f0000000100)={&(0x7f0000000200)=@getstat={0xe0, 0x10, 0x1, 0x0, 0x0, {{'sha224-arm64(\x00'}}}, 0xe0}}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) 02:03:52 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x206, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000002000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa00006e0000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000020000000000000000000002002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f000000000000000000000000000044fc736530000000000000000000000062726964676530000000000000000000ffffffffffff000000000000"]}, 0x27e) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 02:03:52 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="f8857e31bd8b3d490e7a749e0b2e65a6eb98e4e62afb6529d124a9bf375109b8ad644df794d7f67fd853a26630f5f88bab174efb703c64baf7d489aebfea3fc5af71ade2ddb3df9dbc49f72c0cd0510eb0d0bd9f2c6b47fe6744c3123531098d2ad58f5b627ec9476ee9"], 0x1) perf_event_open(&(0x7f0000000080)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x3e6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:03:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mlockall(0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200a00, 0x0) clone(0x804400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) fcntl$getown(r1, 0x9) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x7fffffff, 0x600000) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x500, 0x0) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0xf) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000000), 0x4) 02:03:53 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009}, 0x2c) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1000, 0x80040) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x2c, r3, 0x605, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x10, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, '\x00'}}}}}, 0x2c}}, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x80000, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r4, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r5, 0x300, 0x70bd2b, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x42001) sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, r3, 0x20, 0x10000000070bd25, 0x25dfdbfc, {{}, 0x0, 0x4107, 0x0, {0xfffffffffffffe2b, 0x18, {0x8, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8000880}, 0x40) r6 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) close(r0) 02:03:53 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x100000001}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 02:03:53 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x4) close(r0) r1 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000000)=0x3) r3 = dup2(r2, r1) write$FUSE_IOCTL(r3, &(0x7f0000000280)={0x20}, 0x20) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0}, {}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000001080)={r4, &(0x7f0000000080)=""/4096}) 02:03:53 executing program 0: r0 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x200001d0, &(0x7f0000000040)=[{0x9, 0x2, 0x8, 0x7}, {0x3f, 0xffffffffffffffff, 0x1, 0xed4}, {0x7, 0xfffffffffffffffd, 0x9, 0x8001}, {0x0, 0x1000, 0x0, 0x3ff}, {0x2, 0x3, 0x5bb, 0x2}, {0x81, 0x2, 0xf1b, 0x200}, {0x3f, 0x1ff, 0x100, 0x36}]}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000340)=ANY=[@ANYBLOB="1f0000000000000000000040050001000000e7fc4b83bbb6a23b4b6942b7871001000000000000002560b700eff0ffff0403ffffffff00000a00000006"]) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000000)={0x1, 0x2, [{0x38f, 0x0, 0x2}]}) 02:03:53 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x206, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x27e) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 244.239425][ T9879] Enabling of bearer rejected, illegal name 02:03:54 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mlockall(0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200a00, 0x0) clone(0x804400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) fcntl$getown(r1, 0x9) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x7fffffff, 0x600000) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x500, 0x0) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0xf) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000000), 0x4) [ 244.274615][ T26] audit: type=1804 audit(1567735433.992:127): pid=9883 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir734535609/syzkaller.4ZmHLb/43/file0" dev="sda1" ino=16779 res=1 02:03:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8000000, 0xff03000000000000, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x2000, 0x8) r2 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$EVIOCGBITSND(r3, 0x80404532, &(0x7f0000000080)=""/155) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000000)=0x3) r5 = dup2(r4, r2) r6 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x628800, 0x0) r7 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x9, 0x40000) r8 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r8, 0x0, 0x482, &(0x7f0000000000)={0x4, @rand_addr, 0x4e24, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x2c) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000300)={r9, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) open(&(0x7f0000000340)='./file0\x00', 0x10801, 0x20) connect$unix(r1, &(0x7f0000000380)=@file={0x1, './file0\x00'}, 0x6e) setsockopt$inet_pktinfo(r8, 0x0, 0x8, &(0x7f0000000140)={r10, @remote, @loopback}, 0xc) r11 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ubi_ctrl\x00', 0x68200, 0x0) write$UHID_GET_REPORT_REPLY(r11, &(0x7f00000002c0)={0xa, 0xa, 0x100, 0x1}, 0xa) r12 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x18}]}, 0x30}}, 0x0) r13 = socket$nl_generic(0x10, 0x3, 0x10) r14 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r13, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x2c, r14, 0x605, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x10, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, '\x00'}}}}}, 0x2c}}, 0x0) r15 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r15, 0x29, 0x19, 0x0, 0x2a0) r16 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r16, 0x29, 0x19, 0x0, 0x2a0) sendmsg$TIPC_CMD_SET_LINK_TOL(r12, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000160}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r14, @ANYRES64=r16], 0x3}}, 0x40000) bind$xdp(r6, &(0x7f0000000200)={0x2c, 0x1, r10, 0x3f, r3}, 0x10) write$FUSE_IOCTL(r5, &(0x7f0000000280)={0x20}, 0x20) ioctl$NBD_SET_BLKSIZE(r5, 0xab01, 0x8001) socket$bt_bnep(0x1f, 0x3, 0x4) 02:03:54 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x22b, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x2a3) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 02:03:54 executing program 5: r0 = socket$kcm(0x11, 0x3, 0x0) r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f00000001c0)="120000001200e7ef077b2dea1808000200e4", 0x12, 0x0, 0x0, 0xfffffffffffffc7b) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x8}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x144}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x1de}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x0, &(0x7f0000003700)={0x77359400}) sendmsg(r0, &(0x7f00000000c0)={&(0x7f0000000180)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f00000002c0)="9cabbf0400cbb140419b80008100501d0806", 0x2e}], 0x1}, 0x0) 02:03:54 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x1, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_STATUS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x40, r1, 0x180, 0x70bd29, 0x25dfdbff, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x9}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x40}, 0x1, 0x0, 0x0, 0x24000004}, 0x10000) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r3, 0x0, 0x1, &(0x7f0000000080)=0x400, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f00000001c0)={0x1}, 0x1) recvfrom$inet(r3, &(0x7f00000002c0)=""/219, 0xdb, 0x2000, &(0x7f0000000180)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x401}}, 0x10) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 244.712697][ T9899] IPVS: set_ctl: invalid protocol: 4 0.0.0.0:20004 [ 244.831173][ T9899] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 244.922605][ T9905] Enabling of bearer rejected, illegal name [ 245.055505][ T9912] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 245.127283][ T9914] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 245.138667][ T9912] syz-executor.0 (9912) used greatest stack depth: 21848 bytes left 02:03:54 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x22b, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000002000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa00006e0000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000020000000000000000000002002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f000000000000000000000000000044fc736530000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a00000004155444954000000000000"]}, 0x2a3) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000002000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa00006e0000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000020000000000000000000002002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f000000000000000000000000000044fc736530000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800"/592]}, 0x2c8) [ 245.304460][ T26] audit: type=1804 audit(1567735435.022:128): pid=9905 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir498492816/syzkaller.Q11zhP/49/file0" dev="sda1" ino=16779 res=1 [ 245.322224][ T9899] IPVS: set_ctl: invalid protocol: 4 0.0.0.0:20004 [ 245.382098][ T9905] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 245.439497][ T26] audit: type=1804 audit(1567735435.022:129): pid=9899 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir498492816/syzkaller.Q11zhP/49/file0" dev="sda1" ino=16779 res=1 [ 245.567138][ T26] audit: type=1804 audit(1567735435.022:130): pid=9905 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir498492816/syzkaller.Q11zhP/49/file0" dev="sda1" ino=16779 res=1 02:03:56 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mlockall(0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200a00, 0x0) clone(0x804400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) fcntl$getown(r1, 0x9) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x7fffffff, 0x600000) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x500, 0x0) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0xf) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000000), 0x4) 02:03:56 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x1, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_STATUS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x40, r1, 0x180, 0x70bd29, 0x25dfdbff, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x9}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x40}, 0x1, 0x0, 0x0, 0x24000004}, 0x10000) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r3, 0x0, 0x1, &(0x7f0000000080)=0x400, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f00000001c0)={0x1}, 0x1) recvfrom$inet(r3, &(0x7f00000002c0)=""/219, 0xdb, 0x2000, &(0x7f0000000180)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x401}}, 0x10) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 02:03:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8000000, 0xff03000000000000, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x2000, 0x8) r2 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$EVIOCGBITSND(r3, 0x80404532, &(0x7f0000000080)=""/155) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000000)=0x3) r5 = dup2(r4, r2) r6 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x628800, 0x0) r7 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x9, 0x40000) r8 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r8, 0x0, 0x482, &(0x7f0000000000)={0x4, @rand_addr, 0x4e24, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x2c) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000300)={r9, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) open(&(0x7f0000000340)='./file0\x00', 0x10801, 0x20) connect$unix(r1, &(0x7f0000000380)=@file={0x1, './file0\x00'}, 0x6e) setsockopt$inet_pktinfo(r8, 0x0, 0x8, &(0x7f0000000140)={r10, @remote, @loopback}, 0xc) r11 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ubi_ctrl\x00', 0x68200, 0x0) write$UHID_GET_REPORT_REPLY(r11, &(0x7f00000002c0)={0xa, 0xa, 0x100, 0x1}, 0xa) r12 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x18}]}, 0x30}}, 0x0) r13 = socket$nl_generic(0x10, 0x3, 0x10) r14 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r13, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x2c, r14, 0x605, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x10, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, '\x00'}}}}}, 0x2c}}, 0x0) r15 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r15, 0x29, 0x19, 0x0, 0x2a0) r16 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r16, 0x29, 0x19, 0x0, 0x2a0) sendmsg$TIPC_CMD_SET_LINK_TOL(r12, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000160}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r14, @ANYRES64=r16], 0x3}}, 0x40000) bind$xdp(r6, &(0x7f0000000200)={0x2c, 0x1, r10, 0x3f, r3}, 0x10) write$FUSE_IOCTL(r5, &(0x7f0000000280)={0x20}, 0x20) ioctl$NBD_SET_BLKSIZE(r5, 0xab01, 0x8001) socket$bt_bnep(0x1f, 0x3, 0x4) 02:03:56 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x22ad21, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0x80044327, &(0x7f00000000c0)={0x0, 0x0}) 02:03:56 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x22b, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x2a3) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000002000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa00006e0000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000020000000000000000000002002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f000000000000000000000000000044fc736530000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800"/592]}, 0x2c8) [ 246.408688][ T9938] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 02:03:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=ANY=[@ANYBLOB=' \x00'/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x0) [ 246.592808][ T9946] IPVS: set_ctl: invalid protocol: 4 0.0.0.0:20004 [ 246.660955][ T9946] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 246.826383][ T9953] Enabling of bearer rejected, illegal name 02:03:56 executing program 3: r0 = shmget$private(0x0, 0x3000, 0x1, &(0x7f0000ffc000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="dc6c1a6e"]) membarrier(0x40, 0x0) 02:03:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000000)=0x3) r3 = dup2(r2, r1) io_destroy(0x0) clock_nanosleep(0x7, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240)) write$FUSE_IOCTL(r3, &(0x7f0000000280)={0x20}, 0x20) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r3, 0xc0945662, &(0x7f0000000140)={0xc483, 0x0, [], {0x0, @reserved}}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x40000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_NEW_CTX(r4, 0x40086425, &(0x7f0000000100)={0x0, 0x2}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_int(r5, 0x1, 0x2b, &(0x7f000059dffc), &(0x7f0000000080)=0x4) 02:03:56 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x20000000000003, 0x3, &(0x7f0000000340)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x59, 0x1d}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x10000000000001, 0x39c, &(0x7f0000000580)=""/195, 0x0, 0x0, [0x42]}, 0x48) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x800, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x4) r1 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000000)=0x3) r3 = dup2(r2, r1) write$FUSE_IOCTL(r3, &(0x7f0000000280)={0x20, 0x0, 0x0, {0x0, 0x0, 0xffffffff, 0x20}}, 0x20) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r3, 0x80045400, &(0x7f0000000080)) 02:03:56 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x23e, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/574]}, 0x2b6) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 247.146613][ T9968] FAT-fs (loop3): Unrecognized mount option "Üln" or missing value [ 247.157806][ T26] audit: type=1804 audit(1567735436.882:131): pid=9971 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir919711032/syzkaller.9k6ASL/42/file0" dev="sda1" ino=16798 res=1 02:03:57 executing program 5: getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) r1 = getpid() ptrace(0x10, r1) waitid(0x1, r1, 0x0, 0x80000002, 0x0) syz_open_procfs(r1, &(0x7f0000000000)='children\x00') ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x77}) getsockname(r0, &(0x7f0000000180)=@nfc_llcp, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) open(0x0, 0x0, 0x0) r2 = memfd_create(0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) [ 247.270263][ T9972] FAT-fs (loop3): Unrecognized mount option "Üln" or missing value 02:03:57 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1d, 0x0, &(0x7f0000000540)) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000280)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x18a775d47252dea9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000340)={@local}) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000180)={0x200, 0xc8, 0x3ff}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000000)={0x65}) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x2}, &(0x7f0000000600)='/dev/null\x00', r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') openat$cgroup_ro(r0, &(0x7f0000000200)='cpuacct.usage_sys\x00', 0x0, 0x0) [ 247.887167][ T26] audit: type=1804 audit(1567735437.602:132): pid=9973 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir240905306/syzkaller.1ajdlq/57/file0" dev="sda1" ino=16801 res=1 02:03:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mlockall(0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200a00, 0x0) clone(0x804400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) fcntl$getown(r1, 0x9) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x7fffffff, 0x600000) r2 = socket$netlink(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x500, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3000000010000108ae8bc38408000002000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800180000000000"], 0x30}}, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000000), 0x4) 02:03:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8000000, 0xff03000000000000, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x2000, 0x8) r2 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$EVIOCGBITSND(r3, 0x80404532, &(0x7f0000000080)=""/155) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000000)=0x3) r5 = dup2(r4, r2) r6 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x628800, 0x0) r7 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x9, 0x40000) r8 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r8, 0x0, 0x482, &(0x7f0000000000)={0x4, @rand_addr, 0x4e24, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x2c) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000300)={r9, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) open(&(0x7f0000000340)='./file0\x00', 0x10801, 0x20) connect$unix(r1, &(0x7f0000000380)=@file={0x1, './file0\x00'}, 0x6e) setsockopt$inet_pktinfo(r8, 0x0, 0x8, &(0x7f0000000140)={r10, @remote, @loopback}, 0xc) r11 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ubi_ctrl\x00', 0x68200, 0x0) write$UHID_GET_REPORT_REPLY(r11, &(0x7f00000002c0)={0xa, 0xa, 0x100, 0x1}, 0xa) r12 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x18}]}, 0x30}}, 0x0) r13 = socket$nl_generic(0x10, 0x3, 0x10) r14 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r13, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x2c, r14, 0x605, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x10, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, '\x00'}}}}}, 0x2c}}, 0x0) r15 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r15, 0x29, 0x19, 0x0, 0x2a0) r16 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r16, 0x29, 0x19, 0x0, 0x2a0) sendmsg$TIPC_CMD_SET_LINK_TOL(r12, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000160}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r14, @ANYRES64=r16], 0x3}}, 0x40000) bind$xdp(r6, &(0x7f0000000200)={0x2c, 0x1, r10, 0x3f, r3}, 0x10) write$FUSE_IOCTL(r5, &(0x7f0000000280)={0x20}, 0x20) ioctl$NBD_SET_BLKSIZE(r5, 0xab01, 0x8001) socket$bt_bnep(0x1f, 0x3, 0x4) 02:03:57 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x44500) fadvise64(r1, 0x0, 0x200, 0x6be8b3d0db2ba4b5) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0100000000000000000001000000000000000841f60000140018000000007564703a73797a3000000000"], 0x30}}, 0x0) 02:03:57 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x23e, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/574]}, 0x2b6) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 02:03:57 executing program 0: ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'ip6erspan0\x00', {0x2, 0x4e23, @dev}}) getpid() futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x100, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev_mcast\x00') shmctl$IPC_RMID(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x18}]}, 0x30}}, 0x0) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x100, 0x70bd27, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x4000804) perf_event_open(&(0x7f0000000440)={0x2, 0x2f2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) sendfile(r0, r2, &(0x7f0000000000)=0x100000, 0x100000008008) 02:03:57 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='hfs\x00', 0x0, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f00000004c0)=[&(0x7f0000000140)='\\\x00', &(0x7f0000000180)='\x00', &(0x7f00000001c0)='/dev/full\x00', &(0x7f0000000380)='/proc/\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='/dev/full\x00', &(0x7f0000000440)='hfs\x00', &(0x7f0000000480)='\x00'], &(0x7f0000000680)=[&(0x7f0000000500)='\x00', &(0x7f0000000540)='\x00', &(0x7f0000000580)='vmnet0\x00', &(0x7f00000005c0)='trusted.(cgroupeth0GPL[\x00', &(0x7f0000000600)='/dev/full\x00', &(0x7f0000000640)='hfs\x00']) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x9a6e6c8b7604c23f, 0x0) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f00000000c0)=0x107e) [ 248.261877][T10011] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 02:03:58 executing program 5: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x801}, 0x5b) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000005e0083020000004760cd445c6e053580027631", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x1c}}, 0x0) [ 248.319739][T10011] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 248.399255][T10017] IPVS: set_ctl: invalid protocol: 4 0.0.0.0:20004 [ 248.469452][T10017] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 02:03:58 executing program 5: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) r1 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000000)=0x3) r3 = dup2(r2, r1) write$FUSE_IOCTL(r3, &(0x7f0000000280)={0x20}, 0x20) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000001c0)) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x6, 0xc0000) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{}]}) keyctl$update(0x2, r0, &(0x7f0000000040)="d8fd00000000", 0x6) [ 248.571306][T10017] Enabling of bearer rejected, illegal name 02:03:58 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x23e, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/574]}, 0x2b6) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000002000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa00006e0000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000020000000000000000000002002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f000000000000000000000000000044fc736530000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800"/592]}, 0x2c8) [ 248.649919][T10018] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 248.711995][T10018] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 248.718236][T10031] encrypted_key: insufficient parameters specified 02:03:58 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket(0x10, 0x800000000080002, 0x0) r2 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x109002) ioctl$UI_SET_FFBIT(r2, 0x4004556b, 0x32) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) r3 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x6, &(0x7f00000000c0)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000061f08000000000000000000000001010000cb010000000000004000000000000000d0000000000000000000000000003800000001fc0600000007000000070000000000000000000000f3000000000000000000000000000000000000000000000000000000000000000700000000a22a4012f8ba900cb1a963f00ffb000000000000600000000000020000000000000600005854c15142612fea0000000000ff0f00"/184], 0xb0) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) r4 = socket$inet6(0xa, 0x0, 0x2) connect(r4, &(0x7f0000000040)=@rxrpc=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80) ioctl(0xffffffffffffffff, 0xc2604110, 0x0) 02:03:58 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000005c0)={0x1, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x7e, 0xa71499a07ab9173) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000000)=0x3) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.threads\x00', 0x2, 0x0) r4 = dup2(r3, r2) write$FUSE_IOCTL(r4, &(0x7f0000000280)={0x20}, 0x20) setns(r4, 0xc000000) 02:03:58 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x1) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r2, 0x29, 0x19, 0x0, 0x2a0) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000140)={0x401}, 0x4) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000080)={0xd41, 0x9, 0xce01, 0x8, 0xf, 0x5, 0x8001, 0x6000000000000, 0x7ff, 0x3ff}) r3 = getpid() ptrace(0x10, r3) waitid(0x1, r3, 0x0, 0x80000002, 0x0) ptrace$setsig(0x4203, r3, 0x5, &(0x7f00000000c0)={0xf, 0x7, 0x1000}) [ 249.090980][ T26] audit: type=1804 audit(1567735438.812:133): pid=10043 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir734535609/syzkaller.4ZmHLb/48/file0" dev="sda1" ino=16791 res=1 [ 249.692685][T10025] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 02:03:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mlockall(0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200a00, 0x0) clone(0x804400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) fcntl$getown(r1, 0x9) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x7fffffff, 0x600000) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3000000010000108ae8bc38408000002000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800180000000000"], 0x30}}, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000000), 0x4) 02:03:59 executing program 3: ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000080)="52f531a0641ad531ecb7842672f3486e4c36c4155af9e6869f00c6cf8e316dd0f35f520b3ffbe0b874b419cf05b57ee36a556db1a65a8156337306b111f52f1fd6a9bc0e7c3c5d8a1754f4e53c1cd66887cd13037b04d7925e17df0bfa09c2df5a8522ec687f837b9b28aa06098ecd562ef57c0db12adef846a499a7455d22c1710dfd1e93fbde2b2a7638ae0b59cac4a01cbfcd1270ae620c3f2f604c30f345fded3e1ed344ac7be9801fb89ef36582405ac7fae6f2188ddbd41a24426b67ae2090b401c423b07a14e7b5a5de51cbe523d4ebc57e6d") ioctl$VIDIOC_S_EDID(0xffffffffffffffff, 0xc0285629, &(0x7f0000000ac0)={0x0, 0x0, 0xfff, [], 0x0}) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000009c0)={0x2, 0x0, @broadcast}, &(0x7f0000000a00)=0x10, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000000)=ANY=[@ANYBLOB="010041a6f77657d0cda40d5f4fe6123f2200", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0x75, &(0x7f00000001c0)={r3, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000080)=0x98) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000a40)={r3, 0xfffffffffffff48a}, &(0x7f0000000a80)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000001b00)=@sack_info={r4, 0x3, 0xa0e}, &(0x7f0000001b40)=0xc) 02:03:59 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x247, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x2bf) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 02:03:59 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000200)={0x8, @raw_data="08838529a6d9154494131b8636a8f7228f880fcae0e592e47dea38d39df89828215b4dfe60767085f9caf30ef228f807b053571a17ceb991d46e521c9bf44f41863ecf1adce96948738bdc9cf14033680de9f9034d73061a60995f79cbc18a4fdb083c0fef570985a12abd02f2b7de98b2bd030b3c3a0fa61cad2fdebcf84b4cd249e4d848c04e41f4fc29bf4899e417cdc80d1f42752b0007141c27c096c8e5d19adeacece84ccc3d30813e222ecd7ef8092410f9391035f34554602fb44b0f6ec13b89648b5bcb"}) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r3 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000000)=0x3) r5 = dup2(r4, r3) write$FUSE_IOCTL(r5, &(0x7f0000000280)={0x20}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000001400bfa30000000000000703000000feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000811e6403000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r6, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=r7, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)=r7, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r5, 0x0, 0x1, &(0x7f0000000000)='\x00', r7}, 0x30) ptrace$setopts(0x4200, r8, 0x8ceb, 0x200005) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="3100000000000000000009000000280003000800030000000000140002006c6f00000000000000000000000000000800010001000000617172d3d6def3363392e608c5718208ee88658436a8035bf72a226e35a499b130a7c88e59c42d8ed7d78973b74dde00a32d6068d5bf94d66acb2859e4dd6a253960524e0ff5cdc3b687959b3b1d9fee94769de6371c87943967644383f4caef249b3c704b8ecc75fd72dbeaa001001207b940ea0479c8e1bfbd2a6b85935c1e8195d8471d85175a"], 0x3c}}, 0x0) 02:03:59 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x28) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0xffffffffffffff20, &(0x7f0000000840)=[{&(0x7f0000000100)="d800000018008106e00f80ecdb4cb906021d65ef0b007c05e8fe32a1bc0016000000000103000000050000000000812fa8000b000f0063e3e558f030035c3b61c1d67f7f9400717cc7d6fe846d29491ce459adfff5ffda34cf6efb8000a007a290457f0189b316275ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9acbee5de6ccd40d", 0xd8}], 0x1, 0x0, 0xfffffffffffffe29}, 0x0) 02:03:59 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001dc0)='/dev/net/tun\x00', 0x0, 0x0) close(r0) socket$kcm(0xa, 0x2, 0x11) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\b', @random="01003a0c0b10"}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r1, 0x0, 0x1, &(0x7f0000000080)=0x400, 0x4) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000000)={@multicast1, @multicast1}, &(0x7f0000000040)=0xc) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r2, 0x29, 0x19, 0x0, 0x2a0) r3 = accept4(r2, &(0x7f0000000140)=@x25, &(0x7f00000000c0)=0x80, 0x0) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0x75, &(0x7f00000001c0)={r6, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000080)=0x98) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r7, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r7, 0x84, 0x75, &(0x7f00000001c0)={r9, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000080)=0x98) getsockopt$inet_sctp6_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f00000001c0)={r6, 0x7, 0x2, 0xfc, 0x9, 0x47, 0x6b98, 0x7ff, {r9, @in6={{0xa, 0x4e22, 0x3b5, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}}, 0x5, 0x3, 0x2, 0x1, 0x7}}, &(0x7f0000000280)=0xb0) [ 249.968372][T10068] IPVS: Error connecting to the multicast addr 02:03:59 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mlockall(0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200a00, 0x0) clone(0x804400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) fcntl$getown(r1, 0x9) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x7fffffff, 0x600000) r2 = socket$netlink(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x500, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3000000010000108ae8bc38408000002000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800180000000000"], 0x30}}, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000000), 0x4) 02:03:59 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001dc0)='/dev/net/tun\x00', 0x0, 0x0) close(r0) socket$kcm(0xa, 0x2, 0x11) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\b', @random="01003a0c0b10"}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r1, 0x0, 0x1, &(0x7f0000000080)=0x400, 0x4) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000000)={@multicast1, @multicast1}, &(0x7f0000000040)=0xc) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r2, 0x29, 0x19, 0x0, 0x2a0) r3 = accept4(r2, &(0x7f0000000140)=@x25, &(0x7f00000000c0)=0x80, 0x0) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0x75, &(0x7f00000001c0)={r6, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000080)=0x98) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r7, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r7, 0x84, 0x75, &(0x7f00000001c0)={r9, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000080)=0x98) getsockopt$inet_sctp6_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f00000001c0)={r6, 0x7, 0x2, 0xfc, 0x9, 0x47, 0x6b98, 0x7ff, {r9, @in6={{0xa, 0x4e22, 0x3b5, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}}, 0x5, 0x3, 0x2, 0x1, 0x7}}, &(0x7f0000000280)=0xb0) [ 250.070491][ T26] audit: type=1804 audit(1567735439.792:134): pid=10068 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir240905306/syzkaller.1ajdlq/59/file0" dev="sda1" ino=16811 res=1 [ 250.152005][T10068] IPVS: Error connecting to the multicast addr 02:04:00 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video35\x00', 0x2, 0x0) r1 = inotify_init() ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000000)) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f00000001c0)={0x981900}) 02:04:00 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000200)={0x8, @raw_data="08838529a6d9154494131b8636a8f7228f880fcae0e592e47dea38d39df89828215b4dfe60767085f9caf30ef228f807b053571a17ceb991d46e521c9bf44f41863ecf1adce96948738bdc9cf14033680de9f9034d73061a60995f79cbc18a4fdb083c0fef570985a12abd02f2b7de98b2bd030b3c3a0fa61cad2fdebcf84b4cd249e4d848c04e41f4fc29bf4899e417cdc80d1f42752b0007141c27c096c8e5d19adeacece84ccc3d30813e222ecd7ef8092410f9391035f34554602fb44b0f6ec13b89648b5bcb"}) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r3 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000000)=0x3) r5 = dup2(r4, r3) write$FUSE_IOCTL(r5, &(0x7f0000000280)={0x20}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000001400bfa30000000000000703000000feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000811e6403000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r6, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=r7, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)=r7, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r5, 0x0, 0x1, &(0x7f0000000000)='\x00', r7}, 0x30) ptrace$setopts(0x4200, r8, 0x8ceb, 0x200005) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="3100000000000000000009000000280003000800030000000000140002006c6f00000000000000000000000000000800010001000000617172d3d6def3363392e608c5718208ee88658436a8035bf72a226e35a499b130a7c88e59c42d8ed7d78973b74dde00a32d6068d5bf94d66acb2859e4dd6a253960524e0ff5cdc3b687959b3b1d9fee94769de6371c87943967644383f4caef249b3c704b8ecc75fd72dbeaa001001207b940ea0479c8e1bfbd2a6b85935c1e8195d8471d85175a"], 0x3c}}, 0x0) 02:04:00 executing program 5: r0 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000000)=0x3) r2 = dup2(r1, r0) write$FUSE_IOCTL(r2, &(0x7f0000000280)={0x20}, 0x20) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='=pu.stat\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x100002, 0x20040002}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) 02:04:00 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x247, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000002000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa00006e0000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000020000000000000000000002002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f000000000000000000000000000044fc736530000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a0000000415544495400000000000000000000000000000000000000000000000000000008000000000000"]}, 0x2bf) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000002000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa00006e0000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000020000000000000000000002002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f000000000000000000000000000044fc736530000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800"/592]}, 0x2c8) [ 250.535961][ T26] audit: type=1804 audit(1567735440.252:135): pid=10102 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir919711032/syzkaller.9k6ASL/49/file0" dev="sda1" ino=16811 res=1 [ 250.696358][T10101] IPVS: Error connecting to the multicast addr [ 251.311689][T10091] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 02:04:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mlockall(0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200a00, 0x0) clone(0x804400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) fcntl$getown(r1, 0x9) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x7fffffff, 0x600000) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3000000010000108ae8bc38408000002000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800180000000000"], 0x30}}, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000000), 0x4) 02:04:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x247, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x2bf) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000002000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa00006e0000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000020000000000000000000002002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f000000000000000000000000000044fc736530000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800"/592]}, 0x2c8) 02:04:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x200, 0x0) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f00000002c0)="c1d2ec74c9a94529c316d11ec6e1359d3e9a8010d2da0b94fd33ca1b5bfd9e7466895b90ce0d4a36013919a6e2e0aaeec0655e4589c30d5de263c1ea322d8c5ca92a256c5224e2b396db90a4b7bdafa85e209443de7c87a30dc5d965b110d2861799a96447eefe17125febddfc4c56554aab98e3594299b58cc7f16683b28a15d5eb8e1a4349f5ebb8e56be59190e24a3393c465b79a3e1e59dd5818406e3717682596a067de49688040da6c23300eddf16e4a4ff6851b4cbd837db64a1d198d50d65823dfcfafa781adc27945910ac1ed9d85a38f6882") mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r2, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x20b, 0x0) 02:04:01 executing program 5: r0 = shmget$private(0x0, 0x2000, 0x20, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_STAT(r0, 0x2, 0x0) 02:04:01 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000200)={0x8, @raw_data="08838529a6d9154494131b8636a8f7228f880fcae0e592e47dea38d39df89828215b4dfe60767085f9caf30ef228f807b053571a17ceb991d46e521c9bf44f41863ecf1adce96948738bdc9cf14033680de9f9034d73061a60995f79cbc18a4fdb083c0fef570985a12abd02f2b7de98b2bd030b3c3a0fa61cad2fdebcf84b4cd249e4d848c04e41f4fc29bf4899e417cdc80d1f42752b0007141c27c096c8e5d19adeacece84ccc3d30813e222ecd7ef8092410f9391035f34554602fb44b0f6ec13b89648b5bcb"}) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r3 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000000)=0x3) r5 = dup2(r4, r3) write$FUSE_IOCTL(r5, &(0x7f0000000280)={0x20}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000001400bfa30000000000000703000000feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000811e6403000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r6, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=r7, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)=r7, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r5, 0x0, 0x1, &(0x7f0000000000)='\x00', r7}, 0x30) ptrace$setopts(0x4200, r8, 0x8ceb, 0x200005) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="3100000000000000000009000000280003000800030000000000140002006c6f00000000000000000000000000000800010001000000617172d3d6def3363392e608c5718208ee88658436a8035bf72a226e35a499b130a7c88e59c42d8ed7d78973b74dde00a32d6068d5bf94d66acb2859e4dd6a253960524e0ff5cdc3b687959b3b1d9fee94769de6371c87943967644383f4caef249b3c704b8ecc75fd72dbeaa001001207b940ea0479c8e1bfbd2a6b85935c1e8195d8471d85175a"], 0x3c}}, 0x0) 02:04:01 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001200)={[{@commit={'commit', 0x3d, 0xfffffffffffffffb}}]}) r0 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000000)=0x3) r2 = dup2(r1, r0) write$FUSE_IOCTL(r2, &(0x7f0000000280)={0x20}, 0x20) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f0000000080)) [ 251.799512][T10126] IPVS: Error connecting to the multicast addr [ 251.878471][T10131] REISERFS warning (device loop5): super-6508 reiserfs_parse_options: bad value 0xfffffffffffffffb for -ocommit [ 251.878471][T10131] [ 251.918038][T10109] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 252.055107][T10131] REISERFS warning (device loop5): super-6508 reiserfs_parse_options: bad value 0xfffffffffffffffb for -ocommit [ 252.055107][T10131] 02:04:02 executing program 3: r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2e, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000180)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r2, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r3 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0x1c) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) listen(r3, 0x0) sendmsg(r2, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4$packet(r3, 0x0, 0x0, 0x0) 02:04:02 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000200)={0x8, @raw_data="08838529a6d9154494131b8636a8f7228f880fcae0e592e47dea38d39df89828215b4dfe60767085f9caf30ef228f807b053571a17ceb991d46e521c9bf44f41863ecf1adce96948738bdc9cf14033680de9f9034d73061a60995f79cbc18a4fdb083c0fef570985a12abd02f2b7de98b2bd030b3c3a0fa61cad2fdebcf84b4cd249e4d848c04e41f4fc29bf4899e417cdc80d1f42752b0007141c27c096c8e5d19adeacece84ccc3d30813e222ecd7ef8092410f9391035f34554602fb44b0f6ec13b89648b5bcb"}) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r3 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000000)=0x3) r5 = dup2(r4, r3) write$FUSE_IOCTL(r5, &(0x7f0000000280)={0x20}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000001400bfa30000000000000703000000feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000811e6403000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r6, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=r7, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)=r7, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r5, 0x0, 0x1, &(0x7f0000000000)='\x00', r7}, 0x30) ptrace$setopts(0x4200, r8, 0x8ceb, 0x200005) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="3100000000000000000009000000280003000800030000000000140002006c6f00000000000000000000000000000800010001000000617172d3d6def3363392e608c5718208ee88658436a8035bf72a226e35a499b130a7c88e59c42d8ed7d78973b74dde00a32d6068d5bf94d66acb2859e4dd6a253960524e0ff5cdc3b687959b3b1d9fee94769de6371c87943967644383f4caef249b3c704b8ecc75fd72dbeaa001001207b940ea0479c8e1bfbd2a6b85935c1e8195d8471d85175a"], 0x3c}}, 0x0) 02:04:02 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000140)='v/sg#\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(r0, 0x2283, 0x719000) 02:04:02 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x24c, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/588]}, 0x2c4) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 02:04:02 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x101002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x1) bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x14, 0x6, 0x4, 0x2, 0x4}, 0x3c) 02:04:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r1, 0x0, 0x1, &(0x7f0000000080)=0x400, 0x4) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000002c0)={0x0, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e20, @local}, {0x2, 0x4e24, @broadcast}, 0x1, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000100)='bridge0\x00', 0x7, 0x1, 0x6}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='cmdline\x00') r3 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000340)=0x7, 0x1) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000000)=0x3) r5 = dup2(r4, r3) write$FUSE_IOCTL(r5, &(0x7f0000000280)={0x20}, 0x20) write$FUSE_WRITE(r5, &(0x7f0000000000)={0x18, 0x0, 0x3, {0x9}}, 0x18) write$FUSE_NOTIFY_DELETE(r5, &(0x7f00000003c0)={0x91, 0x6, 0x0, {0x2, 0x2, 0x68, 0x0, '\xef\xf4\xc3\xf6\"\xbd\xd1N\x13\x83*r(X%\xaa\xb9J\x14\xfe\xc04~\xf0]\xbb\xd9$\x91\x8fKX\xf8\xd7\xc2\n\xc1\x1f\xb1^\x11D\xf1.Ti\x9b\xcf>\xb9\x19\xf8\xcc\xe3\x12\xb2\xf58\xb3i\xe1\xb5\xeb`K\xa7\x91\x12\xb11\xad\xee\xd4\xc6\xe7\xb8x)1&\xd0M\xcc\xac\xc2\x9d\xf5\x97FDt\xd8\xd3\xc6|\xa0\xa4\xe4\xe1\xc6\xb2\x89g\x1a'}}, 0x91) preadv(r2, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='\xef\xf4\xc3\xf6\"\xbd\xd1N\x13\x83*r(X%\xaa\xb9J\x14\xfe\xc04~\xf0]\xbb\xd9$\x91\x8fKX\xf8\xd7\xc2\n\xc1\x1f\xb1^\x11D\xf1.Ti\x9b\xcf>\xb9\x19\xf8\xcc\xe3\x12\xb2\xf58\xb3i\xe1\xb5\xeb`K\xa7\x91\x12\xb11\xad\xee\xd4\xc6\xe7\xb8x)1&\xd0M\xcc\xac\xc2\x9d\xf5\x97FDt\xd8\xd3\xc6|\xa0\xa4\xe4\xe1\xc6\xb2\x89g\x1a') [ 252.587837][T10160] IPVS: Error connecting to the multicast addr [ 252.688343][ T26] audit: type=1804 audit(1567735442.412:136): pid=10172 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir498492816/syzkaller.Q11zhP/58/file0" dev="sda1" ino=16830 res=1 [ 253.138127][T10150] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 02:04:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mlockall(0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200a00, 0x0) clone(0x804400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) fcntl$getown(r1, 0x9) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x7fffffff, 0x600000) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3000000010000108ae8bc38408000002000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800180000000000"], 0x30}}, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000000), 0x4) 02:04:03 executing program 3: ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f0000000040)={0x3, &(0x7f0000000040)}) r0 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000000)=0x3) r2 = dup2(r1, r0) write$FUSE_IOCTL(r2, &(0x7f0000000280)={0x20}, 0x20) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000000)=0x3) 02:04:03 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x2, 0x1f8057b79c72679) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000080)={0x1, 0x4, 0x4, 0xfad}) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8003, &(0x7f0000000000)=0x6, 0x8, 0x2) r1 = getpid() ptrace(0x10, r1) r2 = getpid() ptrace(0x10, r2) waitid(0x1, r2, 0x0, 0x80000002, 0x0) waitid(0x1, r2, 0x0, 0x80000002, 0x0) timer_create(0x2, &(0x7f00000000c0)={0x0, 0x17, 0x6, @tid=r1}, &(0x7f0000000100)) 02:04:03 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000200)={0x8, @raw_data="08838529a6d9154494131b8636a8f7228f880fcae0e592e47dea38d39df89828215b4dfe60767085f9caf30ef228f807b053571a17ceb991d46e521c9bf44f41863ecf1adce96948738bdc9cf14033680de9f9034d73061a60995f79cbc18a4fdb083c0fef570985a12abd02f2b7de98b2bd030b3c3a0fa61cad2fdebcf84b4cd249e4d848c04e41f4fc29bf4899e417cdc80d1f42752b0007141c27c096c8e5d19adeacece84ccc3d30813e222ecd7ef8092410f9391035f34554602fb44b0f6ec13b89648b5bcb"}) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r3 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000000)=0x3) r5 = dup2(r4, r3) write$FUSE_IOCTL(r5, &(0x7f0000000280)={0x20}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000001400bfa30000000000000703000000feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000811e6403000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r6, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=r7, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)=r7, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r5, 0x0, 0x1, &(0x7f0000000000)='\x00', r7}, 0x30) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="3100000000000000000009000000280003000800030000000000140002006c6f00000000000000000000000000000800010001000000617172d3d6def3363392e608c5718208ee88658436a8035bf72a226e35a499b130a7c88e59c42d8ed7d78973b74dde00a32d6068d5bf94d66acb2859e4dd6a253960524e0ff5cdc3b687959b3b1d9fee94769de6371c87943967644383f4caef249b3c704b8ecc75fd72dbeaa001001207b940ea0479c8e1bfbd2a6b85935c1e8195d8471d85175a"], 0x3c}}, 0x0) 02:04:03 executing program 2: write$P9_ROPEN(0xffffffffffffffff, 0x0, 0xfffffffffffffecf) socket$rxrpc(0x21, 0x2, 0x3f5d7ba7eb85dacf) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x6, 0x501281) modify_ldt$write(0x1, 0x0, 0x0) mkdir(0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x41c1, 0x1000, 0x0, 0x0, 0x0, 0xfffffffeffffffff, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, @perf_config_ext, 0x20000, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) 02:04:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x24c, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000002000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa00006e0000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000020000000000000000000002002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f000000000000000000000000000044fc736530000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800"/588]}, 0x2c4) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000002000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa00006e0000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000020000000000000000000002002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f000000000000000000000000000044fc736530000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800"/592]}, 0x2c8) [ 253.392894][ T26] audit: type=1804 audit(1567735443.112:137): pid=10192 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir734535609/syzkaller.4ZmHLb/52/file0" dev="sda1" ino=16856 res=1 [ 253.431843][T10189] IPVS: ftp: loaded support on port[0] = 21 [ 253.460831][T10186] IPVS: Error connecting to the multicast addr [ 253.518652][ T26] audit: type=1804 audit(1567735443.142:138): pid=10194 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir734535609/syzkaller.4ZmHLb/52/file0" dev="sda1" ino=16856 res=1 02:04:03 executing program 3: r0 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) bind$netrom(r0, &(0x7f00000001c0)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x8}, [@null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0x8) sendto$rose(0xffffffffffffffff, &(0x7f0000000000)="118851ce6ac54839c2bda03cd542ee9641803b629403ae735fdc879d3b97d90efe9e798f5dd056d88bfb8ed9090508676340c7469fd80892624d7c684b02478f4b0df0c4dd82900f1c53a8bafff7c4e10c0c76babb5ad5c5630acdc93369c46f5afc9ce09f33725271da8b8d729f10e383451e09c679dc652c8c4275287442cb0e1f59b5ec2766e805f662de0277cf1f0f31635ce5", 0x95, 0x40008852, &(0x7f00000000c0)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, @bcast}, 0x1c) ioctl$DRM_IOCTL_AGP_INFO(r1, 0x80386433, &(0x7f0000000140)=""/111) 02:04:03 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000200)={0x8, @raw_data="08838529a6d9154494131b8636a8f7228f880fcae0e592e47dea38d39df89828215b4dfe60767085f9caf30ef228f807b053571a17ceb991d46e521c9bf44f41863ecf1adce96948738bdc9cf14033680de9f9034d73061a60995f79cbc18a4fdb083c0fef570985a12abd02f2b7de98b2bd030b3c3a0fa61cad2fdebcf84b4cd249e4d848c04e41f4fc29bf4899e417cdc80d1f42752b0007141c27c096c8e5d19adeacece84ccc3d30813e222ecd7ef8092410f9391035f34554602fb44b0f6ec13b89648b5bcb"}) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r3 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000000)=0x3) r5 = dup2(r4, r3) write$FUSE_IOCTL(r5, &(0x7f0000000280)={0x20}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000001400bfa30000000000000703000000feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000811e6403000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r6, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=r7, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)=r7, 0x4) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="3100000000000000000009000000280003000800030000000000140002006c6f00000000000000000000000000000800010001000000617172d3d6def3363392e608c5718208ee88658436a8035bf72a226e35a499b130a7c88e59c42d8ed7d78973b74dde00a32d6068d5bf94d66acb2859e4dd6a253960524e0ff5cdc3b687959b3b1d9fee94769de6371c87943967644383f4caef249b3c704b8ecc75fd72dbeaa001001207b940ea0479c8e1bfbd2a6b85935c1e8195d8471d85175a"], 0x3c}}, 0x0) 02:04:03 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000200)={0x8, @raw_data="08838529a6d9154494131b8636a8f7228f880fcae0e592e47dea38d39df89828215b4dfe60767085f9caf30ef228f807b053571a17ceb991d46e521c9bf44f41863ecf1adce96948738bdc9cf14033680de9f9034d73061a60995f79cbc18a4fdb083c0fef570985a12abd02f2b7de98b2bd030b3c3a0fa61cad2fdebcf84b4cd249e4d848c04e41f4fc29bf4899e417cdc80d1f42752b0007141c27c096c8e5d19adeacece84ccc3d30813e222ecd7ef8092410f9391035f34554602fb44b0f6ec13b89648b5bcb"}) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r3 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000000)=0x3) r5 = dup2(r4, r3) write$FUSE_IOCTL(r5, &(0x7f0000000280)={0x20}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000001400bfa30000000000000703000000feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000811e6403000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r6, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=r7, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)=r7, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r5, 0x0, 0x1, &(0x7f0000000000)='\x00', r7}, 0x30) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="3100000000000000000009000000280003000800030000000000140002006c6f00000000000000000000000000000800010001000000617172d3d6def3363392e608c5718208ee88658436a8035bf72a226e35a499b130a7c88e59c42d8ed7d78973b74dde00a32d6068d5bf94d66acb2859e4dd6a253960524e0ff5cdc3b687959b3b1d9fee94769de6371c87943967644383f4caef249b3c704b8ecc75fd72dbeaa001001207b940ea0479c8e1bfbd2a6b85935c1e8195d8471d85175a"], 0x3c}}, 0x0) [ 253.804669][T10204] IPVS: Error connecting to the multicast addr 02:04:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x24c, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/588]}, 0x2c4) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 02:04:03 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000200)={0x8, @raw_data="08838529a6d9154494131b8636a8f7228f880fcae0e592e47dea38d39df89828215b4dfe60767085f9caf30ef228f807b053571a17ceb991d46e521c9bf44f41863ecf1adce96948738bdc9cf14033680de9f9034d73061a60995f79cbc18a4fdb083c0fef570985a12abd02f2b7de98b2bd030b3c3a0fa61cad2fdebcf84b4cd249e4d848c04e41f4fc29bf4899e417cdc80d1f42752b0007141c27c096c8e5d19adeacece84ccc3d30813e222ecd7ef8092410f9391035f34554602fb44b0f6ec13b89648b5bcb"}) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r3 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000000)=0x3) r5 = dup2(r4, r3) write$FUSE_IOCTL(r5, &(0x7f0000000280)={0x20}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000001400bfa30000000000000703000000feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000811e6403000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r6, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=r7, 0x4) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="3100000000000000000009000000280003000800030000000000140002006c6f00000000000000000000000000000800010001000000617172d3d6def3363392e608c5718208ee88658436a8035bf72a226e35a499b130a7c88e59c42d8ed7d78973b74dde00a32d6068d5bf94d66acb2859e4dd6a253960524e0ff5cdc3b687959b3b1d9fee94769de6371c87943967644383f4caef249b3c704b8ecc75fd72dbeaa001001207b940ea0479c8e1bfbd2a6b85935c1e8195d8471d85175a"], 0x3c}}, 0x0) [ 254.042323][T10214] IPVS: sync thread started: state = MASTER, mcast_ifn = lo, syncid = 0, id = 0 [ 254.173275][T10222] IPVS: Error connecting to the multicast addr 02:04:03 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x10) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x200000, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) sendto$inet(r0, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6587b967480b41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e750844ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xfe6a, 0x2, 0x0, 0x27) [ 255.156290][T10211] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 02:04:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mlockall(0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200a00, 0x0) clone(0x804400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) fcntl$getown(r1, 0x9) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x7fffffff, 0x600000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x500, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3000000010000108ae8bc38408000002000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800180000000000"], 0x30}}, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000000), 0x4) 02:04:05 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x2, 0x100) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x8000, 0x0) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, &(0x7f00000000c0)) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x5, @loopback, 0x200}, 0x1c) r2 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000180), &(0x7f00000001c0)=0xc7) 02:04:05 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000200)={0x8, @raw_data="08838529a6d9154494131b8636a8f7228f880fcae0e592e47dea38d39df89828215b4dfe60767085f9caf30ef228f807b053571a17ceb991d46e521c9bf44f41863ecf1adce96948738bdc9cf14033680de9f9034d73061a60995f79cbc18a4fdb083c0fef570985a12abd02f2b7de98b2bd030b3c3a0fa61cad2fdebcf84b4cd249e4d848c04e41f4fc29bf4899e417cdc80d1f42752b0007141c27c096c8e5d19adeacece84ccc3d30813e222ecd7ef8092410f9391035f34554602fb44b0f6ec13b89648b5bcb"}) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r3 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000000)=0x3) r5 = dup2(r4, r3) write$FUSE_IOCTL(r5, &(0x7f0000000280)={0x20}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000001400bfa30000000000000703000000feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000811e6403000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r6, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="3100000000000000000009000000280003000800030000000000140002006c6f00000000000000000000000000000800010001000000617172d3d6def3363392e608c5718208ee88658436a8035bf72a226e35a499b130a7c88e59c42d8ed7d78973b74dde00a32d6068d5bf94d66acb2859e4dd6a253960524e0ff5cdc3b687959b3b1d9fee94769de6371c87943967644383f4caef249b3c704b8ecc75fd72dbeaa001001207b940ea0479c8e1bfbd2a6b85935c1e8195d8471d85175a"], 0x3c}}, 0x0) 02:04:05 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) syz_open_dev$adsp(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x0, 0x0) pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000000c0), 0x1}}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x60, 0x7, 0x2000}, 0x4) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000080)='.\x00', 0xfe) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) dup2(r3, r2) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$VIDIOC_LOG_STATUS(r3, 0x5646, 0x0) accept$alg(r0, 0x0, 0x0) 02:04:05 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x24e, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000002000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa00006e0000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000020000000000000000000002002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f000000000000000000000000000044fc736530000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800"/590]}, 0x2c6) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 255.526480][T10240] IPVS: Error connecting to the multicast addr 02:04:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x18}]}, 0x30}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000780)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)={0x14, r3, 0x1, 0x0, 0x0, {0x300}}, 0x14}}, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r4, 0x29, 0x19, 0x0, 0x2a0) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@initdev}}, &(0x7f0000000080)=0xe8) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r6, 0x29, 0x19, 0x0, 0x2a0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) r8 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r8, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) r9 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) getsockopt$inet_pktinfo(r9, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r9, 0x0, 0x8, &(0x7f0000000300)={r10, @loopback, @remote}, 0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f00000001c0)={'vcan0\x00', r10}) r12 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) getsockopt$inet_pktinfo(r12, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r12, 0x0, 0x8, &(0x7f0000000300)={r13, @loopback, @remote}, 0xc) r14 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r14, 0x0, 0x1, &(0x7f0000000080)=0x400, 0x4) getsockopt$inet_IP_XFRM_POLICY(r14, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@initdev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000440)=0xe8) r16 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) getsockopt$inet_pktinfo(r16, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r16, 0x0, 0x8, &(0x7f0000000300)={r17, @loopback, @remote}, 0xc) r18 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) r19 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r19, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) getsockopt$inet_pktinfo(r18, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r18, 0x0, 0x8, &(0x7f0000000300)={r20, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r18, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) setsockopt$inet_pktinfo(r19, 0x0, 0x8, &(0x7f0000000140)={r21, @remote, @loopback}, 0xc) r22 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r22, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r22, 0x8933, &(0x7f0000000480)={'vcan0\x00', 0x0}) r24 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) getsockopt$inet_pktinfo(r24, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r24, 0x0, 0x8, &(0x7f0000000300)={r25, @loopback, @remote}, 0xc) r26 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r26, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) accept4$packet(r26, &(0x7f0000000800)={0x11, 0x0, 0x0}, &(0x7f0000000840)=0x14, 0x800) r28 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r28, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r28, 0x8933, &(0x7f0000000880)={'vcan0\x00', 0x0}) r30 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) getsockopt$inet_pktinfo(r30, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r30, 0x0, 0x8, &(0x7f0000000300)={r31, @loopback, @remote}, 0xc) r32 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) r33 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r33, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) getsockopt$inet_pktinfo(r32, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r32, 0x0, 0x8, &(0x7f0000000300)={r34, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r32, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) setsockopt$inet_pktinfo(r33, 0x0, 0x8, &(0x7f0000000140)={r35, @remote, @loopback}, 0xc) r36 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) getsockopt$inet_pktinfo(r36, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r36, 0x0, 0x8, &(0x7f0000000300)={r37, @loopback, @remote}, 0xc) r38 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) getsockopt$inet_pktinfo(r38, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r38, 0x0, 0x8, &(0x7f0000000300)={r39, @loopback, @remote}, 0xc) r40 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r40, 0x29, 0x19, 0x0, 0x2a0) getsockopt$inet6_IPV6_IPSEC_POLICY(r40, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@multicast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f00000009c0)=0xe8) r42 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r42, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) getsockname$packet(r42, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000a40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a80)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000b80)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000001540)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xf6237eb254b0429b}, 0xc, &(0x7f0000001500)={&(0x7f0000000bc0)={0x90c, r3, 0xc00, 0x70bd2c, 0x25dfdbfb, {}, [{{0x8, 0x1, r5}, {0x100, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x56b}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r7}}, {0x8}}}]}}, {{0x8}, {0x1fc, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r11}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x7ff}}, {0x8, 0x6, r13}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffff01}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0xffffffff, 0x100, 0x3ff, 0x2}, {0x1, 0x0, 0x8, 0x8000}, {0x2, 0x3, 0xc9b600, 0x100000001}, {0x10aef544, 0x100, 0x8001, 0x8}, {0x4, 0x100, 0x8, 0xfffffffffffff000}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x4, 0x7}, {0x6f4, 0x7, 0x7f, 0xf2}, {0x4, 0x1f, 0x2, 0x889}, {0x6, 0x3, 0x4, 0x2}, {0xfff, 0x4, 0xde, 0x8}, {0x0, 0x9a3, 0x4}, {0x3ff, 0x1ff, 0xffffffffffffffc1, 0x5}]}}}]}}, {{0x8, 0x1, r21}, {0xd0, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x100}}, {0x8, 0x6, r23}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x80}}, {0x8, 0x6, r25}}}]}}, {{0x8, 0x1, r27}, {0x174, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r29}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r35}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xc6d}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8}, {0x3c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x3ff}}}]}}, {{0x8, 0x1, r37}, {0x19c, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r39}}}]}}, {{0x8, 0x1, r41}, {0x1a8, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x800}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xb5}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r43}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x8001}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r44}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xf14}}}]}}]}, 0x90c}, 0x1, 0x0, 0x0, 0x80c0}, 0x800) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="740000002400f704e4f19b215fafa58e29b05600", @ANYRES32=r45, @ANYBLOB="00000000ffffffffffffffff030001007366710006000500fffff0000010e104deccbbbde735b9a0000000000000000000856f000033cc3598c9aa8178bdf1000000000000000000000000de7f46000000000000007f0000000000009900007c24f1583940ea0e363002e94564838f54825863fe646c248656cb5d84553f8e485cea3b49c5ceffcfeaab4260fca524afef20c0034fbd36262c964c61f3771603fd386dc70a77e574632bd950e808d63007d6c6683e251ac28f6b621f863af06767a426b3dbe25f3d317796e51514a292528d7d2bef3b8444b64c875270810633f2eb7d7a89d0f3cf2074bb2e180772593cd728026dfe7b7bc2cbc705ed95700983ea22eefa47c53252758e283a6f02e15a86aff40a0cb6088e18f3326fa3a5dcd32cb951da688b87961591b4671e63cf2d0587b015cedfc78987be99d863c2d04497927f05980a38183d8208d5f1b6a9a933b679a58dd0e2c2c1100e0697ebaad5d25934dec5e5b8c8e22f6c4cf99331fb8283bc21253f65b225c94adc04f5da074832f8f1f4de70705b282b45b597347b6edf004ab1d0b45688d9746017344b8cf7d715a5fdfe24f529c1ae62488034f65ae090f0d099127e22c375b00799b53b66f32321a30f1d603c2797b943991f4927db29120ec89881fda9d614fceb31549db382308e11455d50acc784365a764299c02a2b9fbdb456ab23ad80f12be8f4fdef7d62fd2a4bf1942807d258f4b6f5a010c30341439eb3a706"], 0x3}}, 0x0) r46 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r47 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r47, 0x40e, &(0x7f0000000000)=0x3) r48 = dup2(r47, r46) write$FUSE_IOCTL(r48, &(0x7f0000000280)={0x20}, 0x20) ioctl$UI_SET_KEYBIT(r48, 0x40045565, 0x27b) 02:04:05 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000200)={0x8, @raw_data="08838529a6d9154494131b8636a8f7228f880fcae0e592e47dea38d39df89828215b4dfe60767085f9caf30ef228f807b053571a17ceb991d46e521c9bf44f41863ecf1adce96948738bdc9cf14033680de9f9034d73061a60995f79cbc18a4fdb083c0fef570985a12abd02f2b7de98b2bd030b3c3a0fa61cad2fdebcf84b4cd249e4d848c04e41f4fc29bf4899e417cdc80d1f42752b0007141c27c096c8e5d19adeacece84ccc3d30813e222ecd7ef8092410f9391035f34554602fb44b0f6ec13b89648b5bcb"}) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r3 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000000)=0x3) r5 = dup2(r4, r3) write$FUSE_IOCTL(r5, &(0x7f0000000280)={0x20}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000001400bfa30000000000000703000000feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000811e6403000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="3100000000000000000009000000280003000800030000000000140002006c6f00000000000000000000000000000800010001000000617172d3d6def3363392e608c5718208ee88658436a8035bf72a226e35a499b130a7c88e59c42d8ed7d78973b74dde00a32d6068d5bf94d66acb2859e4dd6a253960524e0ff5cdc3b687959b3b1d9fee94769de6371c87943967644383f4caef249b3c704b8ecc75fd72dbeaa001001207b940ea0479c8e1bfbd2a6b85935c1e8195d8471d85175a"], 0x3c}}, 0x0) [ 255.722360][T10251] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 02:04:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value={0x0}, &(0x7f0000002000)=0x8) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r8 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r8, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r8, 0x84, 0x70, &(0x7f00000002c0)={r5, @in6={{0xa, 0x4e21, 0xb629, @remote, 0x3}}, [0x5, 0x8001, 0x5, 0x4, 0x1, 0x8001, 0x10001, 0x7fffffff, 0x7ff, 0x372, 0x3, 0x6, 0xffffffffffffff71, 0x1f, 0x8]}, &(0x7f00000003c0)=0x100) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0x75, &(0x7f00000001c0)={r7, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000440)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000280)={r7, 0x100, 0x8, 0xd784, 0x2, 0xa8}, 0x14) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r10, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)={0x18, r11, 0x39296c73170e9169, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}]}, 0x18}}, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000800)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000007c0)={&(0x7f0000000480)={0x304, r11, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x100, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1954}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf64}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x3301, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xe}}}}, {0x14, 0x2, @in={0x2, 0x4e24, @broadcast}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x6, @mcast1, 0xe9e}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x5, @dev={0xfe, 0x80, [], 0x1c}, 0x400}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}}}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x94}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_BEARER={0xfc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x5, @mcast1, 0xffff}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x0, @remote, 0x8709}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x6, @mcast1}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x0, @local, 0x80000000}}}}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'ifb0\x00'}}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'team_slave_0\x00'}}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x664}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1f}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8de}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000001}, @TIPC_NLA_NODE_ADDR={0xfffffffffffffef2, 0x1, 0x2}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1ef}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x81}, @TIPC_NLA_NODE_UP, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x40}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xde}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2000000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x63}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}]}, 0x304}}, 0x2000c000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) write$nbd(r8, &(0x7f0000000840)={0x67446698, 0x0, 0x1, 0x2, 0x2, "ec0dfc568b0c991e08f0ec176c2e14c6b0f8baeb0253f32c55e0594c3df222c03c30a8ac797ec2e8d13ff2419f372f0e54340c02189597b8800696a717c440f0d6347a63807c95e4e6bf37f6b874a6c792d7678a3dd7184e08a812b9aed67558494f3a0c421f4a128cc5cf"}, 0x7b) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0x75, &(0x7f00000001c0)={r12, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000080)=0x98) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000100)={r12, 0x9d, "7bcac3a94197ba679305dd4f3f496890c35c8e8d8d14d1de74ac15237b2e301d4c376dc102b893f757630844de1039ea54c8a0574ee2a9f9a5b94b9671d599c1f74f31bef63d911793e3dc60e597e68b8d9823b2f267bab83374d05dc9dfda18b4f730f5b2f0cbd6e308107279792439850c10dd920e3a8588b0aa05da02829c8e6b191c95f26210c095fa2ec677095f4dde859b4494abbcae77a8c9f5"}, &(0x7f00000001c0)=0xa5) r13 = socket$nl_generic(0x10, 0x3, 0x10) r14 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r13, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r14, @ANYBLOB="010000000000000000000c0000001800050008000100f6bb31552eb1c132ec1eed74abec8f8e"], 0x2c}}, 0x0) 02:04:05 executing program 3: r0 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000000)=0x3) r2 = dup2(r1, r0) r3 = syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x4, 0x20501) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r3, 0x800442d4, &(0x7f00000002c0)=0xfff) write$FUSE_IOCTL(r2, &(0x7f0000000280)={0x20}, 0x20) ioctl$VT_DISALLOCATE(r2, 0x5608) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r4 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) fcntl$lock(r4, 0x7, &(0x7f0000027000)={0x1}) r5 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r5) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r7, 0x84, 0x74, &(0x7f0000000340)=""/254, &(0x7f0000000200)=0xfe) ftruncate(r6, 0x0) r8 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x2a40) ioctl$RNDADDENTROPY(r8, 0x40085203, &(0x7f0000000540)=ANY=[@ANYBLOB="bc0e00008f0000007624cef9f8cb1951518903774a9c0724fab4f086829647a47a7c2a7328afa84a51cdcbacde241817eb6169a0495fc39eafb306698319ae092db4f5df600017888a30d4d51c9e0ad39ce88ba131834a2d4bfeeceed15bdf16fb191d41a72314fea6a6eef433121c078fcd5c35055dc94e0862449330e252ea2330e31f31eba15d509de8b2f11518b82a871ecc37a55b20c6756b75eac872be879f"]) r9 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r9, 0xffffffffffffffff) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000280)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r8, r10, r11) stat(&(0x7f00000004c0)='./file0/bus\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) r13 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x2a40) ioctl$RNDADDENTROPY(r13, 0x40085203, &(0x7f0000000540)=ANY=[@ANYBLOB="bc0e00008f0000007624cef9f8cb1951518903774a9c0724fab4f086829647a47a7c2a7328afa84a51cdcbacde241817eb6169a0495fc39eafb306698319ae092db4f5df600017888a30d4d51c9e0ad39ce88ba131834a2d4bfeeceed15bdf16fb191d41a72314fea6a6eef433121c078fcd5c35055dc94e0862449330e252ea2330e31f31eba15d509de8b2f11518b82a871ecc37a55b20c6716b75eac872be879f"]) r14 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r14, 0xffffffffffffffff) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000280)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r13, r15, r16) r17 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x2a40) ioctl$RNDADDENTROPY(r17, 0x40085203, &(0x7f0000000540)=ANY=[@ANYBLOB="bc0e00008f0000007624cef9f8cb1951518903774a9c0724fab4f086829647a47a7c2a7328afa84a51cdcbacde241817eb6169a0495fc39eafb306698319ae092db4f5df600017888a30d4d51c9e0ad39ce88ba131834a2d4bfeeceed15bdf16fb191d41a72314fea6a6eef433121c078fcd5c35055dc94e0862449330e252ea2330e31f31eba15d509de8b2f11518b82a871ecc37a55b20c6756b75eac872be879f"]) r18 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r18, 0xffffffffffffffff) getsockopt$sock_cred(r18, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000280)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r17, r19, r20) r21 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x2a40) ioctl$RNDADDENTROPY(r21, 0x40085203, &(0x7f0000000540)=ANY=[@ANYBLOB="bc0e00008f0000007624cef9f8cb1951518903774a9c0724fab4f086829647a47a7c2a7328afa84a51cdcbacde241817eb6169a0495fc39eafb306698319ae092db4f5df600017888a30d4d51c9e0ad39ce88ba131834a2d4bfeeceed15bdf16fb191d41a72314fea6a6eef433121c078fcd5c35055dc94e0862449330e252ea2330e31f31eba15d509de8b2f11518b82a871ecc37a55b20c6756b75eac872be879f"]) r22 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r22, 0xffffffffffffffff) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000280)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r21, r23, r24) lsetxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000480)='system.posix_acl_default\x00', &(0x7f0000000580)={{}, {0x1, 0x1}, [{0x2, 0x1, r10}, {}, {0x2, 0x2, r12}, {0x2, 0x4, 0xee00}, {0x2, 0x2, r15}, {0x2, 0x3, 0xee01}], {0x4, 0x1}, [{0x8, 0x7, 0xee00}, {0x8, 0x3, r20}, {0x8, 0x1, r24}], {0x10, 0x1}, {0x20, 0x5}}, 0x6c, 0x2) [ 255.939431][T10254] IPVS: Error connecting to the multicast addr [ 255.990903][T10259] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 02:04:05 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000200)={0x8, @raw_data="08838529a6d9154494131b8636a8f7228f880fcae0e592e47dea38d39df89828215b4dfe60767085f9caf30ef228f807b053571a17ceb991d46e521c9bf44f41863ecf1adce96948738bdc9cf14033680de9f9034d73061a60995f79cbc18a4fdb083c0fef570985a12abd02f2b7de98b2bd030b3c3a0fa61cad2fdebcf84b4cd249e4d848c04e41f4fc29bf4899e417cdc80d1f42752b0007141c27c096c8e5d19adeacece84ccc3d30813e222ecd7ef8092410f9391035f34554602fb44b0f6ec13b89648b5bcb"}) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r3 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000000)=0x3) r5 = dup2(r4, r3) write$FUSE_IOCTL(r5, &(0x7f0000000280)={0x20}, 0x20) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="3100000000000000000009000000280003000800030000000000140002006c6f00000000000000000000000000000800010001000000617172d3d6def3363392e608c5718208ee88658436a8035bf72a226e35a499b130a7c88e59c42d8ed7d78973b74dde00a32d6068d5bf94d66acb2859e4dd6a253960524e0ff5cdc3b687959b3b1d9fee94769de6371c87943967644383f4caef249b3c704b8ecc75fd72dbeaa001001207b940ea0479c8e1bfbd2a6b85935c1e8195d8471d85175a"], 0x3c}}, 0x0) [ 256.038573][ T26] audit: type=1804 audit(1567735445.762:139): pid=10257 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir919711032/syzkaller.9k6ASL/54/file0" dev="sda1" ino=16882 res=1 02:04:05 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x24e, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000002000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa00006e0000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000020000000000000000000002002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f000000000000000000000000000044fc736530000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800"/590]}, 0x2c6) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 256.162824][ T26] audit: type=1804 audit(1567735445.772:140): pid=10262 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir734535609/syzkaller.4ZmHLb/56/file0" dev="sda1" ino=16881 res=1 [ 256.269270][ T26] audit: type=1804 audit(1567735445.782:141): pid=10263 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir919711032/syzkaller.9k6ASL/54/file0" dev="sda1" ino=16882 res=1 [ 256.298515][T10268] IPVS: Error connecting to the multicast addr 02:04:06 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r0, 0x29, 0x19, 0x0, 0x2a0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000000)=0xed10) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000100)=""/33) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4d4, 0x400}], 0x2, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r1, 0x29, 0x19, 0x0, 0x2a0) write$binfmt_elf64(r1, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x101, 0x7, 0x89, 0x4, 0x100000000, 0x4, 0x3e, 0x80, 0x14, 0x40, 0x2d5, 0x2, 0x1, 0x38, 0x2, 0x4, 0x100000001, 0x9}, [{0x7, 0xec8f, 0xffffffffffffff80, 0x9, 0x225, 0x7, 0x3f, 0x101}, {0xd07464b4dc47fc84, 0x9, 0x7, 0x5, 0x0, 0x6, 0x81, 0x8000}], "b5372836b868e12ff969fe1ef6541f86057800e47ffb2489c1f9e815e57f26cd07676672d8cf285b5c0b460772c4ed4144cd98d6153864b933c283467127b0177ac19017d7e9e3a809cc7ee847c86d960e72fd47c4293747573441f5705c7df05ea6e48d70a67cbdae7651297372e944c723642adfcd9cbb2b9f49b8336c901f25ab3acfaa0e8bb6be4be03912de6e7d", [[], [], []]}, 0x440) [ 256.374461][ T26] audit: type=1804 audit(1567735445.912:142): pid=10262 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir734535609/syzkaller.4ZmHLb/56/file0" dev="sda1" ino=16881 res=1 [ 256.390291][T10256] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 256.486027][ T26] audit: type=1804 audit(1567735445.952:143): pid=10273 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir734535609/syzkaller.4ZmHLb/56/file0" dev="sda1" ino=16881 res=1 [ 256.650145][ T26] audit: type=1804 audit(1567735446.202:144): pid=10251 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir919711032/syzkaller.9k6ASL/54/file0" dev="sda1" ino=16882 res=1 [ 256.857589][T10281] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended [ 256.911629][T10281] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 256.981582][T10281] EXT4-fs (loop3): group descriptors corrupted! 02:04:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mlockall(0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200a00, 0x0) clone(0x804400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) fcntl$getown(r1, 0x9) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x7fffffff, 0x600000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x500, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3000000010000108ae8bc38408000002000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800180000000000"], 0x30}}, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000000), 0x4) 02:04:07 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000200)={0x8, @raw_data="08838529a6d9154494131b8636a8f7228f880fcae0e592e47dea38d39df89828215b4dfe60767085f9caf30ef228f807b053571a17ceb991d46e521c9bf44f41863ecf1adce96948738bdc9cf14033680de9f9034d73061a60995f79cbc18a4fdb083c0fef570985a12abd02f2b7de98b2bd030b3c3a0fa61cad2fdebcf84b4cd249e4d848c04e41f4fc29bf4899e417cdc80d1f42752b0007141c27c096c8e5d19adeacece84ccc3d30813e222ecd7ef8092410f9391035f34554602fb44b0f6ec13b89648b5bcb"}) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r3 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000000)=0x3) dup2(r4, r3) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="3100000000000000000009000000280003000800030000000000140002006c6f00000000000000000000000000000800010001000000617172d3d6def3363392e608c5718208ee88658436a8035bf72a226e35a499b130a7c88e59c42d8ed7d78973b74dde00a32d6068d5bf94d66acb2859e4dd6a253960524e0ff5cdc3b687959b3b1d9fee94769de6371c87943967644383f4caef249b3c704b8ecc75fd72dbeaa001001207b940ea0479c8e1bfbd2a6b85935c1e8195d8471d85175a"], 0x3c}}, 0x0) 02:04:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffe41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x105082) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x0, 0x0) r0 = socket(0x42000000015, 0x805, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x100, 0x0) getsockopt(r0, 0x114, 0x2710, 0x0, &(0x7f0000000000)) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x20, 0x10, 0x501, 0x70bd2d, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4000}}, 0x20}}, 0x0) r2 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) getsockname$netrom(r2, &(0x7f0000000040)={{0x3, @null}, [@rose, @remote, @rose, @null, @remote, @rose, @rose, @netrom]}, 0x0) 02:04:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x100000000, 0x302) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000040)={'raw\x00', 0x6c, "d44c329dc8ce1b66f73fb620b6ea61717befc1116238dbffc78ed2d566b6f76bf51589e0d6f365a3c6c22cb8f413a9c7eb2fb7aa7a1028a0a321feeea4291271d6de06f9d6d82498adafc79341b5f75774d381e0ddb073f5dbc382035df21ddb345f3c079e5dffda2bb6b151"}, &(0x7f0000000100)=0x90) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @empty}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) 02:04:07 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x24e, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/590]}, 0x2c6) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 02:04:07 executing program 3: connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) r1 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) r2 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0x75, &(0x7f00000001c0)={r5, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000080)=0x98) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000100)={r5, 0x10000}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000180)={0x854, 0x4c40000000000000, 0x206, 0x8, 0x7, 0x1, 0x80000001, 0x4, r6}, &(0x7f00000001c0)=0x20) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000200)={@multicast2, @local, 0x0, 0x6, [@local, @local, @multicast1, @loopback, @multicast1, @local]}, 0x28) [ 257.744493][T10304] IPVS: Error connecting to the multicast addr 02:04:07 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000200)={0x8, @raw_data="08838529a6d9154494131b8636a8f7228f880fcae0e592e47dea38d39df89828215b4dfe60767085f9caf30ef228f807b053571a17ceb991d46e521c9bf44f41863ecf1adce96948738bdc9cf14033680de9f9034d73061a60995f79cbc18a4fdb083c0fef570985a12abd02f2b7de98b2bd030b3c3a0fa61cad2fdebcf84b4cd249e4d848c04e41f4fc29bf4899e417cdc80d1f42752b0007141c27c096c8e5d19adeacece84ccc3d30813e222ecd7ef8092410f9391035f34554602fb44b0f6ec13b89648b5bcb"}) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r3, 0x40e, &(0x7f0000000000)=0x3) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="3100000000000000000009000000280003000800030000000000140002006c6f00000000000000000000000000000800010001000000617172d3d6def3363392e608c5718208ee88658436a8035bf72a226e35a499b130a7c88e59c42d8ed7d78973b74dde00a32d6068d5bf94d66acb2859e4dd6a253960524e0ff5cdc3b687959b3b1d9fee94769de6371c87943967644383f4caef249b3c704b8ecc75fd72dbeaa001001207b940ea0479c8e1bfbd2a6b85935c1e8195d8471d85175a"], 0x3c}}, 0x0) 02:04:07 executing program 2: mmap(&(0x7f0000f99000/0x3000)=nil, 0x3000, 0x3000009, 0x30, 0xffffffffffffffff, 0x3) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8003, &(0x7f0000000000)=0x3, 0x3ff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x200000) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f00000000c0)="4b5e67278bf16322595730188d3053908a8a3b03b6cb6816d0db67096031ba07411b290a4e1f9af0d4fbcf9f2916f1e8ea4c71ba91159bf24a06d1a3933de8bec4cd1edf279c035e84a329614297dc13eedd", &(0x7f0000000140)=""/8}, 0x18) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x182) r3 = memfd_create(&(0x7f0000000380)='iC;`\xb6p+\x10', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000240)={{0x8b3, 0x4}, {0x6, 0x1}, 0x2, 0x2, 0xb3}) sendfile(r2, r2, 0x0, 0x2000009) ioctl$LOOP_CLR_FD(r2, 0x4c01) r4 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r4, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) bind$bt_sco(r4, &(0x7f0000000200)={0x1f, {0x6, 0x9, 0x314000000000000, 0x74, 0x9, 0x8}}, 0x8) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f00000001c0)=0x6c43) r5 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x1ff, 0x2}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f0000000400)={r6, 0x4}, 0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x80000000}, 0x8) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x3) 02:04:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) r1 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x2000, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x2a40) ioctl$RNDADDENTROPY(r3, 0x40085203, &(0x7f0000000540)=ANY=[@ANYBLOB="bc0e00008f0000007624cef9f8cb1951518903774a9c0724fab4f086829647a47a7c2a7328afa84a51cdcbacde241817eb6169a0495fc39eafb306698319ae092db4f5df600017888a30d4d51c9e0ad39ce88ba131834a2d4bfeeceed15bdf16fb191d41a72314fea6a6eef433121c078fcd5c35055dc94e0862449330e252ea2330e31f31eba15d509de8b2f11518b82a871ecc37a55b20c6756b75eac872be879f"]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r4, 0xffffffffffffffff) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000280)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r3, r5, r6) stat(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_CREATE_OPEN(r2, &(0x7f00000002c0)={0xa0, 0x7fffffffffffffff, 0x5, {{0x1, 0x0, 0x100000000, 0x7fff, 0xfffffffffffffff7, 0x1, {0x3, 0x800, 0x1f, 0xde4, 0x5, 0x0, 0x1, 0x0, 0x906, 0x20, 0x8, r5, r7, 0x9, 0x8}}, {0x0, 0x8}}}, 0xa0) r8 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r8, 0x40e, &(0x7f0000000000)=0x3) r9 = dup2(r8, r1) write$FUSE_IOCTL(r9, &(0x7f0000000280)={0x20}, 0x20) ioctl$VFIO_IOMMU_MAP_DMA(r9, 0x3b71, &(0x7f0000000040)={0x20, 0x4, 0x1f, 0x3a, 0x8}) [ 258.020337][T10316] mmap: syz-executor.2 (10316) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 258.113080][T10317] IPVS: Error connecting to the multicast addr [ 258.135596][ T26] audit: type=1804 audit(1567735447.852:145): pid=10325 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir919711032/syzkaller.9k6ASL/56/file0" dev="sda1" ino=16901 res=1 02:04:07 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x0, 0x200000) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000400)=0x14) write(r0, 0x0, 0x0) 02:04:08 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000200)={0x8, @raw_data="08838529a6d9154494131b8636a8f7228f880fcae0e592e47dea38d39df89828215b4dfe60767085f9caf30ef228f807b053571a17ceb991d46e521c9bf44f41863ecf1adce96948738bdc9cf14033680de9f9034d73061a60995f79cbc18a4fdb083c0fef570985a12abd02f2b7de98b2bd030b3c3a0fa61cad2fdebcf84b4cd249e4d848c04e41f4fc29bf4899e417cdc80d1f42752b0007141c27c096c8e5d19adeacece84ccc3d30813e222ecd7ef8092410f9391035f34554602fb44b0f6ec13b89648b5bcb"}) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="3100000000000000000009000000280003000800030000000000140002006c6f00000000000000000000000000000800010001000000617172d3d6def3363392e608c5718208ee88658436a8035bf72a226e35a499b130a7c88e59c42d8ed7d78973b74dde00a32d6068d5bf94d66acb2859e4dd6a253960524e0ff5cdc3b687959b3b1d9fee94769de6371c87943967644383f4caef249b3c704b8ecc75fd72dbeaa001001207b940ea0479c8e1bfbd2a6b85935c1e8195d8471d85175a"], 0x3c}}, 0x0) 02:04:08 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xd0, 0x0, 0x0) r1 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x49249249249240f, 0x0) connect$caif(r1, &(0x7f0000000000)=@util={0x25, "7f31daa3b497ca2ec97ebad39dbf661c"}, 0x18) [ 258.460069][T10340] IPVS: Error connecting to the multicast addr 02:04:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mlockall(0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200a00, 0x0) clone(0x804400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) fcntl$getown(r1, 0x9) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x7fffffff, 0x600000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x500, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3000000010000108ae8bc38408000002000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800180000000000"], 0x30}}, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000000), 0x4) 02:04:09 executing program 3: unshare(0x24020400) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) mq_getsetattr(r0, 0x0, 0x0) r1 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000000)=0x3) r3 = dup2(r2, r1) write$FUSE_IOCTL(r3, &(0x7f0000000280)={0x20}, 0x20) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r3, 0xc10c5541, &(0x7f00000000c0)={0x7fffffff, 0x5, 0x1, 0x0, 0x0, [], [], [], 0x37bd, 0xffffffffffffffee}) 02:04:09 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x24f, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/591]}, 0x2c7) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 02:04:09 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000200)={0x8, @raw_data="08838529a6d9154494131b8636a8f7228f880fcae0e592e47dea38d39df89828215b4dfe60767085f9caf30ef228f807b053571a17ceb991d46e521c9bf44f41863ecf1adce96948738bdc9cf14033680de9f9034d73061a60995f79cbc18a4fdb083c0fef570985a12abd02f2b7de98b2bd030b3c3a0fa61cad2fdebcf84b4cd249e4d848c04e41f4fc29bf4899e417cdc80d1f42752b0007141c27c096c8e5d19adeacece84ccc3d30813e222ecd7ef8092410f9391035f34554602fb44b0f6ec13b89648b5bcb"}) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="3100000000000000000009000000280003000800030000000000140002006c6f00000000000000000000000000000800010001000000617172d3d6def3363392e608c5718208ee88658436a8035bf72a226e35a499b130a7c88e59c42d8ed7d78973b74dde00a32d6068d5bf94d66acb2859e4dd6a253960524e0ff5cdc3b687959b3b1d9fee94769de6371c87943967644383f4caef249b3c704b8ecc75fd72dbeaa001001207b940ea0479c8e1bfbd2a6b85935c1e8195d8471d85175a"], 0x3c}}, 0x0) 02:04:09 executing program 5: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xa536b678) link(&(0x7f0000000380)='./file0\x00', &(0x7f00000007c0)='./file1/file0\x00') unlink(&(0x7f0000000080)='./file1/file0\x00') rmdir(&(0x7f0000000100)='./file1\x00') r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x2a40) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000540)=ANY=[@ANYBLOB="bc0e00008f0000007624cef9f8cb1951518903774a9c0724fab4f086829647a47a7c2a7328afa84a51cdcbacde241817eb6169a0495fc39eafb306698319ae092db4f5df600017888a30d4d51c9e0ad39ce88ba131834a2d4bfeeceed15bdf16fb191d41a72314fea6a6eef433121c078fcd5c35055dc94e0862449330e252ea2330e31f31eba15d509de8b2f11518b82a871ecc37a55b20c6756b75eac872be879f"]) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r2, 0xffffffffffffffff) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000280)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r1, r3, r4) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r5, 0x29, 0x19, 0x0, 0x2a0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) r7 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x2a40) ioctl$RNDADDENTROPY(r7, 0x40085203, &(0x7f0000000540)=ANY=[@ANYBLOB="bc0e00008f0000007624cef9f8cb1951518903774a9c0724fab4f086829647a47a7c2a7328afa84a51cdcbacde241817eb6169a0495fc39eafb306698319ae092db4f5df600017888a30d4d51c9e0ad39ce88ba131834a2d4bfeeceed15bdf16fb191d41a72314fea6a6eef433121c078fcd5c35055dc94e0862449330e252ea2330e31f31eba15d509de8b2f11518b82a871ecc37a55b20c6756b75eac872be879f"]) r8 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r8, 0xffffffffffffffff) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000280)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r7, r9, r10) mount$9p_unix(&(0x7f0000000040)='./file1/file1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20c001, &(0x7f00000003c0)={'trans=unix,', {[{@access_uid={'access', 0x3d, r3}}, {@cachetag={'cachetag'}}, {@access_uid={'access', 0x3d, r6}}, {@cache_loose='cache=loose'}, {@debug={'debug', 0x3d, 0x101}}, {@posixacl='posixacl'}, {@version_9p2000='version=9p2000'}, {@version_9p2000='version=9p2000'}], [{@fsmagic={'fsmagic', 0x3d, 0x9}}, {@hash='hash'}, {@obj_type={'obj_type', 0x3d, '.proceth1'}}, {@uid_lt={'uid<', r9}}, {@audit='audit'}, {@hash='hash'}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@dont_appraise='dont_appraise'}]}}) umount2(&(0x7f0000000000)='./file1/file1\x00', 0x0) 02:04:09 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00\x00\x00v\x98\x91bS\xb3\x81\x99\x00', 0x800000000802}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x339) close(r0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r1, 0x29, 0x19, 0x0, 0x2a0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000100)={0x680, 0x998, 0x7}) r2 = fcntl$getown(r1, 0x9) r3 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r5 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r5, 0x40e, &(0x7f0000000000)=0x3) r6 = dup2(r5, r4) write$FUSE_IOCTL(r6, &(0x7f0000000200)={0x20, 0xffffffffffffffda, 0x6, {0x0, 0x4, 0x0, 0xfffffffffffffffd}}, 0xb) ioctl$TCSETXF(r6, 0x5434, &(0x7f00000001c0)={0x3, 0x2, [0xd68, 0x9, 0x7, 0x6, 0x7], 0xe4fc}) r7 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r7, 0x40e, &(0x7f0000000000)=0x3) r8 = dup2(r7, r3) write$FUSE_IOCTL(r8, &(0x7f0000000280)={0x20}, 0x20) ioctl$UFFDIO_WAKE(r8, 0x8010aa02, &(0x7f0000000140)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}) ptrace$setsig(0x4203, r2, 0xd37, &(0x7f0000000080)={0x5}) [ 259.702482][ T26] audit: type=1804 audit(1567735449.422:146): pid=10366 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="file0" dev="sda1" ino=16919 res=1 02:04:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mlockall(0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200a00, 0x0) clone(0x804400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) fcntl$getown(r1, 0x9) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x7fffffff, 0x600000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x500, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3000000010000108ae8bc38408000002000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800180000000000"], 0x30}}, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000000), 0x4) [ 259.748648][T10368] IPVS: Error connecting to the multicast addr [ 259.778192][ T26] audit: type=1804 audit(1567735449.422:147): pid=10373 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir734535609/syzkaller.4ZmHLb/59/file0" dev="sda1" ino=16919 res=1 02:04:09 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000200)={0x8, @raw_data="08838529a6d9154494131b8636a8f7228f880fcae0e592e47dea38d39df89828215b4dfe60767085f9caf30ef228f807b053571a17ceb991d46e521c9bf44f41863ecf1adce96948738bdc9cf14033680de9f9034d73061a60995f79cbc18a4fdb083c0fef570985a12abd02f2b7de98b2bd030b3c3a0fa61cad2fdebcf84b4cd249e4d848c04e41f4fc29bf4899e417cdc80d1f42752b0007141c27c096c8e5d19adeacece84ccc3d30813e222ecd7ef8092410f9391035f34554602fb44b0f6ec13b89648b5bcb"}) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="3100000000000000000009000000280003000800030000000000140002006c6f00000000000000000000000000000800010001000000617172d3d6def3363392e608c5718208ee88658436a8035bf72a226e35a499b130a7c88e59c42d8ed7d78973b74dde00a32d6068d5bf94d66acb2859e4dd6a253960524e0ff5cdc3b687959b3b1d9fee94769de6371c87943967644383f4caef249b3c704b8ecc75fd72dbeaa001001207b940ea0479c8e1bfbd2a6b85935c1e8195d8471d85175a"], 0x3c}}, 0x0) 02:04:09 executing program 2: bind$inet6(0xffffffffffffffff, &(0x7f000047b000), 0x1c) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') sendfile(r0, r1, 0x0, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r3 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') r4 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') sendfile(r3, r4, 0x0, 0x1) r5 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r6 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r6, 0x40e, &(0x7f0000000000)=0x3) r7 = dup2(r6, r5) write$FUSE_IOCTL(r7, &(0x7f0000000280)={0x20}, 0x20) ioctl$EVIOCGBITKEY(r7, 0x80404521, &(0x7f0000000080)=""/58) [ 259.939335][ T26] audit: type=1804 audit(1567735449.562:148): pid=10378 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir498492816/syzkaller.Q11zhP/66/file0" dev="sda1" ino=16923 res=1 [ 260.038257][T10386] IPVS: Error connecting to the multicast addr [ 260.047211][ T26] audit: type=1804 audit(1567735449.562:149): pid=10374 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir498492816/syzkaller.Q11zhP/66/file0" dev="sda1" ino=16923 res=1 02:04:09 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x24f, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/591]}, 0x2c7) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 02:04:09 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000200)={0x8, @raw_data="08838529a6d9154494131b8636a8f7228f880fcae0e592e47dea38d39df89828215b4dfe60767085f9caf30ef228f807b053571a17ceb991d46e521c9bf44f41863ecf1adce96948738bdc9cf14033680de9f9034d73061a60995f79cbc18a4fdb083c0fef570985a12abd02f2b7de98b2bd030b3c3a0fa61cad2fdebcf84b4cd249e4d848c04e41f4fc29bf4899e417cdc80d1f42752b0007141c27c096c8e5d19adeacece84ccc3d30813e222ecd7ef8092410f9391035f34554602fb44b0f6ec13b89648b5bcb"}) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16, @ANYBLOB="3100000000000000000009000000280003000800030000000000140002006c6f00000000000000000000000000000800010001000000617172d3d6def3363392e608c5718208ee88658436a8035bf72a226e35a499b130a7c88e59c42d8ed7d78973b74dde00a32d6068d5bf94d66acb2859e4dd6a253960524e0ff5cdc3b687959b3b1d9fee94769de6371c87943967644383f4caef249b3c704b8ecc75fd72dbeaa001001207b940ea0479c8e1bfbd2a6b85935c1e8195d8471d85175a"], 0x3c}}, 0x0) [ 260.273112][ T26] audit: type=1804 audit(1567735449.992:150): pid=10398 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir498492816/syzkaller.Q11zhP/67/file0" dev="sda1" ino=16908 res=1 02:04:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000000c0)=""/242, 0x26, 0xf2, 0x1}, 0x20) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xd, &(0x7f0000000000)=""/16, &(0x7f0000000080)=0x10) r0 = syz_open_dev$radio(&(0x7f0000000200)='/dev/radio#\x00', 0x0, 0x2) r1 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000000)=0x3) r3 = dup2(r2, r1) write$FUSE_IOCTL(r3, &(0x7f0000000280)={0x20}, 0x20) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000240)={0x0, r3, 0x2}) [ 260.556460][ T26] audit: type=1804 audit(1567735450.272:151): pid=10413 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir498492816/syzkaller.Q11zhP/68/file0" dev="sda1" ino=16906 res=1 [ 260.596086][T10384] 9pnet: p9_fd_create_unix (10384): problem connecting socket: ./file1/file1: -2 [ 261.046424][T10396] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 261.063660][T10396] CPU: 1 PID: 10396 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 261.072799][T10396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.082861][T10396] Call Trace: [ 261.086218][T10396] dump_stack+0x172/0x1f0 [ 261.090567][T10396] dump_header+0x177/0x1152 [ 261.095091][T10396] ? pagefault_out_of_memory+0x11c/0x11c [ 261.100781][T10396] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 261.107032][T10396] ? ___ratelimit+0x60/0x595 [ 261.111630][T10396] ? do_raw_spin_unlock+0x57/0x270 [ 261.116745][T10396] oom_kill_process.cold+0x10/0x15 [ 261.121859][T10396] out_of_memory+0x334/0x1340 [ 261.126542][T10396] ? lock_downgrade+0x920/0x920 [ 261.131395][T10396] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 261.137204][T10396] ? oom_killer_disable+0x280/0x280 [ 261.142412][T10396] mem_cgroup_out_of_memory+0x1d8/0x240 [ 261.147961][T10396] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 261.153602][T10396] ? do_raw_spin_unlock+0x57/0x270 [ 261.158718][T10396] ? _raw_spin_unlock+0x2d/0x50 [ 261.163571][T10396] try_charge+0xf4b/0x1440 [ 261.168008][T10396] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 261.173551][T10396] ? percpu_ref_tryget_live+0x111/0x290 [ 261.179192][T10396] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 261.185439][T10396] ? __kasan_check_read+0x11/0x20 [ 261.190478][T10396] ? get_mem_cgroup_from_mm+0x156/0x320 [ 261.196025][T10396] mem_cgroup_try_charge+0x136/0x590 [ 261.201313][T10396] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 261.207559][T10396] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 261.213191][T10396] wp_page_copy+0x41e/0x1590 [ 261.217783][T10396] ? find_held_lock+0x35/0x130 [ 261.222550][T10396] ? pmd_pfn+0x1d0/0x1d0 [ 261.226791][T10396] ? lock_downgrade+0x920/0x920 [ 261.231645][T10396] ? swp_swapcount+0x540/0x540 [ 261.236414][T10396] ? __kasan_check_read+0x11/0x20 [ 261.241432][T10396] ? do_raw_spin_unlock+0x57/0x270 [ 261.246546][T10396] do_wp_page+0x499/0x14d0 [ 261.250964][T10396] ? finish_mkwrite_fault+0x570/0x570 [ 261.256347][T10396] __handle_mm_fault+0x22f1/0x3f20 [ 261.261470][T10396] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 261.267033][T10396] ? __kasan_check_read+0x11/0x20 [ 261.272074][T10396] handle_mm_fault+0x1b5/0x6c0 [ 261.276838][T10396] __get_user_pages+0x7d4/0x1b30 [ 261.281784][T10396] ? follow_page_mask+0x1cf0/0x1cf0 [ 261.286987][T10396] ? retint_kernel+0x2b/0x2b [ 261.291591][T10396] populate_vma_page_range+0x20d/0x2a0 [ 261.297054][T10396] __mm_populate+0x204/0x380 [ 261.301645][T10396] ? populate_vma_page_range+0x2a0/0x2a0 [ 261.307289][T10396] ? __kasan_check_write+0x14/0x20 [ 261.312417][T10396] ? up_write+0x155/0x490 [ 261.316743][T10396] ? ns_capable_common+0x93/0x100 [ 261.321774][T10396] __x64_sys_mlockall+0x473/0x520 [ 261.326799][T10396] do_syscall_64+0xfa/0x760 [ 261.331308][T10396] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 261.337196][T10396] RIP: 0033:0x459879 [ 261.341091][T10396] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 261.360701][T10396] RSP: 002b:00007f96b6b4cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 261.369112][T10396] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000459879 [ 261.377070][T10396] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 261.385034][T10396] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 261.393028][T10396] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f96b6b4d6d4 [ 261.401031][T10396] R13: 00000000004c5d72 R14: 00000000004da7f8 R15: 00000000ffffffff [ 261.411350][T10396] memory: usage 307200kB, limit 307200kB, failcnt 55 [ 261.418722][T10396] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 261.425996][T10396] Memory cgroup stats for /syz4: [ 261.428278][T10396] anon 305266688 [ 261.428278][T10396] file 0 [ 261.428278][T10396] kernel_stack 655360 [ 261.428278][T10396] slab 5451776 [ 261.428278][T10396] sock 0 [ 261.428278][T10396] shmem 0 [ 261.428278][T10396] file_mapped 0 [ 261.428278][T10396] file_dirty 0 [ 261.428278][T10396] file_writeback 0 [ 261.428278][T10396] anon_thp 272629760 [ 261.428278][T10396] inactive_anon 31539200 [ 261.428278][T10396] active_anon 2547712 [ 261.428278][T10396] inactive_file 0 [ 261.428278][T10396] active_file 0 [ 261.428278][T10396] unevictable 270995456 [ 261.428278][T10396] slab_reclaimable 1216512 [ 261.428278][T10396] slab_unreclaimable 4235264 [ 261.428278][T10396] pgfault 22902 [ 261.428278][T10396] pgmajfault 0 [ 261.428278][T10396] workingset_refault 0 [ 261.428278][T10396] workingset_activate 0 [ 261.428278][T10396] workingset_nodereclaim 0 [ 261.428278][T10396] pgrefill 66 [ 261.428278][T10396] pgscan 67 [ 261.428278][T10396] pgsteal 0 [ 261.428278][T10396] pgactivate 33 [ 261.526541][T10396] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=10371,uid=0 [ 261.545215][T10396] Memory cgroup out of memory: Killed process 10371 (syz-executor.4) total-vm:72708kB, anon-rss:18196kB, file-rss:54332kB, shmem-rss:0kB, UID:0 pgtables:200704kB oom_score_adj:1000 [ 261.579182][ T1064] [ 261.581542][ T1064] ============================================ [ 261.587778][ T1064] WARNING: possible recursive locking detected [ 261.593907][ T1064] 5.3.0-rc6-next-20190830 #75 Not tainted [ 261.599605][ T1064] -------------------------------------------- [ 261.605740][ T1064] oom_reaper/1064 is trying to acquire lock: [ 261.611698][ T1064] ffffffff8904ff60 (mmu_notifier_invalidate_range_start){+.+.}, at: __mmu_notifier_invalidate_range_end+0x0/0x360 [ 261.623671][ T1064] [ 261.623671][ T1064] but task is already holding lock: [ 261.631019][ T1064] ffffffff8904ff60 (mmu_notifier_invalidate_range_start){+.+.}, at: __oom_reap_task_mm+0x196/0x490 [ 261.641682][ T1064] [ 261.641682][ T1064] other info that might help us debug this: [ 261.649821][ T1064] Possible unsafe locking scenario: [ 261.649821][ T1064] [ 261.657254][ T1064] CPU0 [ 261.660577][ T1064] ---- [ 261.663835][ T1064] lock(mmu_notifier_invalidate_range_start); [ 261.669961][ T1064] lock(mmu_notifier_invalidate_range_start); [ 261.676095][ T1064] [ 261.676095][ T1064] *** DEADLOCK *** [ 261.676095][ T1064] [ 261.684226][ T1064] May be due to missing lock nesting notation [ 261.684226][ T1064] [ 261.692534][ T1064] 2 locks held by oom_reaper/1064: [ 261.697621][ T1064] #0: ffff8880a7f207d0 (&mm->mmap_sem#2){++++}, at: oom_reaper+0x3a7/0x1320 [ 261.706391][ T1064] #1: ffffffff8904ff60 (mmu_notifier_invalidate_range_start){+.+.}, at: __oom_reap_task_mm+0x196/0x490 [ 261.717491][ T1064] [ 261.717491][ T1064] stack backtrace: [ 261.723367][ T1064] CPU: 1 PID: 1064 Comm: oom_reaper Not tainted 5.3.0-rc6-next-20190830 #75 [ 261.732099][ T1064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.742219][ T1064] Call Trace: [ 261.745635][ T1064] dump_stack+0x172/0x1f0 [ 261.749949][ T1064] __lock_acquire.cold+0x15d/0x385 [ 261.755053][ T1064] ? mark_held_locks+0xf0/0xf0 [ 261.759797][ T1064] ? unmap_page_range+0x1df4/0x2380 [ 261.765063][ T1064] lock_acquire+0x190/0x410 [ 261.769562][ T1064] ? __mmu_notifier_invalidate_range_start+0x210/0x210 [ 261.776389][ T1064] __mmu_notifier_invalidate_range_end+0x3c/0x360 [ 261.782780][ T1064] ? __mmu_notifier_invalidate_range_start+0x210/0x210 [ 261.789609][ T1064] ? __mmu_notifier_invalidate_range_start+0x1a5/0x210 [ 261.796434][ T1064] __oom_reap_task_mm+0x3fa/0x490 [ 261.801443][ T1064] ? process_shares_mm+0x130/0x130 [ 261.806543][ T1064] ? oom_reaper+0x3a7/0x1320 [ 261.811114][ T1064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 261.817340][ T1064] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 261.822862][ T1064] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 261.828819][ T1064] ? __kasan_check_read+0x11/0x20 [ 261.833821][ T1064] ? do_raw_spin_unlock+0x57/0x270 [ 261.838937][ T1064] oom_reaper+0x2b2/0x1320 [ 261.843347][ T1064] ? lock_downgrade+0x920/0x920 [ 261.848190][ T1064] ? __oom_reap_task_mm+0x490/0x490 [ 261.853379][ T1064] ? trace_hardirqs_on+0x67/0x240 [ 261.858390][ T1064] ? finish_wait+0x260/0x260 [ 261.862958][ T1064] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 261.869176][ T1064] ? __kthread_parkme+0x108/0x1c0 [ 261.874176][ T1064] ? __kasan_check_read+0x11/0x20 [ 261.879178][ T1064] kthread+0x361/0x430 [ 261.883224][ T1064] ? __oom_reap_task_mm+0x490/0x490 [ 261.888409][ T1064] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 261.894639][ T1064] ret_from_fork+0x24/0x30 [ 261.900657][ T1064] oom_reaper: reaped process 10371 (syz-executor.4), now anon-rss:18232kB, file-rss:54332kB, shmem-rss:0kB 02:04:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mlockall(0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200a00, 0x0) clone(0x804400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) fcntl$getown(r1, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x500, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3000000010000108ae8bc38408000002000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800180000000000"], 0x30}}, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000000), 0x4) 02:04:11 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000200)={0x8, @raw_data="08838529a6d9154494131b8636a8f7228f880fcae0e592e47dea38d39df89828215b4dfe60767085f9caf30ef228f807b053571a17ceb991d46e521c9bf44f41863ecf1adce96948738bdc9cf14033680de9f9034d73061a60995f79cbc18a4fdb083c0fef570985a12abd02f2b7de98b2bd030b3c3a0fa61cad2fdebcf84b4cd249e4d848c04e41f4fc29bf4899e417cdc80d1f42752b0007141c27c096c8e5d19adeacece84ccc3d30813e222ecd7ef8092410f9391035f34554602fb44b0f6ec13b89648b5bcb"}) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16, @ANYBLOB="3100000000000000000009000000280003000800030000000000140002006c6f00000000000000000000000000000800010001000000617172d3d6def3363392e608c5718208ee88658436a8035bf72a226e35a499b130a7c88e59c42d8ed7d78973b74dde00a32d6068d5bf94d66acb2859e4dd6a253960524e0ff5cdc3b687959b3b1d9fee94769de6371c87943967644383f4caef249b3c704b8ecc75fd72dbeaa001001207b940ea0479c8e1bfbd2a6b85935c1e8195d8471d85175a"], 0x3c}}, 0x0) 02:04:11 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0x200800000000042) ioctl$FS_IOC_FSGETXATTR(r0, 0x8038550a, &(0x7f0000000180)={0x8100, 0x0, 0x0, 0x0, 0x100002f000000, 0x7ff0bdbe}) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) 02:04:11 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x24f, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000002000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa00006e0000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000020000000000000000000002002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f000000000000000000000000000044fc736530000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800"/591]}, 0x2c7) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 02:04:11 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000340)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, 0x0) r1 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000000)=0x3) r3 = dup2(r2, r1) write$FUSE_IOCTL(r3, &(0x7f0000000280)={0x20}, 0x20) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r3, 0xc0045540, &(0x7f0000000000)=0x2) [ 261.988391][ T3890] kobject: 'loop4' (000000001b6f3d08): kobject_uevent_env [ 261.995578][ T3890] kobject: 'loop4' (000000001b6f3d08): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 262.021762][T10427] usb usb7: usbfs: process 10427 (syz-executor.2) did not claim interface 0 before use [ 262.041702][ T26] audit: type=1804 audit(1567735451.762:152): pid=10426 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir919711032/syzkaller.9k6ASL/59/file0" dev="sda1" ino=16557 res=1 02:04:11 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000340)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, 0x0) r1 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000000)=0x3) r3 = dup2(r2, r1) write$FUSE_IOCTL(r3, &(0x7f0000000280)={0x20}, 0x20) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r3, 0xc0045540, &(0x7f0000000000)=0x2) [ 262.085790][T10427] usb usb7: usbfs: process 10427 (syz-executor.2) did not claim interface 0 before use [ 262.130452][ T3890] kobject: 'loop5' (000000003029f8b4): kobject_uevent_env [ 262.143790][T10429] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 262.155388][ T3890] kobject: 'loop5' (000000003029f8b4): fill_kobj_path: path = '/devices/virtual/block/loop5' 02:04:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mlockall(0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200a00, 0x0) clone(0x804400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) fcntl$getown(r1, 0x9) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x7fffffff, 0x600000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x500, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3000000010000108ae8bc38408000002000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800180000000000"], 0x30}}, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000000), 0x4) 02:04:11 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000200)={0x8, @raw_data="08838529a6d9154494131b8636a8f7228f880fcae0e592e47dea38d39df89828215b4dfe60767085f9caf30ef228f807b053571a17ceb991d46e521c9bf44f41863ecf1adce96948738bdc9cf14033680de9f9034d73061a60995f79cbc18a4fdb083c0fef570985a12abd02f2b7de98b2bd030b3c3a0fa61cad2fdebcf84b4cd249e4d848c04e41f4fc29bf4899e417cdc80d1f42752b0007141c27c096c8e5d19adeacece84ccc3d30813e222ecd7ef8092410f9391035f34554602fb44b0f6ec13b89648b5bcb"}) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16, @ANYBLOB="3100000000000000000009000000280003000800030000000000140002006c6f00000000000000000000000000000800010001000000617172d3d6def3363392e608c5718208ee88658436a8035bf72a226e35a499b130a7c88e59c42d8ed7d78973b74dde00a32d6068d5bf94d66acb2859e4dd6a253960524e0ff5cdc3b687959b3b1d9fee94769de6371c87943967644383f4caef249b3c704b8ecc75fd72dbeaa001001207b940ea0479c8e1bfbd2a6b85935c1e8195d8471d85175a"], 0x3c}}, 0x0) [ 262.178427][T10429] CPU: 0 PID: 10429 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 262.187556][T10429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.197613][T10429] Call Trace: [ 262.200914][T10429] dump_stack+0x172/0x1f0 [ 262.205253][T10429] dump_header+0x177/0x1152 [ 262.209756][T10429] ? ___ratelimit+0xf8/0x595 [ 262.214882][T10429] ? trace_hardirqs_on+0x67/0x240 [ 262.219949][T10429] ? pagefault_out_of_memory+0x11c/0x11c [ 262.225610][T10429] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 262.231409][T10429] ? ___ratelimit+0x60/0x595 [ 262.235990][T10429] ? do_raw_spin_unlock+0x57/0x270 [ 262.241095][T10429] oom_kill_process.cold+0x10/0x15 [ 262.246198][T10429] out_of_memory+0x334/0x1340 [ 262.250864][T10429] ? lock_downgrade+0x920/0x920 [ 262.255704][T10429] ? oom_killer_disable+0x280/0x280 [ 262.260889][T10429] ? __kasan_check_read+0x11/0x20 [ 262.265904][T10429] mem_cgroup_out_of_memory+0x1d8/0x240 [ 262.271440][T10429] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 262.277063][T10429] ? do_raw_spin_unlock+0x57/0x270 [ 262.282172][T10429] ? _raw_spin_unlock+0x2d/0x50 [ 262.287010][T10429] try_charge+0xf4b/0x1440 [ 262.291420][T10429] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 262.296951][T10429] ? percpu_ref_tryget_live+0x111/0x290 [ 262.302485][T10429] ? get_mem_cgroup_from_mm+0x16/0x320 [ 262.307984][T10429] ? get_mem_cgroup_from_mm+0x156/0x320 [ 262.313514][T10429] mem_cgroup_try_charge+0x136/0x590 [ 262.318785][T10429] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 262.325012][T10429] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 262.330657][T10429] __handle_mm_fault+0x1e34/0x3f20 [ 262.335761][T10429] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 262.341289][T10429] ? __kasan_check_read+0x11/0x20 [ 262.346298][T10429] ? do_raw_spin_unlock+0x57/0x270 [ 262.351403][T10429] ? trace_hardirqs_on+0x67/0x240 [ 262.356421][T10429] handle_mm_fault+0x1b5/0x6c0 [ 262.361174][T10429] __get_user_pages+0x7d4/0x1b30 [ 262.366096][T10429] ? mark_held_locks+0xf0/0xf0 [ 262.370854][T10429] ? follow_page_mask+0x1cf0/0x1cf0 [ 262.376040][T10429] ? __mm_populate+0x270/0x380 [ 262.380796][T10429] ? __kasan_check_write+0x14/0x20 [ 262.385891][T10429] ? down_read+0x109/0x430 [ 262.390298][T10429] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.396525][T10429] populate_vma_page_range+0x20d/0x2a0 [ 262.401972][T10429] __mm_populate+0x204/0x380 [ 262.406549][T10429] ? populate_vma_page_range+0x2a0/0x2a0 [ 262.412167][T10429] ? __kasan_check_write+0x14/0x20 [ 262.417264][T10429] ? up_write+0x155/0x490 [ 262.421575][T10429] ? ns_capable_common+0x93/0x100 [ 262.426586][T10429] __x64_sys_mlockall+0x473/0x520 [ 262.431599][T10429] do_syscall_64+0xfa/0x760 [ 262.436121][T10429] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.442011][T10429] RIP: 0033:0x459879 [ 262.445915][T10429] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 262.465709][T10429] RSP: 002b:00007f96b6b6dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 262.474111][T10429] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000459879 02:04:12 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0x200800000000042) ioctl$FS_IOC_FSGETXATTR(r0, 0x8038550a, &(0x7f0000000180)={0x8100, 0x0, 0x0, 0x0, 0x100002f000000, 0x7ff0bdbe}) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) 02:04:12 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 262.482068][T10429] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 262.490025][T10429] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 262.497985][T10429] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f96b6b6e6d4 [ 262.505942][T10429] R13: 00000000004c5d72 R14: 00000000004da7f8 R15: 00000000ffffffff [ 262.540807][ T3890] kobject: 'loop3' (000000009258557a): kobject_uevent_env [ 262.565219][ T3890] kobject: 'loop3' (000000009258557a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 262.585655][T10446] usb usb7: usbfs: process 10446 (syz-executor.2) did not claim interface 0 before use 02:04:12 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000340)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, 0x0) r1 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000000)=0x3) r3 = dup2(r2, r1) write$FUSE_IOCTL(r3, &(0x7f0000000280)={0x20}, 0x20) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r3, 0xc0045540, &(0x7f0000000000)=0x2) [ 262.614535][ T3890] kobject: 'loop0' (0000000011520495): kobject_uevent_env [ 262.634377][ T3890] kobject: 'loop0' (0000000011520495): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 262.670977][ T3890] kobject: 'loop2' (0000000073647ecb): kobject_uevent_env [ 262.695820][ T3890] kobject: 'loop2' (0000000073647ecb): fill_kobj_path: path = '/devices/virtual/block/loop2' 02:04:12 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0x200800000000042) ioctl$FS_IOC_FSGETXATTR(r0, 0x8038550a, &(0x7f0000000180)={0x8100, 0x0, 0x0, 0x0, 0x100002f000000, 0x7ff0bdbe}) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) [ 262.717193][T10429] memory: usage 307200kB, limit 307200kB, failcnt 81 [ 262.726357][T10429] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 262.744132][ T3890] kobject: 'loop1' (000000004380c1f4): kobject_uevent_env [ 262.756280][T10429] Memory cgroup stats for /syz4: [ 262.756382][T10429] anon 305754112 [ 262.756382][T10429] file 0 [ 262.756382][T10429] kernel_stack 655360 [ 262.756382][T10429] slab 5206016 [ 262.756382][T10429] sock 0 [ 262.756382][T10429] shmem 0 [ 262.756382][T10429] file_mapped 0 [ 262.756382][T10429] file_dirty 0 [ 262.756382][T10429] file_writeback 0 [ 262.756382][T10429] anon_thp 272629760 [ 262.756382][T10429] inactive_anon 44658688 [ 262.756382][T10429] active_anon 2555904 [ 262.756382][T10429] inactive_file 0 [ 262.756382][T10429] active_file 0 [ 262.756382][T10429] unevictable 258420736 [ 262.756382][T10429] slab_reclaimable 1216512 [ 262.756382][T10429] slab_unreclaimable 3989504 [ 262.756382][T10429] pgfault 23661 [ 262.756382][T10429] pgmajfault 0 [ 262.756382][T10429] workingset_refault 0 [ 262.756382][T10429] workingset_activate 0 [ 262.756382][T10429] workingset_nodereclaim 0 [ 262.756382][T10429] pgrefill 66 [ 262.756382][T10429] pgscan 67 [ 262.756382][T10429] pgsteal 0 [ 262.756382][T10429] pgactivate 33 [ 262.779516][ T3890] kobject: 'loop1' (000000004380c1f4): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 262.871525][T10454] usb usb7: usbfs: process 10454 (syz-executor.2) did not claim interface 0 before use [ 262.896017][ T3890] kobject: 'loop5' (000000003029f8b4): kobject_uevent_env [ 262.909189][T10429] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=10397,uid=0 [ 262.916024][ T3890] kobject: 'loop5' (000000003029f8b4): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 262.932236][T10455] kobject: 'kvm' (000000007cb789b6): kobject_uevent_env [ 262.938412][ T3890] kobject: 'loop2' (0000000073647ecb): kobject_uevent_env [ 262.946633][T10429] Memory cgroup out of memory: Killed process 10397 (syz-executor.4) total-vm:72708kB, anon-rss:18232kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:159744kB oom_score_adj:1000 [ 262.951147][ T3890] kobject: 'loop2' (0000000073647ecb): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 262.967679][T10455] kobject: 'kvm' (000000007cb789b6): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 262.980615][ T3890] kobject: 'loop1' (000000004380c1f4): kobject_uevent_env [ 263.005392][ T3890] kobject: 'loop1' (000000004380c1f4): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 263.011177][T10397] kobject: 'kvm' (000000007cb789b6): kobject_uevent_env [ 263.017174][ T3890] kobject: 'loop0' (0000000011520495): kobject_uevent_env [ 263.029702][ T3890] kobject: 'loop0' (0000000011520495): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 263.032704][T10397] kobject: 'kvm' (000000007cb789b6): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 263.041260][ T3890] kobject: 'loop5' (000000003029f8b4): kobject_uevent_env [ 263.059888][ T3890] kobject: 'loop5' (000000003029f8b4): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 263.082035][ T3890] kobject: 'loop2' (0000000073647ecb): kobject_uevent_env [ 263.092343][ T3890] kobject: 'loop2' (0000000073647ecb): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 263.298381][T10467] kobject: 'kvm' (000000007cb789b6): kobject_uevent_env [ 263.305487][T10467] kobject: 'kvm' (000000007cb789b6): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 263.363494][T10439] kobject: 'kvm' (000000007cb789b6): kobject_uevent_env [ 263.370638][T10439] kobject: 'kvm' (000000007cb789b6): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 263.471493][ T3890] kobject: 'loop3' (000000009258557a): kobject_uevent_env [ 263.481592][ T3890] kobject: 'loop3' (000000009258557a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 263.493105][T10467] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 263.503958][T10467] CPU: 1 PID: 10467 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 263.513066][T10467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.523121][T10467] Call Trace: [ 263.526491][T10467] dump_stack+0x172/0x1f0 [ 263.530807][T10467] dump_header+0x177/0x1152 [ 263.535290][T10467] ? ___ratelimit+0xf8/0x595 [ 263.539867][T10467] ? trace_hardirqs_on+0x67/0x240 [ 263.544879][T10467] ? pagefault_out_of_memory+0x11c/0x11c [ 263.550497][T10467] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 263.556288][T10467] ? ___ratelimit+0x60/0x595 [ 263.560864][T10467] oom_kill_process.cold+0x10/0x15 [ 263.566052][T10467] out_of_memory+0x334/0x1340 [ 263.570716][T10467] ? lock_downgrade+0x920/0x920 [ 263.575549][T10467] ? oom_killer_disable+0x280/0x280 [ 263.580732][T10467] mem_cgroup_out_of_memory+0x1d8/0x240 [ 263.586256][T10467] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 263.591893][T10467] ? do_raw_spin_unlock+0x57/0x270 [ 263.596991][T10467] ? _raw_spin_unlock+0x2d/0x50 [ 263.601913][T10467] try_charge+0xf4b/0x1440 [ 263.606321][T10467] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 263.611869][T10467] ? percpu_ref_tryget_live+0x111/0x290 [ 263.617407][T10467] ? get_mem_cgroup_from_mm+0x16/0x320 [ 263.622856][T10467] ? get_mem_cgroup_from_mm+0x156/0x320 [ 263.628416][T10467] mem_cgroup_try_charge+0x136/0x590 [ 263.633780][T10467] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 263.639402][T10467] wp_page_copy+0x41e/0x1590 [ 263.643984][T10467] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 263.649439][T10467] ? pmd_pfn+0x1d0/0x1d0 [ 263.653667][T10467] ? lock_downgrade+0x920/0x920 [ 263.658499][T10467] ? get_page+0x46/0x100 [ 263.662725][T10467] ? __kasan_check_read+0x11/0x20 [ 263.667728][T10467] ? do_raw_spin_unlock+0x57/0x270 [ 263.672837][T10467] do_wp_page+0x499/0x14d0 [ 263.677239][T10467] ? finish_mkwrite_fault+0x570/0x570 [ 263.682598][T10467] __handle_mm_fault+0x22f1/0x3f20 [ 263.687726][T10467] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 263.693251][T10467] ? __kasan_check_read+0x11/0x20 [ 263.698256][T10467] ? do_raw_spin_unlock+0x57/0x270 [ 263.703364][T10467] ? trace_hardirqs_on+0x67/0x240 [ 263.708370][T10467] handle_mm_fault+0x1b5/0x6c0 [ 263.713125][T10467] __get_user_pages+0x7d4/0x1b30 [ 263.718041][T10467] ? mark_held_locks+0xf0/0xf0 [ 263.722799][T10467] ? follow_page_mask+0x1cf0/0x1cf0 [ 263.727993][T10467] ? __this_cpu_preempt_check+0x3a/0x210 [ 263.733608][T10467] ? retint_kernel+0x2b/0x2b [ 263.738203][T10467] populate_vma_page_range+0x20d/0x2a0 [ 263.743644][T10467] __mm_populate+0x204/0x380 [ 263.748217][T10467] ? populate_vma_page_range+0x2a0/0x2a0 [ 263.753828][T10467] ? __kasan_check_write+0x14/0x20 [ 263.758918][T10467] ? up_write+0x155/0x490 [ 263.763227][T10467] ? ns_capable_common+0x93/0x100 [ 263.768234][T10467] __x64_sys_mlockall+0x473/0x520 [ 263.773259][T10467] do_syscall_64+0xfa/0x760 [ 263.777756][T10467] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 263.783628][T10467] RIP: 0033:0x459879 [ 263.787507][T10467] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 263.807090][T10467] RSP: 002b:00007f96b6b4cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 263.815481][T10467] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000459879 [ 263.823444][T10467] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 263.831408][T10467] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 263.839372][T10467] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f96b6b4d6d4 [ 263.847326][T10467] R13: 00000000004c5d72 R14: 00000000004da7f8 R15: 00000000ffffffff [ 263.858475][T10467] memory: usage 307200kB, limit 307200kB, failcnt 101 [ 263.865450][T10467] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 263.873023][T10467] Memory cgroup stats for /syz4: [ 263.873375][T10467] anon 305438720 [ 263.873375][T10467] file 0 [ 263.873375][T10467] kernel_stack 655360 [ 263.873375][T10467] slab 5443584 [ 263.873375][T10467] sock 0 [ 263.873375][T10467] shmem 0 [ 263.873375][T10467] file_mapped 0 [ 263.873375][T10467] file_dirty 0 [ 263.873375][T10467] file_writeback 0 [ 263.873375][T10467] anon_thp 270532608 [ 263.873375][T10467] inactive_anon 30519296 [ 263.873375][T10467] active_anon 2555904 [ 263.873375][T10467] inactive_file 0 [ 263.873375][T10467] active_file 0 [ 263.873375][T10467] unevictable 272297984 [ 263.873375][T10467] slab_reclaimable 1216512 [ 263.873375][T10467] slab_unreclaimable 4227072 [ 263.873375][T10467] pgfault 24816 [ 263.873375][T10467] pgmajfault 0 [ 263.873375][T10467] workingset_refault 0 [ 263.873375][T10467] workingset_activate 0 [ 263.873375][T10467] workingset_nodereclaim 0 [ 263.873375][T10467] pgrefill 66 [ 263.873375][T10467] pgscan 67 [ 263.873375][T10467] pgsteal 0 [ 263.873375][T10467] pgactivate 66 [ 263.969482][T10467] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=10428,uid=0 [ 263.985257][T10467] Memory cgroup out of memory: Killed process 10428 (syz-executor.4) total-vm:72708kB, anon-rss:18000kB, file-rss:54332kB, shmem-rss:0kB, UID:0 pgtables:200704kB oom_score_adj:1000 [ 264.004790][ T1064] oom_reaper: reaped process 10428 (syz-executor.4), now anon-rss:18232kB, file-rss:54332kB, shmem-rss:0kB 02:04:13 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000200)={0x8, @raw_data="08838529a6d9154494131b8636a8f7228f880fcae0e592e47dea38d39df89828215b4dfe60767085f9caf30ef228f807b053571a17ceb991d46e521c9bf44f41863ecf1adce96948738bdc9cf14033680de9f9034d73061a60995f79cbc18a4fdb083c0fef570985a12abd02f2b7de98b2bd030b3c3a0fa61cad2fdebcf84b4cd249e4d848c04e41f4fc29bf4899e417cdc80d1f42752b0007141c27c096c8e5d19adeacece84ccc3d30813e222ecd7ef8092410f9391035f34554602fb44b0f6ec13b89648b5bcb"}) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="3100000000000000000009000000280003000800030000000000140002006c6f00000000000000000000000000000800010001000000617172d3d6def3363392e608c5718208ee88658436a8035bf72a226e35a499b130a7c88e59c42d8ed7d78973b74dde00a32d6068d5bf94d66acb2859e4dd6a253960524e0ff5cdc3b687959b3b1d9fee94769de6371c87943967644383f4caef249b3c704b8ecc75fd72dbeaa001001207b940ea0479c8e1bfbd2a6b85935c1e8195d8471d85175a"], 0x3c}}, 0x0) 02:04:13 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 02:04:13 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000340)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, 0x0) r1 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000000)=0x3) r3 = dup2(r2, r1) write$FUSE_IOCTL(r3, &(0x7f0000000280)={0x20}, 0x20) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r3, 0xc0045540, &(0x7f0000000000)=0x2) 02:04:13 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000200)={0x8, @raw_data="08838529a6d9154494131b8636a8f7228f880fcae0e592e47dea38d39df89828215b4dfe60767085f9caf30ef228f807b053571a17ceb991d46e521c9bf44f41863ecf1adce96948738bdc9cf14033680de9f9034d73061a60995f79cbc18a4fdb083c0fef570985a12abd02f2b7de98b2bd030b3c3a0fa61cad2fdebcf84b4cd249e4d848c04e41f4fc29bf4899e417cdc80d1f42752b0007141c27c096c8e5d19adeacece84ccc3d30813e222ecd7ef8092410f9391035f34554602fb44b0f6ec13b89648b5bcb"}) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16, @ANYBLOB="3100000000000000000009000000280003000800030000000000140002006c6f00000000000000000000000000000800010001000000617172d3d6def3363392e608c5718208ee88658436a8035bf72a226e35a499b130a7c88e59c42d8ed7d78973b74dde00a32d6068d5bf94d66acb2859e4dd6a253960524e0ff5cdc3b687959b3b1d9fee94769de6371c87943967644383f4caef249b3c704b8ecc75fd72dbeaa001001207b940ea0479c8e1bfbd2a6b85935c1e8195d8471d85175a"], 0x3c}}, 0x0) 02:04:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mlockall(0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200a00, 0x0) clone(0x804400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) fcntl$getown(r1, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x500, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3000000010000108ae8bc38408000002000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800180000000000"], 0x30}}, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000000), 0x4) 02:04:13 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000200)={0x8, @raw_data="08838529a6d9154494131b8636a8f7228f880fcae0e592e47dea38d39df89828215b4dfe60767085f9caf30ef228f807b053571a17ceb991d46e521c9bf44f41863ecf1adce96948738bdc9cf14033680de9f9034d73061a60995f79cbc18a4fdb083c0fef570985a12abd02f2b7de98b2bd030b3c3a0fa61cad2fdebcf84b4cd249e4d848c04e41f4fc29bf4899e417cdc80d1f42752b0007141c27c096c8e5d19adeacece84ccc3d30813e222ecd7ef8092410f9391035f34554602fb44b0f6ec13b89648b5bcb"}) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16, @ANYBLOB="3100000000000000000009000000280003000800030000000000140002006c6f00000000000000000000000000000800010001000000617172d3d6def3363392e608c5718208ee88658436a8035bf72a226e35a499b130a7c88e59c42d8ed7d78973b74dde00a32d6068d5bf94d66acb2859e4dd6a253960524e0ff5cdc3b687959b3b1d9fee94769de6371c87943967644383f4caef249b3c704b8ecc75fd72dbeaa001001207b940ea0479c8e1bfbd2a6b85935c1e8195d8471d85175a"], 0x3c}}, 0x0) 02:04:13 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000200)={0x8, @raw_data="08838529a6d9154494131b8636a8f7228f880fcae0e592e47dea38d39df89828215b4dfe60767085f9caf30ef228f807b053571a17ceb991d46e521c9bf44f41863ecf1adce96948738bdc9cf14033680de9f9034d73061a60995f79cbc18a4fdb083c0fef570985a12abd02f2b7de98b2bd030b3c3a0fa61cad2fdebcf84b4cd249e4d848c04e41f4fc29bf4899e417cdc80d1f42752b0007141c27c096c8e5d19adeacece84ccc3d30813e222ecd7ef8092410f9391035f34554602fb44b0f6ec13b89648b5bcb"}) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="3100000000000000000009000000280003000800030000000000140002006c6f00000000000000000000000000000800010001000000617172d3d6def3363392e608c5718208ee88658436a8035bf72a226e35a499b130a7c88e59c42d8ed7d78973b74dde00a32d6068d5bf94d66acb2859e4dd6a253960524e0ff5cdc3b687959b3b1d9fee94769de6371c87943967644383f4caef249b3c704b8ecc75fd72dbeaa001001207b940ea0479c8e1bfbd2a6b85935c1e8195d8471d85175a"], 0x3c}}, 0x0) 02:04:13 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000200)={0x8, @raw_data="08838529a6d9154494131b8636a8f7228f880fcae0e592e47dea38d39df89828215b4dfe60767085f9caf30ef228f807b053571a17ceb991d46e521c9bf44f41863ecf1adce96948738bdc9cf14033680de9f9034d73061a60995f79cbc18a4fdb083c0fef570985a12abd02f2b7de98b2bd030b3c3a0fa61cad2fdebcf84b4cd249e4d848c04e41f4fc29bf4899e417cdc80d1f42752b0007141c27c096c8e5d19adeacece84ccc3d30813e222ecd7ef8092410f9391035f34554602fb44b0f6ec13b89648b5bcb"}) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="3100000000000000000009000000280003000800030000000000140002006c6f00000000000000000000000000000800010001000000617172d3d6def3363392e608c5718208ee88658436a8035bf72a226e35a499b130a7c88e59c42d8ed7d78973b74dde00a32d6068d5bf94d66acb2859e4dd6a253960524e0ff5cdc3b687959b3b1d9fee94769de6371c87943967644383f4caef249b3c704b8ecc75fd72dbeaa001001207b940ea0479c8e1bfbd2a6b85935c1e8195d8471d85175a"], 0x3c}}, 0x0) [ 264.231552][ T3890] kobject: 'loop4' (000000001b6f3d08): kobject_uevent_env [ 264.251581][ T3890] kobject: 'loop4' (000000001b6f3d08): fill_kobj_path: path = '/devices/virtual/block/loop4' 02:04:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mlockall(0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200a00, 0x0) clone(0x804400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) fcntl$getown(r1, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x500, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3000000010000108ae8bc38408000002000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800180000000000"], 0x30}}, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000000), 0x4) 02:04:14 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000340)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, 0x0) r1 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000000)=0x3) r3 = dup2(r2, r1) write$FUSE_IOCTL(r3, &(0x7f0000000280)={0x20}, 0x20) [ 264.302941][ T3890] kobject: 'loop0' (0000000011520495): kobject_uevent_env [ 264.323817][ T3890] kobject: 'loop0' (0000000011520495): fill_kobj_path: path = '/devices/virtual/block/loop0' 02:04:14 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000200)={0x8, @raw_data="08838529a6d9154494131b8636a8f7228f880fcae0e592e47dea38d39df89828215b4dfe60767085f9caf30ef228f807b053571a17ceb991d46e521c9bf44f41863ecf1adce96948738bdc9cf14033680de9f9034d73061a60995f79cbc18a4fdb083c0fef570985a12abd02f2b7de98b2bd030b3c3a0fa61cad2fdebcf84b4cd249e4d848c04e41f4fc29bf4899e417cdc80d1f42752b0007141c27c096c8e5d19adeacece84ccc3d30813e222ecd7ef8092410f9391035f34554602fb44b0f6ec13b89648b5bcb"}) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="3100000000000000000009000000280003000800030000000000140002006c6f00000000000000000000000000000800010001000000617172d3d6def3363392e608c5718208ee88658436a8035bf72a226e35a499b130a7c88e59c42d8ed7d78973b74dde00a32d6068d5bf94d66acb2859e4dd6a253960524e0ff5cdc3b687959b3b1d9fee94769de6371c87943967644383f4caef249b3c704b8ecc75fd72dbeaa001001207b940ea0479c8e1bfbd2a6b85935c1e8195d8471d85175a"], 0x3c}}, 0x0) 02:04:14 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mlockall(0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200a00, 0x0) clone(0x804400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) fcntl$getown(r1, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x500, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3000000010000108ae8bc38408000002000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800180000000000"], 0x30}}, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000000), 0x4) [ 264.365453][T10484] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 264.385323][ T3890] kobject: 'loop2' (0000000073647ecb): kobject_uevent_env [ 264.410453][ T3890] kobject: 'loop2' (0000000073647ecb): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 264.424506][T10484] CPU: 1 PID: 10484 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 264.433744][T10484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.443896][T10484] Call Trace: [ 264.447192][T10484] dump_stack+0x172/0x1f0 [ 264.451519][T10484] dump_header+0x177/0x1152 [ 264.456012][T10484] ? ___ratelimit+0xf8/0x595 [ 264.460596][T10484] ? trace_hardirqs_on+0x67/0x240 [ 264.465610][T10484] ? pagefault_out_of_memory+0x11c/0x11c [ 264.471235][T10484] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 264.477034][T10484] ? ___ratelimit+0x60/0x595 [ 264.481612][T10484] ? do_raw_spin_unlock+0x57/0x270 [ 264.486715][T10484] oom_kill_process.cold+0x10/0x15 [ 264.491822][T10484] out_of_memory+0x334/0x1340 [ 264.496490][T10484] ? lock_downgrade+0x920/0x920 [ 264.501330][T10484] ? oom_killer_disable+0x280/0x280 [ 264.506516][T10484] ? __kasan_check_read+0x11/0x20 [ 264.511535][T10484] mem_cgroup_out_of_memory+0x1d8/0x240 [ 264.517067][T10484] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 264.522692][T10484] ? do_raw_spin_unlock+0x57/0x270 [ 264.527805][T10484] ? _raw_spin_unlock+0x2d/0x50 [ 264.532644][T10484] try_charge+0xf4b/0x1440 [ 264.538109][T10484] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 264.543637][T10484] ? percpu_ref_tryget_live+0x111/0x290 [ 264.549187][T10484] ? get_mem_cgroup_from_mm+0x16/0x320 [ 264.554636][T10484] ? get_mem_cgroup_from_mm+0x156/0x320 [ 264.560167][T10484] mem_cgroup_try_charge+0x136/0x590 [ 264.565442][T10484] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 264.572018][T10484] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 264.577759][T10484] __handle_mm_fault+0x1e34/0x3f20 [ 264.582864][T10484] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 264.588412][T10484] ? __kasan_check_read+0x11/0x20 [ 264.593432][T10484] ? do_raw_spin_unlock+0x57/0x270 [ 264.598547][T10484] ? trace_hardirqs_on+0x67/0x240 [ 264.603599][T10484] handle_mm_fault+0x1b5/0x6c0 [ 264.608365][T10484] __get_user_pages+0x7d4/0x1b30 [ 264.613312][T10484] ? mark_held_locks+0xf0/0xf0 [ 264.618191][T10484] ? follow_page_mask+0x1cf0/0x1cf0 [ 264.623394][T10484] ? __mm_populate+0x270/0x380 [ 264.628158][T10484] ? __kasan_check_write+0x14/0x20 [ 264.633262][T10484] ? down_read+0x109/0x430 [ 264.637676][T10484] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 264.643912][T10484] populate_vma_page_range+0x20d/0x2a0 [ 264.649373][T10484] __mm_populate+0x204/0x380 [ 264.653954][T10484] ? populate_vma_page_range+0x2a0/0x2a0 [ 264.659571][T10484] ? __kasan_check_write+0x14/0x20 [ 264.664671][T10484] ? up_write+0x155/0x490 [ 264.668986][T10484] ? ns_capable_common+0x93/0x100 [ 264.674000][T10484] __x64_sys_mlockall+0x473/0x520 [ 264.679017][T10484] do_syscall_64+0xfa/0x760 [ 264.683508][T10484] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.689383][T10484] RIP: 0033:0x459879 [ 264.693266][T10484] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 02:04:14 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 264.712953][T10484] RSP: 002b:00007f96b6b6dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 264.721353][T10484] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000459879 [ 264.729312][T10484] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 264.737273][T10484] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 264.745234][T10484] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f96b6b6e6d4 [ 264.753190][T10484] R13: 00000000004c5d72 R14: 00000000004da7f8 R15: 00000000ffffffff [ 264.794463][ T3890] kobject: 'loop3' (000000009258557a): kobject_uevent_env [ 264.820615][ T3890] kobject: 'loop3' (000000009258557a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 264.828665][T10484] memory: usage 307200kB, limit 307200kB, failcnt 145 02:04:14 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000340)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, 0x0) r1 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000000)=0x3) dup2(r2, r1) [ 264.850140][T10484] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 264.854552][ T3890] kobject: 'loop5' (000000003029f8b4): kobject_uevent_env [ 264.876330][ T3890] kobject: 'loop5' (000000003029f8b4): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 264.877964][T10484] Memory cgroup stats for /syz4: [ 264.878067][T10484] anon 305451008 [ 264.878067][T10484] file 0 [ 264.878067][T10484] kernel_stack 589824 [ 264.878067][T10484] slab 5443584 [ 264.878067][T10484] sock 0 [ 264.878067][T10484] shmem 0 [ 264.878067][T10484] file_mapped 0 [ 264.878067][T10484] file_dirty 0 [ 264.878067][T10484] file_writeback 0 [ 264.878067][T10484] anon_thp 270532608 [ 264.878067][T10484] inactive_anon 44810240 [ 264.878067][T10484] active_anon 2625536 [ 264.878067][T10484] inactive_file 0 [ 264.878067][T10484] active_file 0 [ 264.878067][T10484] unevictable 258277376 [ 264.878067][T10484] slab_reclaimable 1216512 [ 264.878067][T10484] slab_unreclaimable 4227072 [ 264.878067][T10484] pgfault 25476 [ 264.878067][T10484] pgmajfault 0 [ 264.878067][T10484] workingset_refault 0 [ 264.878067][T10484] workingset_activate 0 [ 264.878067][T10484] workingset_nodereclaim 0 [ 264.878067][T10484] pgrefill 66 [ 264.878067][T10484] pgscan 67 [ 264.878067][T10484] pgsteal 0 [ 264.878067][T10484] pgactivate 66 [ 264.910980][ T3890] kobject: 'loop2' (0000000073647ecb): kobject_uevent_env 02:04:14 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000340)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000000)=0x3) 02:04:14 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000200)={0x8, @raw_data="08838529a6d9154494131b8636a8f7228f880fcae0e592e47dea38d39df89828215b4dfe60767085f9caf30ef228f807b053571a17ceb991d46e521c9bf44f41863ecf1adce96948738bdc9cf14033680de9f9034d73061a60995f79cbc18a4fdb083c0fef570985a12abd02f2b7de98b2bd030b3c3a0fa61cad2fdebcf84b4cd249e4d848c04e41f4fc29bf4899e417cdc80d1f42752b0007141c27c096c8e5d19adeacece84ccc3d30813e222ecd7ef8092410f9391035f34554602fb44b0f6ec13b89648b5bcb"}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="3100000000000000000009000000280003000800030000000000140002006c6f00000000000000000000000000000800010001000000617172d3d6def3363392e608c5718208ee88658436a8035bf72a226e35a499b130a7c88e59c42d8ed7d78973b74dde00a32d6068d5bf94d66acb2859e4dd6a253960524e0ff5cdc3b687959b3b1d9fee94769de6371c87943967644383f4caef249b3c704b8ecc75fd72dbeaa001001207b940ea0479c8e1bfbd2a6b85935c1e8195d8471d85175a"], 0x3c}}, 0x0) [ 265.092910][ T3890] kobject: 'loop2' (0000000073647ecb): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 265.115276][ T3890] kobject: 'loop1' (000000004380c1f4): kobject_uevent_env [ 265.121565][T10484] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=10468,uid=0 [ 265.137448][ T3890] kobject: 'loop1' (000000004380c1f4): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 265.152095][T10506] kobject: 'kvm' (000000007cb789b6): kobject_uevent_env [ 265.165800][T10513] IPVS: Error connecting to the multicast addr [ 265.178585][T10506] kobject: 'kvm' (000000007cb789b6): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 265.198777][ T3890] kobject: 'loop5' (000000003029f8b4): kobject_uevent_env [ 265.200362][T10484] Memory cgroup out of memory: Killed process 10468 (syz-executor.4) total-vm:72708kB, anon-rss:18232kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:159744kB oom_score_adj:1000 [ 265.214922][ T3890] kobject: 'loop5' (000000003029f8b4): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 265.244835][ T3890] kobject: 'loop0' (0000000011520495): kobject_uevent_env [ 265.246970][T10512] kobject: 'kvm' (000000007cb789b6): kobject_uevent_env [ 265.263497][ T3890] kobject: 'loop0' (0000000011520495): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 265.281471][T10468] kobject: 'kvm' (000000007cb789b6): kobject_uevent_env [ 265.300571][ T3890] kobject: 'loop1' (000000004380c1f4): kobject_uevent_env [ 265.305023][T10512] kobject: 'kvm' (000000007cb789b6): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 265.317221][ T3890] kobject: 'loop1' (000000004380c1f4): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 265.337557][T10468] kobject: 'kvm' (000000007cb789b6): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 265.351097][ T3890] kobject: 'loop0' (0000000011520495): kobject_uevent_env [ 265.358875][ T3890] kobject: 'loop0' (0000000011520495): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 265.391098][ T3890] kobject: 'loop5' (000000003029f8b4): kobject_uevent_env [ 265.399114][ T3890] kobject: 'loop5' (000000003029f8b4): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 265.521981][T10516] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 265.665824][T10524] kobject: 'kvm' (000000007cb789b6): kobject_uevent_env [ 265.679870][T10524] kobject: 'kvm' (000000007cb789b6): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 265.702107][T10497] kobject: 'kvm' (000000007cb789b6): kobject_uevent_env [ 265.727969][T10497] kobject: 'kvm' (000000007cb789b6): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 265.781645][T10527] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 265.832624][T10524] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 265.858876][T10524] CPU: 0 PID: 10524 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 265.868000][T10524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.878045][T10524] Call Trace: [ 265.881335][T10524] dump_stack+0x172/0x1f0 [ 265.885658][T10524] dump_header+0x177/0x1152 [ 265.890153][T10524] ? ___ratelimit+0xf8/0x595 [ 265.894738][T10524] ? trace_hardirqs_on+0x67/0x240 [ 265.899787][T10524] ? pagefault_out_of_memory+0x11c/0x11c [ 265.905420][T10524] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 265.911228][T10524] ? ___ratelimit+0x60/0x595 [ 265.915816][T10524] ? do_raw_spin_unlock+0x57/0x270 [ 265.920927][T10524] oom_kill_process.cold+0x10/0x15 [ 265.926039][T10524] out_of_memory+0x334/0x1340 [ 265.929795][ T3890] kobject: 'loop2' (0000000073647ecb): kobject_uevent_env [ 265.930725][T10524] ? lock_downgrade+0x920/0x920 [ 265.937911][ T3890] kobject: 'loop2' (0000000073647ecb): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 265.942638][T10524] ? oom_killer_disable+0x280/0x280 [ 265.957939][T10524] mem_cgroup_out_of_memory+0x1d8/0x240 [ 265.963492][T10524] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 265.969128][T10524] ? do_raw_spin_unlock+0x57/0x270 [ 265.972682][T10506] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 265.974257][T10524] ? _raw_spin_unlock+0x2d/0x50 [ 265.974282][T10524] try_charge+0xf4b/0x1440 [ 265.992770][T10524] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 265.998332][T10524] ? percpu_ref_tryget_live+0x111/0x290 [ 266.003886][T10524] ? get_mem_cgroup_from_mm+0x16/0x320 [ 266.009357][T10524] ? get_mem_cgroup_from_mm+0x156/0x320 [ 266.014893][T10524] mem_cgroup_try_charge+0x136/0x590 [ 266.020269][T10524] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 266.026486][T10524] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 266.032097][T10524] wp_page_copy+0x41e/0x1590 [ 266.036662][T10524] ? page_trans_huge_mapcount+0x166/0x450 [ 266.042356][T10524] ? pmd_pfn+0x1d0/0x1d0 [ 266.046574][T10524] ? lock_downgrade+0x920/0x920 [ 266.051400][T10524] ? swp_swapcount+0x540/0x540 [ 266.056137][T10524] ? __kasan_check_read+0x11/0x20 [ 266.061136][T10524] ? do_raw_spin_unlock+0x57/0x270 [ 266.066247][T10524] do_wp_page+0x499/0x14d0 [ 266.070643][T10524] ? finish_mkwrite_fault+0x570/0x570 [ 266.075993][T10524] __handle_mm_fault+0x22f1/0x3f20 [ 266.081092][T10524] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 266.086611][T10524] ? __kasan_check_read+0x11/0x20 [ 266.091625][T10524] ? do_raw_spin_unlock+0x57/0x270 [ 266.096738][T10524] ? trace_hardirqs_on+0x67/0x240 [ 266.101030][T10490] kobject: 'kvm' (000000007cb789b6): kobject_uevent_env [ 266.101852][T10524] handle_mm_fault+0x1b5/0x6c0 [ 266.108817][T10490] kobject: 'kvm' (000000007cb789b6): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 266.113501][T10524] __get_user_pages+0x7d4/0x1b30 [ 266.128108][T10524] ? mark_held_locks+0xf0/0xf0 [ 266.132879][T10524] ? follow_page_mask+0x1cf0/0x1cf0 [ 266.138076][T10524] ? __mm_populate+0x270/0x380 [ 266.142833][T10524] ? __kasan_check_write+0x14/0x20 [ 266.147938][T10524] ? down_read+0x109/0x430 [ 266.152354][T10524] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 266.158592][T10524] populate_vma_page_range+0x20d/0x2a0 [ 266.164045][T10524] __mm_populate+0x204/0x380 [ 266.168631][T10524] ? populate_vma_page_range+0x2a0/0x2a0 [ 266.174257][T10524] ? __kasan_check_write+0x14/0x20 [ 266.179368][T10524] ? up_write+0x155/0x490 [ 266.183687][T10524] ? ns_capable_common+0x93/0x100 [ 266.188706][T10524] __x64_sys_mlockall+0x473/0x520 [ 266.193724][T10524] do_syscall_64+0xfa/0x760 [ 266.198232][T10524] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.204110][T10524] RIP: 0033:0x459879 [ 266.207984][T10524] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 266.227563][T10524] RSP: 002b:00007f96b6b4cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 266.235947][T10524] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000459879 [ 266.243891][T10524] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 266.251836][T10524] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 266.259779][T10524] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f96b6b4d6d4 [ 266.267732][T10524] R13: 00000000004c5d72 R14: 00000000004da7f8 R15: 00000000ffffffff [ 266.279730][T10483] kobject: 'kvm' (000000007cb789b6): kobject_uevent_env [ 266.282150][T10524] memory: usage 307200kB, limit 307200kB, failcnt 166 [ 266.286699][T10483] kobject: 'kvm' (000000007cb789b6): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 266.296835][T10524] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 266.318564][ T3890] kobject: 'loop3' (000000009258557a): kobject_uevent_env [ 266.319370][T10524] Memory cgroup stats for /syz4: [ 266.319474][T10524] anon 305270784 [ 266.319474][T10524] file 0 [ 266.319474][T10524] kernel_stack 655360 [ 266.319474][T10524] slab 5443584 [ 266.319474][T10524] sock 0 [ 266.319474][T10524] shmem 0 [ 266.319474][T10524] file_mapped 0 [ 266.319474][T10524] file_dirty 0 [ 266.319474][T10524] file_writeback 0 [ 266.319474][T10524] anon_thp 270532608 [ 266.319474][T10524] inactive_anon 30248960 [ 266.319474][T10524] active_anon 2625536 [ 266.319474][T10524] inactive_file 0 [ 266.319474][T10524] active_file 0 [ 266.319474][T10524] unevictable 272416768 [ 266.319474][T10524] slab_reclaimable 1216512 [ 266.319474][T10524] slab_unreclaimable 4227072 [ 266.319474][T10524] pgfault 26730 [ 266.319474][T10524] pgmajfault 0 [ 266.319474][T10524] workingset_refault 0 [ 266.319474][T10524] workingset_activate 0 [ 266.319474][T10524] workingset_nodereclaim 0 [ 266.319474][T10524] pgrefill 66 [ 266.319474][T10524] pgscan 67 [ 266.319474][T10524] pgsteal 0 [ 266.319474][T10524] pgactivate 66 [ 266.325699][ T3890] kobject: 'loop3' (000000009258557a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 266.331269][T10524] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=10483,uid=0 [ 266.452340][T10524] Memory cgroup out of memory: Killed process 10524 (syz-executor.4) total-vm:72840kB, anon-rss:18240kB, file-rss:54336kB, shmem-rss:0kB, UID:0 pgtables:200704kB oom_score_adj:1000 [ 266.470527][ T1064] oom_reaper: reaped process 10524 (syz-executor.4), now anon-rss:18240kB, file-rss:54332kB, shmem-rss:0kB 02:04:16 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="3100000000000000000009000000280003000800030000000000140002006c6f00000000000000000000000000000800010001000000617172d3d6def3363392e608c5718208ee88658436a8035bf72a226e35a499b130a7c88e59c42d8ed7d78973b74dde00a32d6068d5bf94d66acb2859e4dd6a253960524e0ff5cdc3b687959b3b1d9fee94769de6371c87943967644383f4caef249b3c704b8ecc75fd72dbeaa001001207b940ea0479c8e1bfbd2a6b85935c1e8195d8471d85175a"], 0x3c}}, 0x0) 02:04:16 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, 0x0, 0x2c8) 02:04:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mlockall(0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200a00, 0x0) clone(0x804400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) fcntl$getown(r1, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x500, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3000000010000108ae8bc38408000002000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800180000000000"], 0x30}}, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000000), 0x4) 02:04:16 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000340)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) 02:04:16 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000200)={0x8, @raw_data="08838529a6d9154494131b8636a8f7228f880fcae0e592e47dea38d39df89828215b4dfe60767085f9caf30ef228f807b053571a17ceb991d46e521c9bf44f41863ecf1adce96948738bdc9cf14033680de9f9034d73061a60995f79cbc18a4fdb083c0fef570985a12abd02f2b7de98b2bd030b3c3a0fa61cad2fdebcf84b4cd249e4d848c04e41f4fc29bf4899e417cdc80d1f42752b0007141c27c096c8e5d19adeacece84ccc3d30813e222ecd7ef8092410f9391035f34554602fb44b0f6ec13b89648b5bcb"}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="3100000000000000000009000000280003000800030000000000140002006c6f00000000000000000000000000000800010001000000617172d3d6def3363392e608c5718208ee88658436a8035bf72a226e35a499b130a7c88e59c42d8ed7d78973b74dde00a32d6068d5bf94d66acb2859e4dd6a253960524e0ff5cdc3b687959b3b1d9fee94769de6371c87943967644383f4caef249b3c704b8ecc75fd72dbeaa001001207b940ea0479c8e1bfbd2a6b85935c1e8195d8471d85175a"], 0x3c}}, 0x0) 02:04:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mlockall(0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200a00, 0x0) clone(0x804400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) fcntl$getown(r1, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x500, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3000000010000108ae8bc38408000002000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800180000000000"], 0x30}}, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000000), 0x4) 02:04:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mlockall(0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200a00, 0x0) clone(0x804400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) fcntl$getown(r1, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x500, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3000000010000108ae8bc38408000002000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800180000000000"], 0x30}}, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000000), 0x4) [ 266.556832][ T3890] kobject: 'loop4' (000000001b6f3d08): kobject_uevent_env [ 266.580443][T10540] IPVS: Error connecting to the multicast addr [ 266.586857][ T3890] kobject: 'loop4' (000000001b6f3d08): fill_kobj_path: path = '/devices/virtual/block/loop4' 02:04:16 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000340)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, 0x0) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) 02:04:16 executing program 0: fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="3100000000000000000009000000280003000800030000000000140002006c6f00000000000000000000000000000800010001000000617172d3d6def3363392e608c5718208ee88658436a8035bf72a226e35a499b130a7c88e59c42d8ed7d78973b74dde00a32d6068d5bf94d66acb2859e4dd6a253960524e0ff5cdc3b687959b3b1d9fee94769de6371c87943967644383f4caef249b3c704b8ecc75fd72dbeaa001001207b940ea0479c8e1bfbd2a6b85935c1e8195d8471d85175a"], 0x3c}}, 0x0) [ 266.628298][ T3890] kobject: 'loop2' (0000000073647ecb): kobject_uevent_env [ 266.635486][ T3890] kobject: 'loop2' (0000000073647ecb): fill_kobj_path: path = '/devices/virtual/block/loop2' 02:04:16 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, 0x0, 0x2c8) [ 266.725718][ T3890] kobject: 'loop5' (000000003029f8b4): kobject_uevent_env [ 266.746532][T10550] IPVS: Error connecting to the multicast addr [ 266.754514][ T3890] kobject: 'loop5' (000000003029f8b4): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 266.784741][T10546] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 266.806495][ T3890] kobject: 'loop0' (0000000011520495): kobject_uevent_env [ 266.817193][T10546] CPU: 0 PID: 10546 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 02:04:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="3100000000000000000009000000280003000800030000000000140002006c6f00000000000000000000000000000800010001000000617172d3d6def3363392e608c5718208ee88658436a8035bf72a226e35a499b130a7c88e59c42d8ed7d78973b74dde00a32d6068d5bf94d66acb2859e4dd6a253960524e0ff5cdc3b687959b3b1d9fee94769de6371c87943967644383f4caef249b3c704b8ecc75fd72dbeaa001001207b940ea0479c8e1bfbd2a6b85935c1e8195d8471d85175a"], 0x3c}}, 0x0) [ 266.826325][T10546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.836381][T10546] Call Trace: [ 266.839680][T10546] dump_stack+0x172/0x1f0 [ 266.843304][ T3890] kobject: 'loop0' (0000000011520495): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 266.844010][T10546] dump_header+0x177/0x1152 [ 266.858616][T10546] ? ___ratelimit+0xf8/0x595 [ 266.863210][T10546] ? trace_hardirqs_on+0x67/0x240 [ 266.868240][T10546] ? pagefault_out_of_memory+0x11c/0x11c [ 266.873877][T10546] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 266.879683][T10546] ? ___ratelimit+0x60/0x595 [ 266.884275][T10546] ? do_raw_spin_unlock+0x57/0x270 [ 266.889388][T10546] oom_kill_process.cold+0x10/0x15 [ 266.891908][ T3890] kobject: 'loop1' (000000004380c1f4): kobject_uevent_env [ 266.894495][T10546] out_of_memory+0x334/0x1340 [ 266.894517][T10546] ? lock_downgrade+0x920/0x920 [ 266.911219][T10546] ? oom_killer_disable+0x280/0x280 [ 266.916420][T10546] ? __kasan_check_read+0x11/0x20 [ 266.921455][T10546] mem_cgroup_out_of_memory+0x1d8/0x240 [ 266.926887][ T3890] kobject: 'loop1' (000000004380c1f4): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 266.927002][T10546] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 266.942757][T10546] ? do_raw_spin_unlock+0x57/0x270 [ 266.947895][T10546] ? _raw_spin_unlock+0x2d/0x50 [ 266.949657][ T3890] kobject: 'loop0' (0000000011520495): kobject_uevent_env [ 266.952749][T10546] try_charge+0xf4b/0x1440 [ 266.952771][T10546] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 266.968666][ T3890] kobject: 'loop0' (0000000011520495): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 266.969786][T10546] ? percpu_ref_tryget_live+0x111/0x290 [ 266.969802][T10546] ? get_mem_cgroup_from_mm+0x16/0x320 [ 266.969820][T10546] ? get_mem_cgroup_from_mm+0x156/0x320 [ 266.996427][T10546] mem_cgroup_try_charge+0x136/0x590 [ 267.001702][T10546] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 267.007951][T10546] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 267.013569][T10546] __handle_mm_fault+0x1e34/0x3f20 [ 267.018664][T10546] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 267.024189][T10546] ? __kasan_check_read+0x11/0x20 [ 267.029193][T10546] ? do_raw_spin_unlock+0x57/0x270 [ 267.034304][T10546] ? trace_hardirqs_on+0x67/0x240 [ 267.039328][T10546] handle_mm_fault+0x1b5/0x6c0 [ 267.044074][T10546] __get_user_pages+0x7d4/0x1b30 [ 267.048992][T10546] ? mark_held_locks+0xf0/0xf0 [ 267.053738][T10546] ? follow_page_mask+0x1cf0/0x1cf0 [ 267.058914][T10546] ? __mm_populate+0x270/0x380 [ 267.063664][T10546] ? __kasan_check_write+0x14/0x20 [ 267.068752][T10546] ? down_read+0x109/0x430 [ 267.073150][T10546] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 267.079369][T10546] populate_vma_page_range+0x20d/0x2a0 [ 267.084805][T10546] __mm_populate+0x204/0x380 [ 267.089376][T10546] ? populate_vma_page_range+0x2a0/0x2a0 [ 267.094987][T10546] ? __kasan_check_write+0x14/0x20 [ 267.100077][T10546] ? up_write+0x155/0x490 [ 267.104389][T10546] ? ns_capable_common+0x93/0x100 [ 267.109394][T10546] __x64_sys_mlockall+0x473/0x520 [ 267.114401][T10546] do_syscall_64+0xfa/0x760 [ 267.118888][T10546] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.124755][T10546] RIP: 0033:0x459879 [ 267.128633][T10546] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 267.148216][T10546] RSP: 002b:00007f96b6b6dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 267.156604][T10546] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000459879 [ 267.164554][T10546] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 267.172502][T10546] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 02:04:16 executing program 5: syz_open_dev$sndctrl(&(0x7f0000000340)='/dev/snd/controlC#\x00', 0x0, 0x0) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) [ 267.180453][T10546] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f96b6b6e6d4 [ 267.188404][T10546] R13: 00000000004c5d72 R14: 00000000004da7f8 R15: 00000000ffffffff [ 267.204555][T10546] memory: usage 306888kB, limit 307200kB, failcnt 185 [ 267.217247][T10546] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 267.225335][T10546] Memory cgroup stats for /syz4: [ 267.225444][T10546] anon 305455104 [ 267.225444][T10546] file 0 [ 267.225444][T10546] kernel_stack 589824 [ 267.225444][T10546] slab 5038080 [ 267.225444][T10546] sock 0 [ 267.225444][T10546] shmem 0 [ 267.225444][T10546] file_mapped 0 [ 267.225444][T10546] file_dirty 0 [ 267.225444][T10546] file_writeback 0 [ 267.225444][T10546] anon_thp 270532608 [ 267.225444][T10546] inactive_anon 44597248 [ 267.225444][T10546] active_anon 2600960 [ 267.225444][T10546] inactive_file 0 [ 267.225444][T10546] active_file 0 [ 267.225444][T10546] unevictable 258142208 [ 267.225444][T10546] slab_reclaimable 1081344 [ 267.225444][T10546] slab_unreclaimable 3956736 [ 267.225444][T10546] pgfault 27390 [ 267.225444][T10546] pgmajfault 0 [ 267.225444][T10546] workingset_refault 0 [ 267.225444][T10546] workingset_activate 0 [ 267.225444][T10546] workingset_nodereclaim 0 [ 267.225444][T10546] pgrefill 66 [ 267.225444][T10546] pgscan 67 [ 267.225444][T10546] pgsteal 0 [ 267.225444][T10546] pgactivate 66 [ 267.237887][ T3890] kobject: 'loop5' (000000003029f8b4): kobject_uevent_env 02:04:17 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="3100000000000000000009000000280003000800030000000000140002006c6f00000000000000000000000000000800010001000000617172d3d6def3363392e608c5718208ee88658436a8035bf72a226e35a499b130a7c88e59c42d8ed7d78973b74dde00a32d6068d5bf94d66acb2859e4dd6a253960524e0ff5cdc3b687959b3b1d9fee94769de6371c87943967644383f4caef249b3c704b8ecc75fd72dbeaa001001207b940ea0479c8e1bfbd2a6b85935c1e8195d8471d85175a"], 0x3c}}, 0x0) [ 267.335661][T10554] kobject: 'kvm' (000000007cb789b6): kobject_uevent_env [ 267.363638][T10554] kobject: 'kvm' (000000007cb789b6): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 267.386983][T10569] IPVS: Error connecting to the multicast addr [ 267.406966][ T3890] kobject: 'loop5' (000000003029f8b4): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 267.483341][T10568] kobject: 'kvm' (000000007cb789b6): kobject_uevent_env [ 267.490973][T10546] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=10526,uid=0 [ 267.507560][T10546] Memory cgroup out of memory: Killed process 10526 (syz-executor.4) total-vm:72708kB, anon-rss:18232kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:159744kB oom_score_adj:1000 [ 267.514982][T10568] kobject: 'kvm' (000000007cb789b6): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 267.830059][T10574] kobject: 'kvm' (000000007cb789b6): kobject_uevent_env [ 267.850679][T10574] kobject: 'kvm' (000000007cb789b6): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 267.941212][T10574] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 268.087373][T10545] kobject: 'kvm' (000000007cb789b6): kobject_uevent_env [ 268.119914][T10545] kobject: 'kvm' (000000007cb789b6): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 268.153917][T10554] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 268.187018][T10568] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 02:04:17 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, 0x0, 0x2c8) 02:04:17 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="3100000000000000000009000000280003000800030000000000140002006c6f00000000000000000000000000000800010001000000617172d3d6def3363392e608c5718208ee88658436a8035bf72a226e35a499b130a7c88e59c42d8ed7d78973b74dde00a32d6068d5bf94d66acb2859e4dd6a253960524e0ff5cdc3b687959b3b1d9fee94769de6371c87943967644383f4caef249b3c704b8ecc75fd72dbeaa001001207b940ea0479c8e1bfbd2a6b85935c1e8195d8471d85175a"], 0x3c}}, 0x0) 02:04:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mlockall(0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200a00, 0x0) clone(0x804400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x7fffffff, 0x600000) r1 = socket$netlink(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x500, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3000000010000108ae8bc38408000002000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800180000000000"], 0x30}}, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000000), 0x4) 02:04:17 executing program 5: open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) [ 268.260026][ T3890] kobject: 'loop4' (000000001b6f3d08): kobject_uevent_env [ 268.276384][ T3890] kobject: 'loop4' (000000001b6f3d08): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 268.302488][T10535] kobject: 'kvm' (000000007cb789b6): kobject_uevent_env [ 268.321786][ T3890] kobject: 'loop0' (0000000011520495): kobject_uevent_env [ 268.347361][T10535] kobject: 'kvm' (000000007cb789b6): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 268.352896][ T3890] kobject: 'loop0' (0000000011520495): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 268.365232][T10542] kobject: 'kvm' (000000007cb789b6): kobject_uevent_env [ 268.374491][T10542] kobject: 'kvm' (000000007cb789b6): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 268.413006][ T3890] kobject: 'loop5' (000000003029f8b4): kobject_uevent_env [ 268.422916][T10588] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 268.446506][ T3890] kobject: 'loop5' (000000003029f8b4): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 268.471361][T10588] CPU: 0 PID: 10588 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 268.480492][T10588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.490539][T10588] Call Trace: [ 268.493832][T10588] dump_stack+0x172/0x1f0 [ 268.498164][T10588] dump_header+0x177/0x1152 [ 268.502668][T10588] ? ___ratelimit+0xf8/0x595 [ 268.507264][T10588] ? trace_hardirqs_on+0x67/0x240 [ 268.512295][T10588] ? pagefault_out_of_memory+0x11c/0x11c [ 268.517936][T10588] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 268.523753][T10588] ? ___ratelimit+0x60/0x595 [ 268.528346][T10588] ? do_raw_spin_unlock+0x57/0x270 [ 268.533457][T10588] oom_kill_process.cold+0x10/0x15 [ 268.538567][T10588] out_of_memory+0x334/0x1340 [ 268.543250][T10588] ? lock_downgrade+0x920/0x920 [ 268.548100][T10588] ? oom_killer_disable+0x280/0x280 [ 268.553300][T10588] ? __kasan_check_read+0x11/0x20 [ 268.558328][T10588] mem_cgroup_out_of_memory+0x1d8/0x240 [ 268.563880][T10588] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 268.567027][ T3890] kobject: 'loop2' (0000000073647ecb): kobject_uevent_env [ 268.569513][T10588] ? do_raw_spin_unlock+0x57/0x270 [ 268.569540][T10588] ? _raw_spin_unlock+0x2d/0x50 [ 268.576636][ T3890] kobject: 'loop2' (0000000073647ecb): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 268.581709][T10588] try_charge+0xf4b/0x1440 [ 268.581731][T10588] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 268.581748][T10588] ? percpu_ref_tryget_live+0x111/0x290 [ 268.612273][T10588] ? get_mem_cgroup_from_mm+0x16/0x320 [ 268.617862][T10588] ? get_mem_cgroup_from_mm+0x156/0x320 [ 268.623411][T10588] mem_cgroup_try_charge+0x136/0x590 [ 268.623620][ T3890] kobject: 'loop1' (000000004380c1f4): kobject_uevent_env [ 268.628706][T10588] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 268.628727][T10588] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 268.638246][ T3890] kobject: 'loop1' (000000004380c1f4): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 268.642043][T10588] __handle_mm_fault+0x1e34/0x3f20 [ 268.642062][T10588] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 268.668526][T10588] ? __kasan_check_read+0x11/0x20 [ 268.673562][T10588] ? do_raw_spin_unlock+0x57/0x270 [ 268.678679][T10588] ? trace_hardirqs_on+0x67/0x240 [ 268.683711][T10588] handle_mm_fault+0x1b5/0x6c0 [ 268.688484][T10588] __get_user_pages+0x7d4/0x1b30 [ 268.693421][T10588] ? mark_held_locks+0xf0/0xf0 [ 268.698168][T10588] ? follow_page_mask+0x1cf0/0x1cf0 [ 268.703343][T10588] ? __mm_populate+0x270/0x380 [ 268.708086][T10588] ? __kasan_check_write+0x14/0x20 [ 268.713174][T10588] ? down_read+0x109/0x430 [ 268.717571][T10588] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 268.723788][T10588] populate_vma_page_range+0x20d/0x2a0 [ 268.729232][T10588] __mm_populate+0x204/0x380 [ 268.733800][T10588] ? populate_vma_page_range+0x2a0/0x2a0 [ 268.739408][T10588] ? __kasan_check_write+0x14/0x20 [ 268.744497][T10588] ? up_write+0x155/0x490 [ 268.748807][T10588] ? ns_capable_common+0x93/0x100 [ 268.753808][T10588] __x64_sys_mlockall+0x473/0x520 [ 268.758809][T10588] do_syscall_64+0xfa/0x760 [ 268.763292][T10588] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.769159][T10588] RIP: 0033:0x459879 [ 268.773029][T10588] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 268.792612][T10588] RSP: 002b:00007f96b6b6dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 268.800998][T10588] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000459879 [ 268.808945][T10588] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 268.816892][T10588] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 268.824852][T10588] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f96b6b6e6d4 [ 268.832820][T10588] R13: 00000000004c5d72 R14: 00000000004da7f8 R15: 00000000ffffffff [ 268.841594][T10588] memory: usage 307200kB, limit 307200kB, failcnt 217 [ 268.847228][ T3890] kobject: 'loop3' (000000009258557a): kobject_uevent_env [ 268.848394][T10588] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 268.855480][ T3890] kobject: 'loop3' (000000009258557a): fill_kobj_path: path = '/devices/virtual/block/loop3' 02:04:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mlockall(0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200a00, 0x0) clone(0x804400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) fcntl$getown(r1, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x500, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3000000010000108ae8bc38408000002000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800180000000000"], 0x30}}, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000000), 0x4) 02:04:18 executing program 5: open$dir(0x0, 0x7e, 0x0) 02:04:18 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="3100000000000000000009000000280003000800030000000000140002006c6f00000000000000000000000000000800010001000000617172d3d6def3363392e608c5718208ee88658436a8035bf72a226e35a499b130a7c88e59c42d8ed7d78973b74dde00a32d6068d5bf94d66acb2859e4dd6a253960524e0ff5cdc3b687959b3b1d9fee94769de6371c87943967644383f4caef249b3c704b8ecc75fd72dbeaa001001207b940ea0479c8e1bfbd2a6b85935c1e8195d8471d85175a"], 0x3c}}, 0x0) 02:04:18 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mlockall(0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200a00, 0x0) clone(0x804400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) fcntl$getown(r1, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x500, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3000000010000108ae8bc38408000002000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800180000000000"], 0x30}}, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000000), 0x4) 02:04:18 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000002000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa00006e0000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000020000000000000000000002002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f000000000000000000000000000044fc736530000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800"/592]}, 0x2c8) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x0, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0}, 0x2c8) [ 268.862335][T10588] Memory cgroup stats for /syz4: [ 268.862433][T10588] anon 305754112 [ 268.862433][T10588] file 0 [ 268.862433][T10588] kernel_stack 655360 [ 268.862433][T10588] slab 5038080 [ 268.862433][T10588] sock 0 [ 268.862433][T10588] shmem 0 [ 268.862433][T10588] file_mapped 0 [ 268.862433][T10588] file_dirty 0 [ 268.862433][T10588] file_writeback 0 [ 268.862433][T10588] anon_thp 270532608 [ 268.862433][T10588] inactive_anon 44666880 [ 268.862433][T10588] active_anon 2654208 [ 268.862433][T10588] inactive_file 0 [ 268.862433][T10588] active_file 0 [ 268.862433][T10588] unevictable 258547712 [ 268.862433][T10588] slab_reclaimable 1081344 [ 268.862433][T10588] slab_unreclaimable 3956736 [ 268.862433][T10588] pgfault 29007 [ 268.862433][T10588] pgmajfault 0 [ 268.862433][T10588] workingset_refault 0 [ 268.862433][T10588] workingset_activate 0 [ 268.862433][T10588] workingset_nodereclaim 0 [ 268.862433][T10588] pgrefill 66 [ 268.862433][T10588] pgscan 67 [ 268.862433][T10588] pgsteal 0 [ 268.862433][T10588] pgactivate 66 [ 268.980481][T10588] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=10575,uid=0 02:04:18 executing program 5: open$dir(0x0, 0x7e, 0x0) [ 269.016699][T10588] Memory cgroup out of memory: Killed process 10575 (syz-executor.4) total-vm:72708kB, anon-rss:18232kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:159744kB oom_score_adj:1000 02:04:18 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="3100000000000000000009000000280003000800030000000000140002006c6f00000000000000000000000000000800010001000000617172d3d6def3363392e608c5718208ee88658436a8035bf72a226e35a499b130a7c88e59c42d8ed7d78973b74dde00a32d6068d5bf94d66acb2859e4dd6a253960524e0ff5cdc3b687959b3b1d9fee94769de6371c87943967644383f4caef249b3c704b8ecc75fd72dbeaa001001207b940ea0479c8e1bfbd2a6b85935c1e8195d8471d85175a"], 0x3c}}, 0x0) [ 269.053874][ T3890] kobject: 'loop5' (000000003029f8b4): kobject_uevent_env [ 269.064471][ T3890] kobject: 'loop5' (000000003029f8b4): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 269.107223][ T3890] kobject: 'loop0' (0000000011520495): kobject_uevent_env [ 269.137247][ T3890] kobject: 'loop0' (0000000011520495): fill_kobj_path: path = '/devices/virtual/block/loop0' 02:04:18 executing program 5: open$dir(0x0, 0x7e, 0x0) 02:04:18 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="3100000000000000000009000000280003000800030000000000140002006c6f00000000000000000000000000000800010001000000617172d3d6def3363392e608c5718208ee88658436a8035bf72a226e35a499b130a7c88e59c42d8ed7d78973b74dde00a32d6068d5bf94d66acb2859e4dd6a253960524e0ff5cdc3b687959b3b1d9fee94769de6371c87943967644383f4caef249b3c704b8ecc75fd72dbeaa001001207b940ea0479c8e1bfbd2a6b85935c1e8195d8471d85175a"], 0x3c}}, 0x0) 02:04:18 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x0, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0}, 0x2c8) [ 269.203924][ T3890] kobject: 'loop5' (000000003029f8b4): kobject_uevent_env [ 269.224632][ T3890] kobject: 'loop5' (000000003029f8b4): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 269.281530][T10609] kobject: 'kvm' (000000007cb789b6): kobject_uevent_env [ 269.286463][ T3890] kobject: 'loop1' (000000004380c1f4): kobject_uevent_env [ 269.319707][T10609] kobject: 'kvm' (000000007cb789b6): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 269.323768][ T3890] kobject: 'loop1' (000000004380c1f4): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 269.380341][ T3890] kobject: 'loop0' (0000000011520495): kobject_uevent_env [ 269.385207][T10622] kobject: 'kvm' (000000007cb789b6): kobject_uevent_env [ 269.392903][ T3890] kobject: 'loop0' (0000000011520495): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 269.407479][T10622] kobject: 'kvm' (000000007cb789b6): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 269.435353][T10628] kobject: 'kvm' (000000007cb789b6): kobject_uevent_env [ 269.471321][T10628] kobject: 'kvm' (000000007cb789b6): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 269.592567][T10633] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 269.671084][ T3890] kobject: 'loop1' (000000004380c1f4): kobject_uevent_env [ 269.689658][ T3890] kobject: 'loop1' (000000004380c1f4): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 269.722966][T10628] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 269.798224][T10628] CPU: 0 PID: 10628 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 269.807396][T10628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.817452][T10628] Call Trace: [ 269.819020][T10587] kobject: 'kvm' (000000007cb789b6): kobject_uevent_env [ 269.820737][T10628] dump_stack+0x172/0x1f0 [ 269.820757][T10628] dump_header+0x177/0x1152 [ 269.836463][T10628] ? ___ratelimit+0xf8/0x595 [ 269.841046][T10628] ? trace_hardirqs_on+0x67/0x240 [ 269.846064][T10628] ? pagefault_out_of_memory+0x11c/0x11c [ 269.851689][T10628] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 269.857490][T10628] ? ___ratelimit+0x60/0x595 [ 269.862072][T10628] ? do_raw_spin_unlock+0x57/0x270 [ 269.862143][T10587] kobject: 'kvm' (000000007cb789b6): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 269.867171][T10628] oom_kill_process.cold+0x10/0x15 [ 269.867184][T10628] out_of_memory+0x334/0x1340 [ 269.867197][T10628] ? lock_downgrade+0x920/0x920 [ 269.867214][T10628] ? oom_killer_disable+0x280/0x280 [ 269.896671][T10628] mem_cgroup_out_of_memory+0x1d8/0x240 [ 269.902217][T10628] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 269.907849][T10628] ? do_raw_spin_unlock+0x57/0x270 [ 269.912962][T10628] ? _raw_spin_unlock+0x2d/0x50 [ 269.917816][T10628] try_charge+0xf4b/0x1440 [ 269.922239][T10628] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 269.927787][T10628] ? percpu_ref_tryget_live+0x111/0x290 [ 269.933327][T10628] ? get_mem_cgroup_from_mm+0x16/0x320 [ 269.938780][T10628] ? get_mem_cgroup_from_mm+0x156/0x320 [ 269.944865][T10628] mem_cgroup_try_charge+0x136/0x590 [ 269.950146][T10628] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 269.956390][T10628] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 269.962008][T10628] wp_page_copy+0x41e/0x1590 [ 269.966663][T10628] ? page_trans_huge_mapcount+0x166/0x450 [ 269.972365][T10628] ? pmd_pfn+0x1d0/0x1d0 [ 269.976589][T10628] ? lock_downgrade+0x920/0x920 [ 269.981422][T10628] ? swp_swapcount+0x540/0x540 [ 269.986167][T10628] ? __kasan_check_read+0x11/0x20 [ 269.991168][T10628] ? do_raw_spin_unlock+0x57/0x270 [ 269.996259][T10628] do_wp_page+0x499/0x14d0 [ 270.000659][T10628] ? finish_mkwrite_fault+0x570/0x570 [ 270.006024][T10628] __handle_mm_fault+0x22f1/0x3f20 [ 270.011115][T10628] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 270.016641][T10628] ? __kasan_check_read+0x11/0x20 [ 270.021641][T10628] ? do_raw_spin_unlock+0x57/0x270 [ 270.026739][T10628] ? trace_hardirqs_on+0x67/0x240 [ 270.031756][T10628] handle_mm_fault+0x1b5/0x6c0 [ 270.036504][T10628] __get_user_pages+0x7d4/0x1b30 [ 270.041419][T10628] ? mark_held_locks+0xf0/0xf0 [ 270.046164][T10628] ? follow_page_mask+0x1cf0/0x1cf0 [ 270.051339][T10628] ? __mm_populate+0x270/0x380 [ 270.056084][T10628] ? __kasan_check_write+0x14/0x20 [ 270.061177][T10628] ? down_read+0x109/0x430 [ 270.065575][T10628] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 270.071794][T10628] populate_vma_page_range+0x20d/0x2a0 [ 270.077240][T10628] __mm_populate+0x204/0x380 [ 270.081810][T10628] ? populate_vma_page_range+0x2a0/0x2a0 [ 270.087419][T10628] ? __kasan_check_write+0x14/0x20 [ 270.092508][T10628] ? up_write+0x155/0x490 [ 270.096814][T10628] ? ns_capable_common+0x93/0x100 [ 270.101817][T10628] __x64_sys_mlockall+0x473/0x520 [ 270.106822][T10628] do_syscall_64+0xfa/0x760 [ 270.111305][T10628] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.117173][T10628] RIP: 0033:0x459879 [ 270.121053][T10628] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 270.140636][T10628] RSP: 002b:00007f96b6b4cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 270.149023][T10628] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000459879 [ 270.156985][T10628] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 270.164938][T10628] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 270.172892][T10628] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f96b6b4d6d4 [ 270.180839][T10628] R13: 00000000004c5d72 R14: 00000000004da7f8 R15: 00000000ffffffff [ 270.327289][T10628] memory: usage 307096kB, limit 307200kB, failcnt 252 [ 270.355017][T10628] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 270.371820][T10609] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 270.384638][T10628] Memory cgroup stats for /syz4: [ 270.384747][T10628] anon 305303552 [ 270.384747][T10628] file 0 [ 270.384747][T10628] kernel_stack 655360 [ 270.384747][T10628] slab 5242880 [ 270.384747][T10628] sock 0 [ 270.384747][T10628] shmem 0 [ 270.384747][T10628] file_mapped 0 [ 270.384747][T10628] file_dirty 0 [ 270.384747][T10628] file_writeback 0 [ 270.384747][T10628] anon_thp 270532608 [ 270.384747][T10628] inactive_anon 30248960 [ 270.384747][T10628] active_anon 2654208 [ 270.384747][T10628] inactive_file 0 [ 270.384747][T10628] active_file 0 [ 270.384747][T10628] unevictable 272416768 [ 270.384747][T10628] slab_reclaimable 1081344 [ 270.384747][T10628] slab_unreclaimable 4161536 [ 270.384747][T10628] pgfault 30162 [ 270.384747][T10628] pgmajfault 0 [ 270.384747][T10628] workingset_refault 0 [ 270.384747][T10628] workingset_activate 0 [ 270.384747][T10628] workingset_nodereclaim 0 [ 270.384747][T10628] pgrefill 66 [ 270.384747][T10628] pgscan 67 [ 270.384747][T10628] pgsteal 0 [ 270.384747][T10628] pgactivate 66 [ 270.465103][T10622] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 270.481322][T10628] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=10587,uid=0 [ 270.481408][T10628] Memory cgroup out of memory: Killed process 10628 (syz-executor.4) total-vm:72840kB, anon-rss:18240kB, file-rss:54336kB, shmem-rss:0kB, UID:0 pgtables:200704kB oom_score_adj:1000 02:04:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mlockall(0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200a00, 0x0) clone(0x804400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x7fffffff, 0x600000) r1 = socket$netlink(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x500, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3000000010000108ae8bc38408000002000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800180000000000"], 0x30}}, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000000), 0x4) 02:04:20 executing program 5: open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 270.481668][ T1064] oom_reaper: reaped process 10628 (syz-executor.4), now anon-rss:18240kB, file-rss:54332kB, shmem-rss:0kB [ 270.547329][T10597] kobject: 'kvm' (000000007cb789b6): kobject_uevent_env [ 270.554417][T10597] kobject: 'kvm' (000000007cb789b6): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 270.603991][ T3890] kobject: 'loop4' (000000001b6f3d08): kobject_uevent_env [ 270.614509][ T3890] kobject: 'loop4' (000000001b6f3d08): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 270.641803][ T3890] kobject: 'loop5' (000000003029f8b4): kobject_uevent_env 02:04:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mlockall(0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200a00, 0x0) clone(0x804400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) fcntl$getown(r1, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x500, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3000000010000108ae8bc38408000002000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800180000000000"], 0x30}}, 0x0) 02:04:20 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="3100000000000000000009000000280003000800030000000000140002006c6f00000000000000000000000000000800010001000000617172d3d6def3363392e608c5718208ee88658436a8035bf72a226e35a499b130a7c88e59c42d8ed7d78973b74dde00a32d6068d5bf94d66acb2859e4dd6a253960524e0ff5cdc3b687959b3b1d9fee94769de6371c87943967644383f4caef249b3c704b8ecc75fd72dbeaa001001207b940ea0479c8e1bfbd2a6b85935c1e8195d8471d85175a"], 0x3c}}, 0x0) 02:04:20 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x0, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0}, 0x2c8) [ 270.649824][ T3890] kobject: 'loop5' (000000003029f8b4): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 270.688470][T10595] kobject: 'kvm' (000000007cb789b6): kobject_uevent_env [ 270.709775][T10595] kobject: 'kvm' (000000007cb789b6): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 270.720755][ T3890] kobject: 'loop3' (000000009258557a): kobject_uevent_env [ 270.738629][ T3890] kobject: 'loop3' (000000009258557a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 270.739304][T10640] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 270.792138][ T3890] kobject: 'loop0' (0000000011520495): kobject_uevent_env [ 270.814456][ T3890] kobject: 'loop0' (0000000011520495): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 270.846617][T10640] CPU: 0 PID: 10640 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 270.855750][T10640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.866147][T10640] Call Trace: [ 270.869442][T10640] dump_stack+0x172/0x1f0 [ 270.873769][T10640] dump_header+0x177/0x1152 [ 270.878281][T10640] ? ___ratelimit+0xf8/0x595 [ 270.882869][T10640] ? trace_hardirqs_on+0x67/0x240 [ 270.887890][T10640] ? pagefault_out_of_memory+0x11c/0x11c [ 270.893523][T10640] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 270.899357][T10640] ? ___ratelimit+0x60/0x595 [ 270.903939][T10640] ? do_raw_spin_unlock+0x57/0x270 [ 270.909056][T10640] oom_kill_process.cold+0x10/0x15 [ 270.914167][T10640] out_of_memory+0x334/0x1340 [ 270.918847][T10640] ? lock_downgrade+0x920/0x920 [ 270.923697][T10640] ? oom_killer_disable+0x280/0x280 [ 270.927796][ T3890] kobject: 'loop1' (000000004380c1f4): kobject_uevent_env [ 270.928893][T10640] ? __kasan_check_read+0x11/0x20 [ 270.936176][ T3890] kobject: 'loop1' (000000004380c1f4): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 270.941160][T10640] mem_cgroup_out_of_memory+0x1d8/0x240 [ 270.941174][T10640] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 270.941193][T10640] ? do_raw_spin_unlock+0x57/0x270 [ 270.967566][T10640] ? _raw_spin_unlock+0x2d/0x50 [ 270.972428][T10640] try_charge+0xf4b/0x1440 [ 270.976864][T10640] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 270.982417][T10640] ? percpu_ref_tryget_live+0x111/0x290 [ 270.987958][T10640] ? get_mem_cgroup_from_mm+0x16/0x320 [ 270.993416][T10640] ? get_mem_cgroup_from_mm+0x156/0x320 [ 270.998979][T10640] mem_cgroup_try_charge+0x136/0x590 [ 271.004271][T10640] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 271.010516][T10640] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 271.016143][T10640] __handle_mm_fault+0x1e34/0x3f20 [ 271.021244][T10640] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 271.026767][T10640] ? __kasan_check_read+0x11/0x20 [ 271.031773][T10640] ? do_raw_spin_unlock+0x57/0x270 [ 271.036867][T10640] ? trace_hardirqs_on+0x67/0x240 [ 271.041882][T10640] handle_mm_fault+0x1b5/0x6c0 [ 271.046635][T10640] __get_user_pages+0x7d4/0x1b30 [ 271.051556][T10640] ? mark_held_locks+0xf0/0xf0 [ 271.056327][T10640] ? follow_page_mask+0x1cf0/0x1cf0 [ 271.061545][T10640] ? __mm_populate+0x270/0x380 [ 271.066300][T10640] ? __kasan_check_write+0x14/0x20 [ 271.071396][T10640] ? down_read+0x109/0x430 [ 271.075800][T10640] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.082028][T10640] populate_vma_page_range+0x20d/0x2a0 [ 271.087470][T10640] __mm_populate+0x204/0x380 [ 271.092044][T10640] ? populate_vma_page_range+0x2a0/0x2a0 [ 271.097659][T10640] ? __kasan_check_write+0x14/0x20 [ 271.102753][T10640] ? up_write+0x155/0x490 [ 271.107066][T10640] ? ns_capable_common+0x93/0x100 [ 271.112076][T10640] __x64_sys_mlockall+0x473/0x520 [ 271.117084][T10640] do_syscall_64+0xfa/0x760 [ 271.121574][T10640] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.127446][T10640] RIP: 0033:0x459879 [ 271.131342][T10640] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 271.150926][T10640] RSP: 002b:00007f96b6b6dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 271.159314][T10640] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000459879 [ 271.167270][T10640] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 271.175221][T10640] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 271.183170][T10640] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f96b6b6e6d4 02:04:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mlockall(0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200a00, 0x0) clone(0x804400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) fcntl$getown(r1, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x500, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3000000010000108ae8bc38408000002000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800180000000000"], 0x30}}, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000000), 0x4) 02:04:20 executing program 5: open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 02:04:20 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="3100000000000000000009000000280003000800030000000000140002006c6f00000000000000000000000000000800010001000000617172d3d6def3363392e608c5718208ee88658436a8035bf72a226e35a499b130a7c88e59c42d8ed7d78973b74dde00a32d6068d5bf94d66acb2859e4dd6a253960524e0ff5cdc3b687959b3b1d9fee94769de6371c87943967644383f4caef249b3c704b8ecc75fd72dbeaa001001207b940ea0479c8e1bfbd2a6b85935c1e8195d8471d85175a"], 0x3c}}, 0x0) 02:04:20 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'fil%er\x00\x00\x00\x00\x00\x00\x00l\x00', 0xe, 0x2, 0x0, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[]}, 0x78) [ 271.191119][T10640] R13: 00000000004c5d72 R14: 00000000004da7f8 R15: 00000000ffffffff [ 271.209376][T10654] kobject: 'kvm' (000000007cb789b6): kobject_uevent_env [ 271.217020][ T3890] kobject: 'loop2' (0000000073647ecb): kobject_uevent_env [ 271.230510][T10640] memory: usage 307200kB, limit 307200kB, failcnt 270 02:04:21 executing program 5: open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 271.249913][ T3890] kobject: 'loop2' (0000000073647ecb): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 271.251445][T10654] kobject: 'kvm' (000000007cb789b6): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 271.263451][T10640] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 271.297234][T10640] Memory cgroup stats for /syz4: [ 271.297358][T10640] anon 305442816 [ 271.297358][T10640] file 0 [ 271.297358][T10640] kernel_stack 655360 [ 271.297358][T10640] slab 5378048 [ 271.297358][T10640] sock 0 [ 271.297358][T10640] shmem 0 [ 271.297358][T10640] file_mapped 0 [ 271.297358][T10640] file_dirty 0 [ 271.297358][T10640] file_writeback 0 [ 271.297358][T10640] anon_thp 270532608 [ 271.