e00a54713e64447ba540b8f9a86cb84a011904b65ee4819548758cd25d1c17b9778f153b9320250efb04718b2efee23d38b051df4ed60bb9774c2d50d233e8f2c46c79f52b1c5dd7b6a4eebd911ab5652bd0268ae01d267aef53240ab16b8098757fde47a16c4bbe63c24c30a0ecc87bf68ef716e09544e1dbd37be895518f687535b6a7e903aaba74e41af79f54cdd094b291549ef3d2053fc294dc0c4c2e212979c7ce99e428e3d45b5c2b6fc91828b9fd57b4ec6b6f7e23cadf964807c065b7109ac9f254b1e440692fd8eb93eb4f1f375caad50a273c8723b9d2751690609d70a7507909840573077cbeb7e1dc23d13afbcbe90221fba9eda6882778197414a03a51966277a84a141cdf715f58a7200d7399d53a323212679b5ba9f7d37ba06bcf1c123ed424c0de5d8e1ad2fb4d00d139f762475169b0ad9f19a951fc1c965ef6a253adbce7aec662245d52e1411604e9254ea34aa84d0c79741ad6c987fff81222bcee0c7ccbd1b439090db924b7c227dd2d45e9d62a97088023ef3baee41b56ec9efd727d3a0fd036fa46adfdf818c8bf2c6d1ecce11caafcce98cc2c25653bb4dedbe4f75aed2b3409c92a31f6a30f839bb277dfccb47a6292fbaef89064a9757d9c55ead6a35158f62f74876a9b6803132b40f34cbe00bcf51199ed3ed888daa68f1f0edbed95d49a9f7d284c180d8dcac8948cd2ddd4bdf95bf75c301da542cdf0cd867b50e0d7764fbd078e4b1d1548f85bd548abe19ec7bb6a393aacf5f37639924402071f2e491897bdbd550e8260051e88ca31fa2e88aaf8d93c2d6fdf48b9eed09e9f5b8baf45e3a069f306926616f38211127370b94a5fc14b7a862799932eeff9060621e0c320caa0f4be71074e7344f258a4114520b730a3dd0dbafd4244d4ea9c22278f161c745f45ea95b2aaa6e9c95760b27ae339726a721df3db7a34c571cfda3c1783fde7fc5bf02bc20556c45a8ef7dc9f9a61afb1c4eaa0efe760eb9208e51b5f6b779587878b9a0ac27e31be428be6ba7587f9bd21335116bdd5c5e767a59001b2f23eafc03d27ce78845ec160c9a210c8c0a69213e6a771f3bc78d82ef944870184b14987d281ae3d6ef1514ae728ef36b5741829051f7a0aecac4e6874dd32b30a79708757cb0d9d762977bbd99444e979353e54b5878bf40a919046f0a21054deca0427f958d16aa598ce452782f3b8c9f840a4549d04ddbf4d963de1e4d011e18fdecf145b51cbc541479451a019b44ec1266000c0bfeb7334235fd6bee4407dc801edc460024ebc057279a5cb797b32b2c355f83e337f8255b02b8bbe155c245f8753a76ca7262281d1eb43e512d10bfde01e7ebd09de7222a60eb800ea58bf1961e99217f6c9cd8b729a89190a8b1a6bb0de741a878d4fb8419e89763d6873800275e05fbe258ac6d292646428ddef17a3eb851bf3b37fdf4bfc94c37b4b0ab749a1978259f9c3792d42919c30360a2525e2fd502e04184594a2a3dd4863be200f803c183acb0e295a4f1579eecca049520961fe4a2c9c42171d807423c201c54d4be270402080dd7f64f4fa0e17b10ee7a97ab7599ef120e9af1c9dc2a0b048336dc99d9560b2f7e987cca9a04a5b2c3cc4c28a94e41fc74866c2aab8b161fc2624e270c5ce744d761d7e5f69dd19b9f571bd1d19f12f4a94de0555015d1baca5d9f85e5536f1936823ac4508652d7fca0d7b30ffd6062b97d80d24b8439bace2ae8f75fb7d23747b5a100d21918962f67fa48f6a4baea82794b2083f16ff69b19b6436b53e77091fa241045976daedf22079bbd9f2fafc96acde7bf826c5db63940747115a87ca5e33c9345ddceabc7c34428769bad56572126de0f7b7db81bca17d0812ac35d69820995e52d05d7b4142d142d61080e590ffdf273cd0fb40198f213076de7b6db2d0bfa13cf468a3d923e364740c99590c78b98bfb82c8fa86ba3b18e4c890426bc0d80bd48824d871387d33a8720cf1606e64ff6caac3dbb3849fc0180b1d877321fb078431e69050dbac7e74d060048476cf8eb438971dd1eeca8e87cf89ed8fbc50f91ddb556c40fa770d3c147497c15a188c66f9f50c4ede68ccfcb5175dcfe97826e8f704c21cf37f3f616ea146d45218f44d9f699b40caefb6de16412121dd503b8371d9c2cfa9d9a7a637842734ab6056508dc65231998d10d20c84ccd7ea91e15cf414b5e9d2410115937d2dd91634b39d1cf65ca61e4c3951274657f00b2b687c02138c6020bc0485525487651196d6b6d6506ff121a29f7850d75377f56408051be8af2b9eab24f3e6bdb75a57a42afc37bba24570b63d5e4775c6ab9e04f9c205a7feed840a591d0d0e34f51fae206f92a83468ad50a7fea6ab674075d853cc0ce415d51582e9fcb45d249503961ec9960723dc335bfcaef5addf798960cd9665377ec74ca6242d78e0639cac5a23a9ce2388ca0a980c6def0c6e2f9e03c8d6b22621c10158fdb11c8c6fb4829430d85ae33ae6ff64450de5bc276442b172d157495f0cfdd809a80d50e5ff272261989f1e7f9cc8082edea7dafc5ae0e078cb8e0d805facca8ce6e8281c94e50f4a34f8a1075479584c7e3907f887e9136655267feccc5a9db6750fdf7decb2136a8f6b7bc517d45771430c6b7429b615f04d91b452806aed7c82634d7e0056615c3edaf74c3332d5bc7f7ba11bfb238bf207d6f427e688081ff833acf7d9098f0ca19d9754905a9c2cf552e396559e7df0f0cd0de97739f026c87f9c3c671fad0524c74cfda50655f9b868220ff554b4d3133239e057cf97cff9385eaa4823056c406f6fce38f2659aecbdbb5c2464a83eabcea694c1373e408e7ae06ccc849d60639a9dd9b660d17108ce940f81af8a287"}}}, @m_sample={0x24, 0x19, 0x0, 0x0, {{0xb, 0x1, 'sample\x00'}, {0xc, 0x2, 0x0, 0x1, [@TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0x4}]}, {0x8, 0x6, "03cedfb5"}}}, @m_ct={0xfc, 0x15, 0x0, 0x0, {{0x7, 0x1, 'ct\x00'}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_NAT_PORT_MAX={0x6, 0xe, 0x4e23}, @TCA_CT_MARK={0x8, 0x5, 0x7f}, @TCA_CT_NAT_PORT_MAX={0x6, 0xe, 0x4e22}]}, {0xd3, 0x6, "d96dc592e4b7ef17c0db8c733a01f8a0c767e03e3f5ec1d7bbf89072025589247ce505380e12e8433fb4ffca98a222fd7291efe33aa3632c169473e8bad030461fb1ec519f7855c6f117f59ea58b7fc6524d7512cff0b19d96877afd31421db27b2111d66789c403b49d0662f8c57997fa11acee47f610dfcf6177efefa485d1cc761e85e4d42335b82a7eae2a07bd28517c144031f4211ef3ce729e220e2a4d8596d57b062ff394ace3555e3391327ce53be79e2c77752801cdeb34d63b9fee177dae2e72c77e3fba9c8b995878cf"}}}]}, @TCA_CGROUP_POLICE={0xc6c, 0x2, [@TCA_POLICE_RATE={0x404, 0x2, [0x7, 0x2, 0x2, 0x1, 0x7, 0x6, 0x1, 0x0, 0x80, 0x2, 0x4, 0x10000, 0x9, 0x3, 0x3, 0x2, 0x10000, 0x7fff, 0x10001, 0xfffffffb, 0xd89, 0xffffffff, 0x2, 0x5e, 0x65, 0x2, 0x40000000, 0x7, 0x80000000, 0x2, 0x80000001, 0x5, 0x10000, 0x7, 0x5, 0x3, 0x8a1d, 0x100, 0x20, 0x8, 0x20, 0x10001, 0x1, 0x5, 0x6, 0x7fff, 0x7, 0x0, 0x1, 0x1458, 0x6, 0x7fffffff, 0x80000000, 0x7, 0x100, 0x0, 0x1, 0x7fff, 0x0, 0x6, 0x101, 0x2, 0x8, 0x0, 0x0, 0x3, 0x1, 0x1, 0x4, 0x401, 0x1ff, 0x2, 0x1, 0x3, 0x5, 0x4, 0x2, 0x8, 0x1000, 0xffffffff, 0x1000, 0x7, 0x5, 0x7f, 0x6d86, 0x5, 0x9, 0x0, 0xffff, 0x40, 0x6, 0x1, 0x1, 0x6, 0x2, 0x7, 0x0, 0x7d, 0xffffffff, 0x20, 0x101, 0x7, 0x5, 0xce, 0x7, 0x652, 0x20, 0x10000, 0xfcbe, 0x3e6b, 0x2, 0x5, 0x2, 0x7f, 0x1, 0x5, 0x7, 0x400, 0x22, 0x8, 0xf94d, 0x5, 0x80, 0x5a2d, 0x0, 0x7, 0x7, 0xffff4cf3, 0x6, 0x3, 0x6fa, 0x3, 0x3, 0x7, 0xffff7321, 0xea0, 0x2, 0x974, 0x4, 0xdf3, 0x9, 0x10000, 0x7, 0x8, 0x7, 0xffff, 0x3, 0x20, 0xfff, 0xffff, 0x400, 0x7, 0x9, 0xdbee, 0x4c, 0x9, 0x81, 0x6c, 0x9, 0x1f, 0x401, 0x9, 0xfff, 0x8, 0x80, 0x9, 0x5, 0x10000, 0x3000, 0x100, 0x7fff, 0x40, 0x8000, 0xffffffff, 0x1f, 0x5, 0x4, 0x20, 0x401, 0x8, 0xdd8, 0x3f, 0x9, 0x2, 0x0, 0xff, 0x3e000000, 0x10001, 0x2, 0x1, 0x1, 0x7, 0x80000000, 0x36d9, 0x7c2f, 0x10001, 0x4, 0x80000000, 0x7, 0x5, 0x6, 0x3, 0x672, 0x7f, 0x1f, 0x880e, 0x3, 0x460d36cc, 0x3, 0xff, 0x8, 0x0, 0x3, 0x101, 0xa0, 0xf91, 0x10000, 0x400, 0x6, 0x800, 0xa38, 0x80000001, 0x9, 0xcd, 0x1, 0x20, 0x296b, 0x6, 0x1, 0x101, 0x2, 0x1, 0x6, 0x5d, 0x9, 0x69, 0x9, 0x6, 0x8, 0x5, 0x8, 0x4, 0x0, 0xff, 0x6, 0x20, 0x3, 0x3f, 0x81, 0x94, 0x4668, 0x68d4, 0x8, 0x6, 0x2000400, 0x20]}, @TCA_POLICE_RESULT={0x8, 0x5, 0x5}, @TCA_POLICE_TBF={0x3c, 0x1, {0x2, 0x7, 0x5, 0x3ff, 0xfffffffa, {0x6, 0x0, 0x2, 0x2, 0x5, 0x47}, {0x6, 0x0, 0x20, 0x0, 0x1f, 0x1bc}, 0x2, 0xffffffff, 0x200}}, @TCA_POLICE_RATE64={0xc, 0x8, 0x3f}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x8, 0x1, 0x7, 0x2cb, 0x7f, 0x1, 0x0, 0x2, 0xfffffffc, 0x0, 0x0, 0x0, 0x30000000, 0x20, 0x3, 0x8000, 0x6, 0xb7, 0x9, 0x3, 0x800, 0x34b7, 0xff, 0x1ff, 0x1, 0x3, 0xffffffe1, 0x7ff, 0x8eb, 0x6, 0x9, 0x81, 0x8, 0x0, 0x1, 0x9, 0x7, 0x1, 0x7, 0x9, 0x400, 0x0, 0x101, 0x3, 0x4, 0xf2, 0x6, 0x3b, 0x8, 0xa68, 0x80, 0x0, 0x0, 0xfa6c, 0x7, 0x9, 0x6, 0x5, 0x922f, 0xb9e, 0x5, 0x9, 0x18a, 0x7, 0x7, 0x6, 0x6, 0x7fffffff, 0x101, 0x80000001, 0x3, 0x7fff, 0x400, 0x9, 0xb20, 0x32dd8248, 0x5, 0x8, 0x6, 0x2ee, 0x3f, 0x7, 0x4, 0xffffffff, 0x3, 0x0, 0x1f, 0x1, 0x80, 0xff, 0x40, 0x8, 0xffff, 0x6, 0xdf75, 0x5, 0x2, 0x0, 0x24b1, 0x6d, 0x7fffffff, 0x100, 0x3ab, 0x80000000, 0x9, 0x14, 0xfffffffd, 0x4, 0x1, 0x3, 0x0, 0x7, 0xfffffffb, 0x86, 0x1, 0x8000, 0x6, 0x6, 0x2, 0x3ff, 0xffffff7f, 0x100, 0x80, 0x2, 0x3, 0x3ff, 0x2, 0x0, 0xfff, 0x3, 0x8, 0x65cc, 0x7, 0x9, 0x1f, 0x4, 0x4, 0xfffffffd, 0x1, 0xe0, 0x7, 0x9fc, 0x81, 0x5, 0x10000, 0x3, 0x5, 0x5, 0x401, 0x80, 0x8000, 0x5, 0x6, 0x3, 0x8, 0x7f, 0xff, 0xffffffff, 0xe2d, 0x6, 0x0, 0x401, 0x3, 0xfffffff7, 0xffffff76, 0x8, 0x5, 0x200, 0x800, 0x2, 0x7, 0x2, 0x4, 0x523, 0xffffff08, 0xba79ceb, 0xccac, 0x1, 0x3, 0x7, 0xcd4d, 0x80, 0xd926, 0x1f, 0x0, 0x3ff, 0x2, 0x7, 0xfcc, 0x6, 0x8, 0x5, 0x2, 0x1ff, 0x100, 0xffff, 0x2, 0x80, 0x1f, 0x1, 0x5, 0x9, 0x9, 0x7d1, 0xf7, 0x6, 0x7, 0x11, 0x7f, 0xba, 0x0, 0x1, 0x1, 0x1, 0x5, 0x80000000, 0x6, 0x7, 0x1, 0x4, 0x0, 0x0, 0x3, 0xd62, 0x2, 0x5, 0x401, 0x5, 0x9, 0x800, 0x80000001, 0x800, 0x100, 0x3, 0x7, 0x9, 0xc0000000, 0x7201573c, 0x4, 0x10001, 0x6, 0x6, 0x80000000, 0x230, 0x80000001, 0x4, 0x2, 0x7, 0x1000, 0x5, 0x7, 0x7fffffff, 0x200, 0x4, 0x1, 0x200]}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x2}, @TCA_POLICE_RATE={0x404, 0x2, [0x4, 0x6, 0x4, 0x1, 0x10000, 0x8, 0x401, 0x9, 0x10001, 0x2, 0x7, 0xffffff01, 0x101, 0x2, 0x4, 0x8, 0x10000, 0xcc, 0x0, 0xa5, 0x0, 0x8001, 0x10001, 0x0, 0x400, 0xffffff13, 0x0, 0x6e1e761b, 0x2, 0x0, 0xf27, 0x81, 0xfa, 0xfff, 0x0, 0x2, 0xcc, 0x8, 0x2, 0x0, 0x8, 0x7695, 0x6, 0xdfd, 0x7, 0x5c9d, 0x3, 0x52, 0x7a151b4f, 0x0, 0x5, 0xffffffff, 0x2, 0xfffffffc, 0x8001, 0x8000, 0xd1, 0x6, 0x7, 0x8, 0xf73, 0xf6d, 0x9, 0x9, 0x0, 0x2, 0x2, 0x1, 0x6a, 0x3, 0x1, 0x7, 0xff80000, 0x9, 0x820, 0x8, 0x7, 0x3e, 0x0, 0x9, 0x7f, 0x3, 0x1, 0x8, 0x1, 0xfff, 0x2, 0x2, 0x7, 0x1aeb, 0x7fffffff, 0x1, 0xfff, 0xfff, 0x6, 0x8, 0xffff, 0x200, 0xfe, 0x2, 0x1, 0x5, 0x5, 0x8001, 0x2, 0x6, 0x2, 0xffff, 0xffffffff, 0x7, 0xac5a, 0xcf, 0x3ff, 0xffffffff, 0x8, 0x80000001, 0x200, 0x20, 0x2, 0x1f, 0x8001, 0x8, 0x8, 0x3f, 0x2, 0x4, 0x4, 0x6, 0x2, 0x5, 0xffff0001, 0x7, 0x81, 0x2, 0x9, 0x80, 0x6, 0x1, 0x4c, 0x331c, 0x80000001, 0x2, 0x0, 0x7fff, 0x1, 0x5, 0x1000, 0x2, 0x7, 0xb19, 0x80000000, 0x3ec2830d, 0x9, 0x20, 0x7, 0x4, 0x10000, 0xe129, 0x2, 0x5, 0x6, 0x9, 0x3, 0x6, 0xfffffff8, 0x5, 0x1000, 0xf50000, 0x3, 0x0, 0x0, 0x800, 0xfff, 0x8001, 0x4, 0x3f, 0xe806, 0x1f, 0x1, 0x7, 0x1, 0xfffffffd, 0x5, 0x1, 0x9, 0x5, 0x198, 0xffff8000, 0x40, 0x25c, 0x2, 0x6, 0x5, 0xfffff000, 0x100, 0x1f, 0x80, 0x7, 0x400, 0x4, 0x0, 0x9, 0x4, 0x9, 0x400, 0x5, 0x1, 0x0, 0xea4d, 0xfffffff8, 0xff, 0x3, 0x6, 0x101, 0x400, 0x9, 0x5, 0x0, 0x0, 0x6, 0x5, 0xe3c, 0xe14b, 0x2, 0xffff, 0x0, 0x1, 0x0, 0x400, 0x3, 0x5, 0x0, 0x2, 0x6, 0x2f3, 0x6, 0x3, 0x1000, 0x7fff, 0x101, 0xb9, 0x20, 0x0, 0x3, 0x38, 0x7, 0x3, 0x20, 0x1, 0x2, 0x6, 0x7fffffff, 0x800, 0x572c, 0x40, 0x80000001]}]}]}}]}, 0xa354}, 0x1, 0x0, 0x0, 0x11}, 0x4040040) 07:34:08 executing program 3: getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x0, @dev}}}, 0x0) r0 = add_key(&(0x7f0000000000)='blacklist\x00', 0x0, 0x0, 0x0, 0x0) r1 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="0c417e6ce7838595cfa349d6fb4f77c6ca7f78aa5505ade07fee577d8bf3eb2f198a7c6868e0601454944d10e0a4baf162ca81a9182b2e35019cbd87f35e384db4a2595b88ecf168b9259d077bed41c092a0d772b65a832606bc03b9e8b9", 0x5e, 0xfffffffffffffff8) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffe58) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f00000007c0)={0x990000, 0x3ff, 0x1ff, 0xffffffffffffffff, 0x0, &(0x7f0000000580)={0x990a95, 0x0, [], @value=0x9}}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000840)='nl80211\x00') r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffe58) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f000001d080)={&(0x7f0000000100)={0x20, r7, 0x709, 0x0, 0x0, {}, [@NL80211_ATTR_WDEV={0xc}]}, 0x20}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(r5, &(0x7f0000001bc0)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x10004800}, 0xc, &(0x7f00000009c0)={&(0x7f0000000a40)={0x1154, r7, 0x8, 0x70bd29, 0x25dfdbfc, {}, [@NL80211_ATTR_FTM_RESPONDER={0x108, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_LCI={0x102, 0x2, "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"}]}, @NL80211_ATTR_P2P_OPPPS={0x5, 0xa3, 0x1}, @NL80211_ATTR_IE_PROBE_RESP={0x888, 0x7f, "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"}, @NL80211_ATTR_IE_RIC={0x70d, 0xb2, "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"}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xffff, 0x2}}, @NL80211_ATTR_BEACON_TAIL={0x81, 0xf, "acfed52da374028406431784aaafe7641b1f3f2b10d7a6947898e27cdbfaad2fe896f93719c6fc339988f44f64cd812915f3e63ed2a8386f065cfc590d70a582ea9e1c921eddb0149bb40ecf4b51cf324f875de1c5e7f1c089e8eca01b21f55e205674ca9959ea58baa0c6e1ec41895a908d5af463c66350108131fca8"}, @NL80211_ATTR_P2P_CTWINDOW={0x5, 0xa2, 0xc6}]}, 0x1154}, 0x1, 0x0, 0x0, 0x4040084}, 0x20000000) r8 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001c00)='/dev/dlm-monitor\x00', 0x2, 0x0) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r8, &(0x7f0000001d00)={&(0x7f0000001c40)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000001cc0)={&(0x7f0000001c80)={0x40, 0x1405, 0x526, 0x70bd29, 0x25dfdbfc, "", [{{0x8, 0x1, 0x1}, {0x8, 0x3, 0x1}}, {{0x8}, {0x8}}, {{0x8, 0x1, 0x2}, {0x8, 0x3, 0x2}}]}, 0x40}, 0x1, 0x0, 0x0, 0x8044}, 0x14) sendmsg$NL80211_CMD_NEW_MPATH(r3, &(0x7f0000000940)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000900)={&(0x7f0000000880)={0x38, r4, 0x400, 0x70bd27, 0x25dfdbfe, {}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x45) r9 = add_key(&(0x7f00000006c0)='ceph\x00', &(0x7f0000000700)={'syz', 0x2}, &(0x7f0000000740)="454daa21a4b5f6de00fbf3c6b0574c5289e3511c0ef9ec1b6843e15af74c60c7592446bfca8dbe4556ba2d3d67abbe33c60faf6f9cc6e3e146466ad6", 0x3c, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000780)={r0, r1, r9}, 0x0, 0x0, &(0x7f0000000a00)={&(0x7f00000008c0)={'sha3-224-ce\x00'}, &(0x7f0000000900)}) r10 = request_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000200)=',\x00', r9) r11 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001d40)='/dev/vcs\x00', 0x20000, 0x0) r12 = socket$nl_generic(0x10, 0x3, 0x10) r13 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r12, &(0x7f0000000140)={0x0, 0x0, &(0x7f000001d080)={&(0x7f0000000100)={0x20, r13, 0x709, 0x0, 0x0, {}, [@NL80211_ATTR_WDEV={0xc}]}, 0x20}}, 0x0) sendmsg$NL80211_CMD_NEW_MPATH(r11, &(0x7f0000001e40)={&(0x7f0000001d80)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000001e00)={&(0x7f0000001dc0)={0x40, r13, 0x4, 0x70bd2b, 0x25dfdbfd, {}, [@NL80211_ATTR_MAC={0xa, 0x6, @dev={[], 0x34}}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x3f}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x40}, 0x1, 0x0, 0x0, 0xc4}, 0x20048040) r14 = add_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000300)={0x0, r10, r14}, &(0x7f0000000340)=""/213, 0xd5, &(0x7f0000000540)={&(0x7f0000000440)={'sha384-avx\x00'}, &(0x7f0000000480)="f02ae49790f67403c29c100e1b5b6778237d1c1d25da272343348772758411d6801bbf532d09094ec7265a88da5589f1115a4bc21e4a66ec593a30e4b2656f49430de233ec0ce47aef30ee2dfc1f1b973b7a0a7faf7ad40ff2068f2080e8abbeb75a935dfbc2a4daced7ab4c3ffea84159f6deaef0b348fd3fed9450ef5c850924361eb8f3ffd31e0bd7e84c1ea88c163a0845cfb761053c2b33268249cf2e96c9bad0932476e0df5c609b1bf00848be32e0ce2615aac180087c492cbc8d", 0xbe}) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x103, &(0x7f0000000040)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}, {&(0x7f0000000240)="2e1d6e", 0x3, 0xcd}], 0x0, 0x0) [ 1215.156265] xt_dscp: dscp 81 out of range 07:34:08 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000100)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x3, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x9, 0xffffffff}, 0x0, 0x8, 0x0, 0x1, 0x0, 0x5, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x3) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f00000006c0)) io_submit(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f00000002c0)={0xffffffffffffffc1, 0x7b, 0x2}, 0x7) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000001200)={0x1f, 0x2, @any, 0x8}, 0xe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) r4 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000080)={0x1b, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="98c92be438045204630440000000000e630c400000000000000000"], 0x0, 0x20000000, 0x0}) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000080)=@assoc_value, &(0x7f00000000c0)=0x8) [ 1215.282473] could not allocate digest TFM handle sha3-224-ce 07:34:08 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="340100001000010800"/20, @ANYRES32=0x0, @ANYBLOB="200000000000000008000400", @ANYRES32=r6, @ANYBLOB="1400030076657468315f746f5f62726964676500050021000300000024002b8008000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="080003000000000008000100", @ANYRES32, @ANYBLOB="08001b0003000000240024006512da13406fe15c29f5d228c5792f40ff6af4c62ffe60880a2390cdc33e80ff1400030076657468315f6d6163767461700000007c003480140035007465616d5f736c6176655f31000000001400350076747468315f746f5f68737200000000140035007663616e3000000000000000000000001400350076657468305f766972745f77696669001400350073697430000000000000000000000000140035007767320000000000000000000000000008002e00080000000500100084000000"], 0x134}, 0x1, 0x0, 0x0, 0x800}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@rand_addr="17464d91ad901e865855e4bec5389c21", r6}, 0x14) write$selinux_context(r2, &(0x7f0000000340)='system_u:object_r:apt_var_cache_t:s0\x00', 0x25) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) fcntl$setown(r7, 0x8, r0) setsockopt$MISDN_TIME_STAMP(r3, 0x0, 0x1, &(0x7f0000000240), 0x4) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, 0x0, 0x20000000) r8 = open(&(0x7f0000000040)='./bus\x00', 0xc007e, 0x0) write$binfmt_aout(r8, &(0x7f0000000100)=ANY=[], 0x49f) fanotify_init(0x40, 0x101000) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f00000002c0)={0x2, 0x5227d134, 0x9, 0x3}, 0x10) sendfile(r8, r8, &(0x7f00000001c0), 0x8080fffffffe) [ 1215.662343] A link change request failed with some changes committed already. Interface veth1_macvtap may have been left with an inconsistent configuration, please check. [ 1215.878648] binder: 11037:11045 unknown command -466892392 [ 1215.884687] binder: 11037:11045 ioctl c0306201 20000080 returned -22 [ 1216.219134] could not allocate digest TFM handle sha3-224-ce 07:34:09 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) prctl$PR_SET_FPEMU(0xa, 0x5) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) write$binfmt_aout(r1, &(0x7f0000000180)={{0x108, 0x2, 0x5, 0x94, 0x20b, 0x9, 0x115, 0x7}, "70d6107e666808a794e2fb2c3cc2cf5e85007791f4de5ddb56498bf88e9feac5ad064e17f95a54b591b33fcd00aed4acb91e5fd7b443fca57c1667e63faa0f811db55b5843cc7b114019823a73a322d36af92a3574bce93cad136ad340def2c93a87f4526aa81938dfbb02a0ac5003b7500e4eac320f2b66b906b9cbb4f0c4fe3cab553314c4bcc3724dfe3601b28c7fc6c4bad66b2218c820f967428b241784abcfaf0096b00260a2bae510cf9f1e6be034ef83d835c6bfcf48af4787ba8710cf1081a6cd407b09135b9c6077", [[], [], [], [], [], [], []]}, 0x7ed) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f00000011c0)={@void, @val={0x9}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0xf98, 0x3a, 0x0, @remote, @mcast2, {[], @param_prob={0x3, 0x0, 0x0, 0x0, {0x0, 0x6, "6595c3", 0x0, 0x0, 0x0, @mcast2, @mcast2, [@routing={0x29, 0x2, 0x0, 0x0, 0x0, [@empty]}, @routing={0x0, 0x10, 0x0, 0x0, 0x0, [@remote, @rand_addr="ecec0a6b1583f5639eba95188465897c", @local, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @mcast1, @ipv4={[], [], @broadcast}]}, @hopopts={0x0, 0x1c6, [], [@calipso={0x7, 0x40, {0x0, 0xe, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, @generic={0x0, 0xded, "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"}]}], "4011c6ed3ec831c0a859df4fd6a1cf59a90c42b433580b288a28728fb104cc462f4e92a1a4d50c2d9d75ce8b5ae9b1d6e9a4a79cae905957835e850585441d5cb5c76b06ad60a5a9003ebacf0d40fb6c636fd81af39f9d170ef5af99cd3e3e7ff54f71ca5d83d2b122ebbbc1333a2c811bc4095b572ebbcb83561044b2794ae54b33e99f48eac0eb"}}}}}}, 0xfca) 07:34:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000fbbdc4e9984028d92de70f8bb43fb15052afded4730adcf2d81eed5e47466774604ffe81dcc8adb22722e4399245e3c6baa33ac8a1a6ef90540bb2b8b644253a380c9de196c0a65a18e88d4f1a05b450367f065c16071d005f0620e196db00fb89dd86a3404f38124062140b281433775be5b34f16c78f11e6cb7ca274a2c6cb88361cd11423a412d7c259f425188150be183d296e1304ef1c6254e909565420cd2abd3ec3e82658d1c1952e591d4715e0", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={r4, 0x74, &(0x7f00000001c0)=[@in6={0xa, 0x4e21, 0x5, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x9}, @in6={0xa, 0x4e20, 0x80000001, @loopback, 0x1}, @in6={0xa, 0x4e23, 0x4, @dev={0xfe, 0x80, [], 0x33}, 0x400}, @in={0x2, 0x4e24, @empty}, @in={0x2, 0x4e22, @multicast2}]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000240)={r5, 0x1b3}, &(0x7f0000000280)=0x8) r6 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r7, 0x8982, &(0x7f00000002c0)) listen(r0, 0x1) r8 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300)='/dev/cachefiles\x00', 0x440, 0x0) setsockopt$inet_opts(r8, 0x0, 0x9, &(0x7f0000000340)="2a6aaf012846835e1bf01cce3c8aeecf93f8a5a3b462c3df2b7651538e88826656558fd3b3e62790361692e75772bad44416c24c154737e3b323ae25e85a46b767fa6bd7c1d04969b68d8e7c7772c68991f137e566eea12f8133588950d02f32bdf47bab5c60e90ac97d0f7d5c2e43bbdcb1a46cd730da1c2e58c1c26600f5c509c239894c16791c3b8ba42dab750f41fff300861ce10a9798d8f34cfa8fe87c04b54749fa3133edaf9c84aa90cd4e1908ed414716c0d614bc8399a3", 0xbc) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "200001", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0xb6, &(0x7f0000000580)={@local, @remote, @void, {@generic={0x9, "c21b6ee0853a7c152663760b02810c9a844deb9b8f767b82fd89de89199a4e0bf9d27e9a3724a49a0eca89a8feffda38f08c7e075a82dd124681a3ca55ea77dd8ae562847a68b4ff8ef899e0cbb5f29c2012d5daf38accd1b12ec5f69f70b01b30c1d0c41155a16a76fa4487c492837dd91b1bacd2471a31eee88c891bd2da2cb3a56186f0228691f359541387c2141a58dbb9ef57f73c6bd27e00"/168}}}, 0x0) 07:34:09 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000480)="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", 0x1000, 0xfffffffffffffffd) keyctl$setperm(0x5, r0, 0x40000) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r2 = accept(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000040)={0x0, 0xfffffffffffffefb, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) sendmsg$BATADV_CMD_SET_MESH(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001480)=ANY=[@ANYBLOB="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"/498, @ANYRES16=0x0, @ANYBLOB="000227bd7000000000000f0000000500330000000000"], 0x1c}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:34:09 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) sendmsg$NLBL_CIPSOV4_C_LISTALL(r1, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="010220f5", @ANYRES16=0x0, @ANYBLOB="00e6ff0000000000000004000000"]}, 0x1, 0x0, 0x0, 0xc850}, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f000002eff0)={0x0, 0x0}, 0x10) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000140)={'team_slave_0\x00', 0xfffffffc}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000080)=[{&(0x7f0000000180)="bad75e693175ff4ccfc4", 0xff4a}, {&(0x7f0000000300)="76df8cfefa7ddac22dcfcf9e000ca94f344e4dd28a9ec9014befb0ea01a514ea8c7c66e5e88e77a778affc2a2030f7fbfa96fe6c14a0c75aee26637a81e3bcb693e7513645eb550c7adad4103ebae473f42372227fa39722490bdd9f2774cffe4bd03c9975ba4b0cc3d7c3788e745965108c630cc26d19369cc660d3ccbf2feaeb4603347ab0c8dd0fd14bd500000000000000", 0xffffffffffffffb6}], 0x1, 0xb) close(r5) splice(r4, 0x0, r5, 0x0, 0x100000000, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r6 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r6, &(0x7f0000000080)='threaded\x00', 0xfffffe58) ioctl$DRM_IOCTL_MODE_GETGAMMA(r6, 0xc02064a4, &(0x7f0000000480)={0x145b8000, 0x3, &(0x7f00000003c0)=[0xffe0, 0xfff8, 0x400], &(0x7f0000000400)=[0x2, 0x7], &(0x7f0000000440)=[0x2]}) ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$char_usb(0xffffffffffffffff, 0x0, 0x0) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/btrfs-control\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r8, 0x29, 0x1, &(0x7f0000000500), 0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r7, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @ipv4={[], [], @loopback}, 0x2}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1216.695835] Process accounting resumed 07:34:10 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000040), 0x8) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000080)={0x5, 0x8, 0x4, 0x24672d08, 0x84, {0x0, 0x2710}, {0x5, 0xc, 0x1, 0x1f, 0x8, 0x0, "371cdda9"}, 0x3ff, 0x3, @userptr=0x20, 0x5, 0x0, r0}) write$tun(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x412) 07:34:10 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[@ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRES16, @ANYRESHEX=r2, @ANYRES64=r0]], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r5, 0x107, 0xe, &(0x7f00000001c0)=0x1000006, 0x4) close(r2) socket$key(0xf, 0x3, 0x2) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) r7 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socket(0x1d, 0xa, 0x3f) write$cgroup_type(r7, &(0x7f0000000080)='threaded\x00', 0xfffffe58) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000040)='eth1\x00') write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) 07:34:10 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000040), 0x8) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r2, 0x10, 0x70bd28, 0x25dfdbfe}, 0x14}}, 0x20004000) 07:34:10 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x37, 0x10, 0x0}, 0x78) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffdfe, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000000)={0x0, 0x102000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f0000000280)="0f01c92e0f00106626dd7e0066b88c000f00d0c4c301688079670000bdb97b080000b8b1bae9baba000000000f304366b8819c0000d00f01c966b80701c4e17458a4b5e0000000", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="0300050000000100001400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 07:34:10 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) getsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000000), &(0x7f0000000080)=0x4) connect$bt_sco(r0, &(0x7f0000000040), 0x8) [ 1217.320442] syz-executor.4 (11063) used greatest stack depth: 22368 bytes left 07:34:10 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x0, 0x0) socket(0x1e, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r3) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x3f7, 0x300, 0x70bd28, 0x25dfdbfb, {0x7, 0x7, './file0', './file0'}, ["", "", "", "", "", ""]}, 0x28}}, 0x20000000) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) [ 1217.401579] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 07:34:10 executing program 2: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) getpid() sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=@newtaction={0x2c, 0x30, 0x0, 0x0, 0x0, {}, [{0x18, 0x1, [@m_ife={0x14, 0x0, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x4}, {0x4}}}]}]}, 0x2c}}, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0), &(0x7f0000000100)=0x20) r2 = getpid() r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) preadv(r3, &(0x7f0000001580)=[{&(0x7f0000000040)=""/145, 0x91}, {&(0x7f00000016c0)=""/191, 0xbf}, {&(0x7f00000001c0)=""/253, 0xfd}, {&(0x7f0000001a00)=""/4073, 0xfe9}], 0x4, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3f, 0xe4ac, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7f}, 0x230, 0xe0c, 0x0, 0x4, 0x6, 0x20000, 0x4}, r2, 0x0, r3, 0x0) sched_setattr(r2, &(0x7f0000000180)={0x38, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r4, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) tee(r4, r4, 0x7, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000236fc8)=[{0x8004000, 0x0, 0x0}], 0x1, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="000000001000"/20, @ANYRES32=0x0], 0x2}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c80, 0x0) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet6_tcp_int(r6, 0x6, 0x19, &(0x7f0000000280), 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv_slave_1\x00'}) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, 0x0) r7 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r7) [ 1217.464687] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1217.493630] loop1: p2 < > [ 1217.577682] device bridge_slave_0 left promiscuous mode [ 1217.642413] bridge0: port 1(bridge_slave_0) entered disabled state [ 1217.672255] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 07:34:10 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000400)='/dev/vcs#\x00', 0x736b, 0x200000) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r1, &(0x7f0000000040), 0x8) ioctl$SNDRV_PCM_IOCTL_WRITEI_FRAMES(0xffffffffffffffff, 0x40184150, &(0x7f0000000000)={0x0, &(0x7f0000000080)="ade6044cbdb13614f748be7e8311ddd5c7fce6e898746b632763684ca33dd6a8dad0a87d729c59121b0e56c199f8398ea0fafb1b034aa647269d38c611025ac2a475b074691d838c5a800f46cfa62c64f003329376a55bb0e12b67a6e121d68533c9bdbc353777dede77741a2f1cc83d5118587a115e63d9038ea221040d757ef4713f930f123305b733c1c988db5aee06c4789cc62565d15126bcfc7bfcbd14a3da6437cebd319d43e194e5bce6204b5f6be48c414e9c0c4ad821cf61ebb13ffb94f22a049fc6c6e6cb37238c36da5e5f02f023ba93694a728e10906737bc2b3bcb9b89f5eb071e1410eb57342a", 0xee}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x101881, 0x0) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x7fff) ioctl$VIDIOC_SUBDEV_S_SELECTION(r3, 0xc040563e, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x2, {0x8b, 0x800, 0x0, 0x7}}) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r3, 0x4020565b, &(0x7f0000000340)={0x800100d, 0xfffffffd, 0xc694218b881d1a22}) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f0000000440)={'filter\x00', 0x0, 0x3, 0xd9, [], 0x0, &(0x7f00000001c0), &(0x7f0000000200)=""/217}, &(0x7f0000000380)=0x78) r4 = socket$pppl2tp(0x18, 0x1, 0x1) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) connect$pppl2tp(r4, &(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, r5, {0x2, 0x4e21, @multicast2}, 0x0, 0x2, 0x3, 0x1}}, 0x2e) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/asound/timers\x00', 0x0, 0x0) r7 = getpgid(0xffffffffffffffff) mq_notify(r6, &(0x7f0000000800)={0x0, 0x3c, 0x1, @tid=r7}) [ 1217.699499] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1217.725606] loop1: p2 < > 07:34:11 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffe58) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x101302, 0x0) connect$bt_sco(r0, &(0x7f0000000080), 0x8) 07:34:11 executing program 4: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0xb5, 0x0, 0x0, 0x100}]}) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x50001, 0x0) getsockopt$inet_buf(r3, 0x0, 0x11, &(0x7f0000000300)=""/4096, &(0x7f0000000180)=0x1000) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f00000001c0)={{0x0, 0x0, @descriptor="1049e3ccab0ec1d8"}}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="680000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000400012800b00010069703667726500003000028006000f00ff07000008001500c0fa020008000100", @ANYRES32=0x0, @ANYBLOB="14004460ff01000000000000000000000000000108000300", @ANYRES32=r2, @ANYBLOB], 0x68}}, 0xca14198c7cce35c2) 07:34:11 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f00000003c0)) r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r7 = getpid() sched_setattr(r7, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r8 = syz_open_procfs(r7, &(0x7f0000000140)='net/rpc\x00') write$P9_RCREATE(r8, &(0x7f00000001c0)={0x18, 0x73, 0x2, {{0x80, 0x4, 0x7}, 0x3}}, 0x18) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r6) r9 = getpid() sched_setattr(r9, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000400)='./bus\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x4000) ioctl$DRM_IOCTL_GET_CLIENT(r4, 0xc0286405, &(0x7f00000004c0)={0x3, 0x0, {r9}, {r10}, 0x400, 0x2}) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_ACCEPT(r8, 0x0, 0x80) r11 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r11) r12 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000580)='NLBL_UNLBL\x00') r13 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r13) sendmsg$NLBL_UNLABEL_C_STATICLIST(r13, &(0x7f0000000340)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x4000}, 0xfd7b, &(0x7f0000000200)={&(0x7f0000000540)={0x14, r12, 0x800, 0x70bd2c, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x4080}, 0x24048804) fchdir(r5) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, &(0x7f0000000380)={@none, 0x0, 0x7f47, 0x1f}) r14 = open(&(0x7f0000000040)='./bus\x00', 0xc007e, 0x0) write$binfmt_aout(r14, &(0x7f0000000100)=ANY=[], 0x49f) sendfile(r14, r14, &(0x7f00000001c0), 0x8080fffffffe) 07:34:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000)={0x8001, 0x200, 0x7, 0xc9, r4}, 0x10) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r5, @ANYBLOB="00000016010000001800120008000100736974000c00020008000300", @ANYRES32=r6], 0x38}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1d, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r6}, [@NDA_LLADDR={0xc, 0x2, @multicast}]}, 0x28}}, 0x0) 07:34:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) fchdir(0xffffffffffffffff) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r4 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x60000, 0x0) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f00000002c0)="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") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r5, 0x80000000}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)={r6, 0x2, 0x3, [0x4, 0x8001, 0x401]}, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x3) r7 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r7, r7, 0x0, 0x100020000) 07:34:12 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r2, 0x8200) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r3, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x44800) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000040)=0x3ff, 0x4) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x9000}]) 07:34:12 executing program 0: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) [ 1219.108949] PF_BRIDGE: RTM_DELNEIGH with invalid address 07:34:12 executing program 2: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, 0x0, &(0x7f0000000040)) r4 = mq_open(&(0x7f0000000240)='NLBL_CALIPSO\x00', 0x2, 0x10, &(0x7f0000000480)={0xbc, 0x6, 0x1, 0x7}) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000580)={0x0, r4, 0x2c77, 0x101, 0xfff}) ftruncate(r0, 0x48280) r5 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) setxattr$security_ima(0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="038451fd49ac9e2bf80200a582ebb7c8a54b8b60eb9e455fc7a0b7ff3c25c53d0658a145efd6145b0c5ed079ed19b41f2427c1cd413f116ed94060b60ada5d00000000"], 0x1, 0x2) write$P9_RATTACH(r5, &(0x7f0000000000)={0x14, 0x69, 0x0, {0x40}}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)) ioctl$VIDIOC_G_FREQUENCY(0xffffffffffffffff, 0xc02c5638, &(0x7f0000000600)={0x2a00, 0x2, 0x1}) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r6 = socket(0x10, 0x2, 0xf6) write(r6, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000400)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_ADD(r6, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20040800}, 0x4000020) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000640)=ANY=[@ANYRES32=0x0, @ANYBLOB="0300029be4ada8b65a1eb790ade08dff9a9b1f00cfe700000000000000"], &(0x7f0000000100)=0x12) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={r8, @in6={{0xa, 0x4e23, 0x49, @mcast1, 0xeb}}}, &(0x7f0000000440)=0x84) read$fb(0xffffffffffffffff, 0x0, 0x0) write$P9_RREMOVE(r7, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r9 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fdatasync(r7) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000000200)={0x100000, r7, 0x9}) 07:34:12 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) openat$adsp1(0xffffffffffffff9c, 0x0, 0x131402, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0xc2444, 0x0) syz_open_dev$sndmidi(0x0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000440)=[{0x0}, {0x0}], 0x2) syz_open_dev$sndmidi(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000000), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x1) r3 = openat$audio1(0xffffffffffffff9c, 0x0, 0x180, 0x0) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, r3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) [ 1219.378293] audit: type=1804 audit(1583220852.619:11490): pid=11164 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir375459426/syzkaller.oq4UMx/928/bus" dev="sda1" ino=17618 res=1 07:34:12 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000040), 0x8) [ 1219.499247] audit: type=1804 audit(1583220852.659:11491): pid=11161 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir375459426/syzkaller.oq4UMx/928/bus" dev="sda1" ino=17618 res=1 07:34:12 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) chmod(&(0x7f0000000000)='./file1\x00', 0x1ff) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r4) mount$overlay(0x400000, &(0x7f0000000140)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='lowerdir=./bus,wordir=./file1,upperdir=./file0\x00']) [ 1219.575974] audit: type=1804 audit(1583220852.719:11492): pid=11161 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir375459426/syzkaller.oq4UMx/928/bus" dev="sda1" ino=17618 res=1 07:34:12 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(0xffffffffffffffff, 0x1) connect$bt_sco(r0, &(0x7f0000000040), 0x8) [ 1219.653165] audit: type=1804 audit(1583220852.779:11493): pid=11161 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir375459426/syzkaller.oq4UMx/928/bus" dev="sda1" ino=17618 res=1 [ 1219.713753] overlayfs: unrecognized mount option "wordir=./file1" or missing value [ 1219.716523] audit: type=1804 audit(1583220852.799:11494): pid=11161 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir375459426/syzkaller.oq4UMx/928/bus" dev="sda1" ino=17618 res=1 [ 1219.729215] overlayfs: unrecognized mount option "wordir=./file1" or missing value [ 1219.783762] audit: type=1800 audit(1583220852.809:11495): pid=11161 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed" comm="syz-executor.2" name="bus" dev="sda1" ino=17618 res=0 [ 1219.821231] PF_BRIDGE: RTM_DELNEIGH with invalid address 07:34:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000700)=@newlink={0x38, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x8, 0x9, @multicast1}]}}}]}, 0x38}}, 0x0) 07:34:13 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x101003, 0x0) personality(0x4100001) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000040)={0x3, 0x0, &(0x7f00000000c0)=""/183, &(0x7f00000001c0)=""/100, &(0x7f0000000240)=""/94, 0x100000}) r1 = socket(0x10, 0x80002, 0x0) r2 = openat$bsg(0xffffffffffffff9c, 0x0, 0x200, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r2, 0xc4c85512, &(0x7f0000000780)={{0x0, 0x0, 0x7fff, 0x0, 'syz0\x00', 0x6}, 0x0, [0x1, 0x1f, 0x8, 0xffffffffffffff7f, 0x8, 0xfffffffffffffff8, 0x2, 0x5, 0x1, 0x7, 0x3f, 0xe8, 0xc1e7, 0x8, 0xffffffff00000000, 0x8, 0x1, 0x9, 0x2, 0x0, 0xffffffff, 0x46ad2e7e, 0x2, 0x1fc000000000, 0xffffffffffffff80, 0x8, 0x80000001, 0x6, 0x7, 0x1, 0xfffffffffffffffb, 0x7f, 0xcb, 0xf0e, 0x10001, 0x0, 0x6, 0x6f03, 0x2, 0x7, 0x8, 0x9, 0x4, 0x9, 0x0, 0x2, 0x7ff, 0x7, 0x4, 0x4, 0x7ff, 0x6, 0x8, 0x36, 0x9, 0x23b, 0x3, 0x4, 0xffffffff, 0xfffffffffffffff8, 0x2, 0x7bb, 0x200, 0x7, 0xff, 0x101, 0x9, 0x2, 0x1f2f, 0xfff, 0x5, 0x8, 0x40, 0x9, 0x8, 0x1, 0x8, 0x40, 0x3, 0x9, 0xdd, 0xfffffffffffffffa, 0x0, 0x3, 0x0, 0x7f, 0x0, 0x9, 0x0, 0xfffffffffffffff9, 0x0, 0x5, 0x6, 0x86, 0x0, 0x3, 0x200, 0xffffffffffffffa9, 0x0, 0x100000000, 0xf6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xffff, 0x0, 0x6, 0x93, 0x1, 0x0, 0x6, 0xffffffffffffff81, 0x3, 0x200000000000000, 0x0, 0x9, 0x2, 0x8, 0x0, 0x3, 0x3f, 0x1, 0x7]}) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') preadv(r3, &(0x7f00000017c0), 0x1a1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="400000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="0000000000006772657461700000e30c00028006001000"/40], 0x40}}, 0x0) 07:34:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) fchdir(0xffffffffffffffff) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r4 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x60000, 0x0) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f00000002c0)="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") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r5, 0x80000000}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)={r6, 0x2, 0x3, [0x4, 0x8001, 0x401]}, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x3) r7 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r7, r7, 0x0, 0x100020000) [ 1219.969565] ip6t_rpfilter: match only valid in the 'raw' or 'mangle' tables, not 'rawP'. [ 1220.059998] ip6t_rpfilter: match only valid in the 'raw' or 'mangle' tables, not 'rawP'. [ 1220.098928] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.2'. 07:34:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2000080001, 0x84) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0x7ff}, 0x8) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0xffffff01, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1f}, r3}}, 0x30) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) pwritev(r4, &(0x7f0000000440)=[{&(0x7f0000000180)}, {&(0x7f0000000200)="d70ae6b50c640fcf713f82f859fe7eafba57d2", 0x13}, {&(0x7f0000000300)="d55c51260d957133b59edc321db0c1632c9948de399d063e8959e55f8da54c701e8b0f8d65e7d442bed2ebfd73cf65c56863943ed471a2ccf6b445028171db6b4ddbec52599cbde9fa651fa9350eec688f8a0fd13419c8c1448549412e7de8e62e5681cbae98d4e339722ad61028037f5830e7b5398a5101ed7ee716ed11500be67156c55b227f4dced786ad465ee82d380ff121a4ecea119f0530d277cd883c5fb4db66c8c541321456e56404b78cc4", 0xb0}, {&(0x7f0000000240)="b6ffb1266c8c454550a68419f8a52dce6071118d6022b1bf15c8d077b9a527ba3683e3c93388afe4d7431136219ab069a6c51d431f673f4246c689574e8b21b265ddc53606fc659cde9098154d7d7d219712a8bceeda604a9b00bb3d01f283e01a6479e10e29b68d3f52c1e6e27261dfa14f3025290ec0", 0x77}, {&(0x7f00000003c0)="b0308f79602fd6351ec10b3a582a6f98912923ffe62d9a766d83e1157673d6dc47df40fcb2f0ada0325f296718d3cd915633089d45e840b6e1833f2e6a109379483323281d2a47bcb5930df6fe2b7210cddea4ce07a0686e7e4ecb3c126ff3ddba89", 0x62}], 0x5, 0xadfc) 07:34:13 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}, 0x4001, 0x0, 0x3}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r1, 0x40140921, &(0x7f0000000100)={0x0, 0x1f, 0x0, 0x0}) [ 1220.328853] md: invalid raid superblock magic on mtdblock0 [ 1220.368359] md: mtdblock0 does not have a valid v0.0 superblock, not importing! 07:34:13 executing program 4: getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x6}, 0x4a40, 0x0, 0x0, 0x0, 0x81}, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = semget(0x1, 0x3, 0x4) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000000)=""/64) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) [ 1220.393701] md: md_import_device returned -22 [ 1220.402349] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1220.443354] audit: type=1800 audit(1583220853.689:11496): pid=11208 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed" comm="syz-executor.3" name="bus" dev="sda1" ino=17652 res=0 07:34:13 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) setreuid(0xee00, 0x0) r0 = getuid() openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) sendmsg$NFT_MSG_GETGEN(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x44}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0xffffffffffffff2a, 0x10, 0xa, 0x201, 0x0, 0x0, {0x2, 0x0, 0x2}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x40010) setreuid(0xee00, r0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x7fff) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f0000000000)=""/142) ioctl$sock_bt_cmtp_CMTPCONNDEL(r2, 0x400443c9, &(0x7f00000000c0)={@fixed={[], 0x10}, 0x4}) 07:34:13 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20050d, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCL_SETVESABLANK(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000003c0)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c1030000030000007003000000000000000000000000000000000000b8010000a0020000a0020000a0020000a0020000a002000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000005001b80100000000000000000000000000000000000000000000000050006d756c7469706f72740000000000000000000000000000000000000000010400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005800686173686c696d69740000000000000000000000000000000000000000016261746164765f736c6176655f30000000000000000000000000000000000000000000000000000000000000000000000000000000000000680043540000000000000000000000000000000000000000000000000000000100000000000000000000000073797a3000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800e80000000000000000000000000000000000000000000000000040005443504f505453545249500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x3d0) r2 = fcntl$dupfd(r0, 0x406, r1) write$ppp(r2, &(0x7f0000000040)="13a16cd99b9feacbd40324001053a259ba50cc", 0x13) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x401, 0x400000008d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x103900, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r4, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x3f7, 0x200, 0x70bd28, 0x25dfdbfe, {0x7, 0x7, './file0', './file0'}, ["", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000830}, 0x24000041) r5 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r7 = getpid() sched_setattr(r7, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r7, &(0x7f0000000100)={0x38, 0x6, 0x10, 0x10, 0x4, 0x5, 0xffffffff, 0x664, 0x4, 0x7}, 0x0) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, 0x0) syz_kvm_setup_cpu$x86(r5, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r6, 0xae9a) ioctl$KVM_RUN(r6, 0xae80, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$can_bcm(0x1d, 0x2, 0x2) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000080)='threaded\x00', 0xfffffe58) setsockopt$inet_sctp6_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f00000000c0)=@int=0xace9, 0x4) 07:34:13 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_emit_ethernet(0x6a, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff080046000078ac141400ac01000107040000042065580000000000000800000086dd890688be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 07:34:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'tgr160-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x529000, 0x0) sendmsg$IPSET_CMD_SWAP(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') sendfile(r1, r2, 0x0, 0x7) 07:34:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x154ab, &(0x7f0000000400)={&(0x7f00000006c0)=ANY=[@ANYBLOB="500000001000050774740000dfdbdfa65501a381", @ANYRES32=0x0, @ANYBLOB="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"/390, @ANYRES32, @ANYBLOB="6326ffc30340a59af4c3650421f9a537798610a14ec2867277bc4582e2dcfdaef81c581d1b4223e49887ee68e87ed537d5b2f27435252b48b2e957e1fac165be0302000074f627927737456b54921f664921e1615264cc762e189704152109b0dff9eb9ca92da732cc5b460b463835025485dc560b67fa9950386e7d44374265b739aa0ef8918e45feb997445e5d8790400e81a0a90106099ffc4061064fb90594c0910ed2b58949df85dcbf3d40da9aaa9fbfc464a225b4"], 0x50}}, 0x0) syz_open_procfs(0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, 0x0, 0x0) 07:34:14 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x7fff) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000000)=0xff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.current\x00', 0x26e1, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) connect$rds(r1, &(0x7f0000000040)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) 07:34:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) fchdir(0xffffffffffffffff) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r4 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x60000, 0x0) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f00000002c0)="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") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r5, 0x80000000}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)={r6, 0x2, 0x3, [0x4, 0x8001, 0x401]}, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x3) r7 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r7, r7, 0x0, 0x100020000) [ 1221.073640] device macsec1 entered promiscuous mode [ 1221.106166] device macvlan0 entered promiscuous mode [ 1221.151090] device macvlan0 left promiscuous mode [ 1221.297668] device macsec1 entered promiscuous mode [ 1221.350174] device macvlan0 entered promiscuous mode [ 1221.370684] device macvlan0 left promiscuous mode 07:34:14 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, 0x0, 0x10000004) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c000000649451c57cff0f000000000000970000", @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b00010067656e65766500000400028008000a00", @ANYRES32=0x0, @ANYBLOB], 0x3c}}, 0x0) 07:34:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7, 0x400180) sendmsg$RDMA_NLDEV_CMD_RES_GET(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="400000000914000226bd7000ffdbdffcf974d07d020000000800588d01000000080001000100000008274bf9631c3bdc2e55000100"/73], 0x40}, 0x1, 0x0, 0x0, 0x44}, 0x40000) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) write$P9_RWRITE(r2, &(0x7f00000000c0)={0xb, 0x77, 0x1, 0xff}, 0xb) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x3adf) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 07:34:14 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-blowfish-asm\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5", 0x4) sendmsg$NFT_BATCH(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000005240)=ANY=[@ANYBLOB="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"], 0x104}}, 0x0) recvfrom(r3, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000040)={r5, 0x3f, 0x7, 0x1ff}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000180)={r6, @in={{0x2, 0x4e24, @multicast1}}}, 0x84) [ 1221.585810] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=37988 sclass=netlink_route_socket pig=11259 comm=syz-executor.2 [ 1221.668271] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=37988 sclass=netlink_route_socket pig=11259 comm=syz-executor.2 07:34:15 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x2080, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x109001, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socket$nl_crypto(0x10, 0x3, 0x15) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) write(r4, &(0x7f0000000140)="d7d5859e5390c0e89aa0ed0bff43036be755b6af41a2d4310af9ab85c0c4e636df5d577a74c8d279ce935b38931304b917d3f8fc4df4a407aebe10f8d1d2fc85d9f3e24fcfad1edad61fa87ec760eba9636e1a25d12096b7b91139eaaf2f940cb287e323bfaeb4d19a95ca73e3b92e5e737658b6ff99702737ab79d3aaf0f3af26ecbaab9e0b47bc0b05e0f626c01c", 0x8f) 07:34:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r3 = getpid() tkill(r3, 0x9) socket$netlink(0x10, 0x3, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[], 0x4}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:34:15 executing program 2: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, &(0x7f00000000c0)="92", 0x1, 0xfffffffffffffffe) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x7fff) ioctl$SNDCTL_DSP_POST(r2, 0x5008, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) r3 = getpid() tkill(r3, 0x9) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x313) socket$netlink(0x10, 0x3, 0xb) r4 = socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={0x2c, r6, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_PEER_CONN_ID={0x8}]}, 0x2c}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f0000001680)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c1030000030000007003000000000000000000000000000000000000b8010000a0020000a0020000a0020000a0020000a002000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000005001b80100000000000000000000000000000000000000000000000050006d756c7469706f72740000000000000000000000000000000000000000010400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005800686173686c696d69740000000000000000000000000000000000000000016261746164765f736c6176655f300000000000000000000000000000000000000000000000000000000000000000000000000000000000006800435400000000000000000000000000000000000000f1000000000000000100000000000000000000000073797a3000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800e80000000000000000000000000000000000000000000000000040005443504f5054535452495000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000acda0e540723805d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x3d0) recvmmsg(r7, &(0x7f00000013c0)=[{{&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000180)=""/41, 0x29}], 0x1, &(0x7f0000000200)=""/36, 0x24}, 0x3}, {{&(0x7f0000000240)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000000400)=[{&(0x7f00000002c0)=""/150, 0x96}, {&(0x7f0000000380)=""/116, 0x74}], 0x2, &(0x7f00000004c0)=""/63, 0x3f}, 0x10001}, {{&(0x7f0000000500)=@tipc=@id, 0x80, &(0x7f0000000840)=[{&(0x7f0000000580)=""/133, 0x85}, {&(0x7f0000000640)=""/229, 0xe5}, {&(0x7f0000000740)=""/199, 0xc7}], 0x3, &(0x7f0000000880)=""/37, 0x25}, 0x6}, {{&(0x7f00000008c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000940)=""/170, 0xaa}, {&(0x7f0000000a00)=""/117, 0x75}, {&(0x7f0000000a80)=""/139, 0x8b}], 0x3, &(0x7f0000000b80)=""/196, 0xc4}, 0x7}, {{&(0x7f0000000c80)=@isdn, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000d00)=""/69, 0x45}, {&(0x7f0000000d80)=""/36, 0x24}, {&(0x7f0000000dc0)=""/163, 0xa3}, {&(0x7f0000000e80)=""/196, 0xc4}], 0x4}, 0x3}, {{&(0x7f0000000fc0)=@rc, 0x80, &(0x7f0000001280)=[{&(0x7f0000001040)=""/29, 0x1d}, {&(0x7f0000001080)=""/103, 0x67}, {&(0x7f0000001100)=""/240, 0xf0}, {&(0x7f0000001200)=""/4, 0x4}, {&(0x7f0000001240)=""/2, 0x2}], 0x5, &(0x7f0000001300)=""/148, 0x94}, 0xc7fb}], 0x6, 0x20, &(0x7f0000001540)) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000001600)={&(0x7f0000001580)={0x54, r6, 0x727, 0x70bd2b, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r8}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0xfff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'ip6gre0\x00'}, @L2TP_ATTR_UDP_CSUM={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x4040000}, 0x20040834) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc), 0x4) r9 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r10, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000008200)=@newtaction={0x30, 0x30, 0x3f9, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_csum={0x18, 0x1, 0x0, 0x0, {{0x9, 0x1, 'csum\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x6}, 0x10) sendfile(r1, r9, 0x0, 0xedc0) 07:34:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r2 = accept(r1, &(0x7f0000000040)=@l2tp6={0xa, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x80) sendmsg$NFT_MSG_GETTABLE(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x1, 0xa, 0x101, 0x0, 0x0, {0xb5347c872a99ef21, 0x0, 0xa}, [@NFTA_TABLE_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040080}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000100)=@ipv6_newrule={0x24, 0x20, 0xd, 0x0, 0x0, {}, [@FIB_RULE_POLICY=@FRA_FWMARK={0x8, 0xa, 0x7ff}]}, 0x24}}, 0x0) 07:34:16 executing program 4: creat(0x0, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x21483ab87c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r1 = getpid() tkill(r1, 0x9) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r2, &(0x7f0000000100)=""/230, 0xe6) 07:34:16 executing program 4: r0 = syz_open_dev$audion(&(0x7f00000002c0)='/dev/audio#\x00', 0x200, 0x1) write$vhost_msg_v2(r0, &(0x7f00000005c0)={0x2, 0x0, {&(0x7f0000000500)=""/39, 0x27, &(0x7f0000000540)=""/127, 0x3, 0x4}}, 0x48) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0020000000000000751dc23d8e008672391e51823799a0837eb904c9cedb383db4eff9d3f961ea48af33fb086dd809e74b05008b925b759fb97b84434f357bf55290ae2254db822b9f4b0a0256facb44521fa875669dd65b11c470252c5c3d9f4636bd897ff950e796e68a63ff88ba4600f241c913de3520493f7aa263989ac3f7d250dba5e5bc918809c9ee4a16e2703708f0dd2edb378300000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) bind(r2, &(0x7f0000000080)=@ll={0x11, 0x0, r6, 0x1, 0x0, 0x6, @dev}, 0x80) getsockname$packet(r0, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newtfilter={0x4c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {}, {0x2}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x20, 0x2, [@TCA_U32_CLASSID={0x8}, @TCA_U32_SEL={0x14}]}}]}, 0x4c}}, 0x0) 07:34:16 executing program 2: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, &(0x7f00000000c0)="92", 0x1, 0xfffffffffffffffe) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x7fff) ioctl$SNDCTL_DSP_POST(r2, 0x5008, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) r3 = getpid() tkill(r3, 0x9) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x313) socket$netlink(0x10, 0x3, 0xb) r4 = socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={0x2c, r6, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_PEER_CONN_ID={0x8}]}, 0x2c}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f0000001680)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c1030000030000007003000000000000000000000000000000000000b8010000a0020000a0020000a0020000a0020000a002000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000005001b80100000000000000000000000000000000000000000000000050006d756c7469706f72740000000000000000000000000000000000000000010400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005800686173686c696d69740000000000000000000000000000000000000000016261746164765f736c6176655f300000000000000000000000000000000000000000000000000000000000000000000000000000000000006800435400000000000000000000000000000000000000f1000000000000000100000000000000000000000073797a3000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800e80000000000000000000000000000000000000000000000000040005443504f5054535452495000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000acda0e540723805d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x3d0) recvmmsg(r7, &(0x7f00000013c0)=[{{&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000180)=""/41, 0x29}], 0x1, &(0x7f0000000200)=""/36, 0x24}, 0x3}, {{&(0x7f0000000240)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000000400)=[{&(0x7f00000002c0)=""/150, 0x96}, {&(0x7f0000000380)=""/116, 0x74}], 0x2, &(0x7f00000004c0)=""/63, 0x3f}, 0x10001}, {{&(0x7f0000000500)=@tipc=@id, 0x80, &(0x7f0000000840)=[{&(0x7f0000000580)=""/133, 0x85}, {&(0x7f0000000640)=""/229, 0xe5}, {&(0x7f0000000740)=""/199, 0xc7}], 0x3, &(0x7f0000000880)=""/37, 0x25}, 0x6}, {{&(0x7f00000008c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000940)=""/170, 0xaa}, {&(0x7f0000000a00)=""/117, 0x75}, {&(0x7f0000000a80)=""/139, 0x8b}], 0x3, &(0x7f0000000b80)=""/196, 0xc4}, 0x7}, {{&(0x7f0000000c80)=@isdn, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000d00)=""/69, 0x45}, {&(0x7f0000000d80)=""/36, 0x24}, {&(0x7f0000000dc0)=""/163, 0xa3}, {&(0x7f0000000e80)=""/196, 0xc4}], 0x4}, 0x3}, {{&(0x7f0000000fc0)=@rc, 0x80, &(0x7f0000001280)=[{&(0x7f0000001040)=""/29, 0x1d}, {&(0x7f0000001080)=""/103, 0x67}, {&(0x7f0000001100)=""/240, 0xf0}, {&(0x7f0000001200)=""/4, 0x4}, {&(0x7f0000001240)=""/2, 0x2}], 0x5, &(0x7f0000001300)=""/148, 0x94}, 0xc7fb}], 0x6, 0x20, &(0x7f0000001540)) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000001600)={&(0x7f0000001580)={0x54, r6, 0x727, 0x70bd2b, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r8}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0xfff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'ip6gre0\x00'}, @L2TP_ATTR_UDP_CSUM={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x4040000}, 0x20040834) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc), 0x4) r9 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r10, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000008200)=@newtaction={0x30, 0x30, 0x3f9, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_csum={0x18, 0x1, 0x0, 0x0, {{0x9, 0x1, 'csum\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x6}, 0x10) sendfile(r1, r9, 0x0, 0xedc0) 07:34:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x8000, 0x0) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffe58) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f00000000c0)={0x6, 0x200, {}, {0xffffffffffffffff}, 0x0, 0x3}) ioctl$TUNSETOWNER(r2, 0x400454cc, r4) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x7fff) syz_extract_tcp_res$synack(&(0x7f0000000100)={0x41424344, 0x41424344}, 0x1, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000180)={0x41424344}, 0x1, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000200)={@void, @void, @mpls={[{0x0, 0x0, 0x1}, {0x8917, 0x0, 0x1}, {0xaa}], @ipv4=@tcp={{0xc, 0x4, 0x3, 0x3, 0xeb, 0x68, 0x0, 0x4, 0x6, 0x0, @dev={0xac, 0x14, 0x14, 0x1c}, @loopback, {[@ra={0x94, 0x4}, @lsrr={0x83, 0x17, 0x63, [@multicast2, @rand_addr=0x4, @broadcast, @loopback, @dev={0xac, 0x14, 0x14, 0x36}]}]}}, {{0x4e20, 0x4e22, r5, r6, 0x0, 0x0, 0x7, 0x8, 0x5, 0x0, 0x8, {[@nop, @mss={0x2, 0x4}, @eol]}}, {"6600403d075d45249ecaca517263579b925e8601199f8391e558039500f8549371f9536b80e862a625dfb88664ad9b61f962b6ddeca7f865c63ddbee0f92ed1e76d36f8cf69871f2a45557c12350a342617cc2417e38042faf862520856ff78ce0b77772f00c3ad38ee6ca016f5f387e58108a7e27e0737cbdef9c8a93982b62c9bc1065356e17b8740f7fb68fa11e01412cc6e74dc2d342fac1621b1e53c4"}}}}}, 0xf7) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 07:34:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) fchdir(0xffffffffffffffff) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r4 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x60000, 0x0) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f00000002c0)="e1f3b8865797dcca3a6e3c98ebed76ec8595e991fb61b5994813b67a252afa3a1c44740a4ed61acd6e0c2656fc1c005dc99d6bff57b3cea24be54c53f26ebffa0d1e15513460df34bc488b990d70064058d99fa8847413345d7af108015785254d578330c526be929ec33a00ab8f1a285b17ece8109adc48726b67754b268d702f9af7148d5b61a39a91b93f2e8b54fc7dfbfc8bb4ca0763c1ca3eb6e4a3dd49a086b7863e0166aba3c682858cccc9b0304b8d6929f2a44a498a5e5829ad761ed2578c4fa360b10314390277dfd444547d7f23c784c47d4014efc46f30cca8e9eb7c66961a73366a404185398872b19fe6cee31f91bad0a524795ec05355a92a") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r5, 0x80000000}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)={r6, 0x2, 0x3, [0x4, 0x8001, 0x401]}, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x3) r7 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r7, r7, 0x0, 0x100020000) 07:34:17 executing program 4: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = getpgrp(r0) sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, 0x3, 0x3}, 0x0) r2 = socket$inet6(0xa, 0xa, 0x3f) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500)}], 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2}, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r3, 0xc008640a, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r6, 0xc008640a, &(0x7f0000000180)={r7}) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, &(0x7f00000000c0)={@dev={0xfe, 0x80, [], 0x2f}}) ioctl$sock_inet6_SIOCADDRT(r5, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @ipv4={[], [], @loopback}}) syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') fcntl$notify(r2, 0x402, 0x80000004) 07:34:17 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffe58) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x3, 0xd, &(0x7f0000000340)=""/13, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000400), 0x8, 0x10, 0x0}, 0x78) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000adc0)={0x3, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)}, 0x0) socket$kcm(0x10, 0x0, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0x806000) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) 07:34:18 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x7ff}, 0x1c) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x7fff) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000000)=0x7, 0x4) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x2010, r4, 0x45b86000) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_emit_ethernet(0x3e, &(0x7f00000007c0)=ANY=[@ANYBLOB="0180c2620000aaaaaaaaaaaa86dd60a4f02a00083a00ffdd00aafe8000000000000000000000000000aa8000907800000000ebe0657509084042a4b8ce7ca5a4e00bd74c8aab0800000000000000c3e6e56fdb74e9f3373bb7f92ca65482fed82e7252563cad2bfaba9b6c22163fcc6c4a3f0ab1b596b6cb6208735f61eeda8dc289a597d960106e0c96bfde89737e773d0cb5e332c5fe100ffc3bf78acf32ab2c581ed0228e224954dd3cdaed39b28698ee3868c6fa1e670f5dcb45fbc8f9849b2af2d76019629a88488c64339af7eaeb914d784815ff4166bb31e7b63ed8c4d45ec405f16716764363b3e0d8de2c87d8e23763c115d5f691aee3dd440973f1cceab467cdcc971a6b3a1f2d68d6706a1d6d938a9b0226e0bf06de8d631f9c0bcd9d"], 0x0) 07:34:18 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x10004, 0x2, 0x0, 0x1000, &(0x7f0000fff000/0x1000)=nil}) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x7fff) accept4$ax25(r2, &(0x7f0000000080)={{0x3, @bcast}, [@default, @remote, @rose, @remote, @bcast, @bcast, @default, @rose]}, &(0x7f0000000000)=0x48, 0x80800) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x2, 0x0, &(0x7f0000c0b000/0x4000)=nil}) 07:34:18 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r2, 0x80845663, &(0x7f0000000080)={0x0, @reserved}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 07:34:18 executing program 4: socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) unshare(0x40040400) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x6, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0xa}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4040000}, 0x731a893dc8f8deab) 07:34:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) fchdir(0xffffffffffffffff) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x60000, 0x0) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f00000002c0)="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") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r4, 0x80000000}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)={r5, 0x2, 0x3, [0x4, 0x8001, 0x401]}, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100020000) 07:34:18 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffe58) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x174, 0x2, 0x2, 0x101, 0x0, 0x0, {0x1, 0x0, 0x7}, [@CTA_EXPECT_MASK={0x78, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x8, 0x2, @rand_addr=0xffffffff}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @rand_addr=0xe137}}}]}, @CTA_EXPECT_FN={0x8, 0xb, 'sip\x00'}, @CTA_EXPECT_NAT={0x74, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0x68, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @rand_addr="d63aa28b98a44526ca12a3debd5395c1"}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @ipv4={[], [], @remote}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}]}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_FN={0x13, 0xb, 'callforwarding\x00'}, @CTA_EXPECT_MASK={0x4c, 0x3, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @empty}}}]}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}]}, 0x174}}, 0x24000041) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x541181, 0x0) r2 = openat$selinux_access(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/access\x00', 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) fcntl$dupfd(r2, 0x406, r3) r4 = open(&(0x7f0000000800)='./file0\x00', 0x200280, 0x12) getsockopt$SO_TIMESTAMP(r4, 0x1, 0x1d, &(0x7f0000000840), &(0x7f0000000880)=0x4) r5 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000380)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0xbc, r5, 0x200, 0x70bd2b, 0x8, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr="416a4d424013b0f02ed901073dbb2db5"}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:system_r:kernel_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_virt_wifi\x00'}, @NLBL_UNLABEL_A_SECCTX={0x1f, 0x7, 'system_u:object_r:man_t:s0\x00'}]}, 0xbc}, 0x1, 0x0, 0x0, 0x24008000}, 0x8000) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) ioctl$sock_SIOCDELDLCI(r8, 0x8981, &(0x7f0000000500)={'bond_slave_0\x00', 0x9}) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r7, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) socket$rds(0x15, 0x5, 0x0) 07:34:18 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x5) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000240)={0x5d63, 0x2, 0x3, 0xfffffe01, 0x2, [{0x6, 0x0, 0x3, [], 0xfc8cbd9a030bb2f9}, {0x8000, 0x7, 0x9, [], 0x800}]}) syz_open_dev$vcsn(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x10001) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x8000000, 0xfffffffc, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}, 0x4}}, @sadb_address={0x5, 0x9, 0xfffffffd, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x2]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x1800, &(0x7f00000003c0)=ANY=[@ANYBLOB="f1c1f6d562d58ec2d9559f97d61507c0d5ef5cdedf0a999eee14bae33e71fa6fc94fb6f15334e26f02cc0aeca9", @ANYRESHEX, @ANYRESDEC=0x0, @ANYBLOB="2c67e8", @ANYRESDEC=0x0]) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3efc882c22996f041d103af500"}, 0x1c) sendmmsg(r3, 0x0, 0x0, 0x0) syncfs(r3) r4 = msgget(0x2, 0x2c) msgctl$MSG_STAT_ANY(r4, 0xd, &(0x7f0000000180)=""/175) setresuid(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer\x00', 0x10001, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) fcntl$getown(r5, 0x9) [ 1225.482247] IPVS: ftp: loaded support on port[0] = 21 07:34:19 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x20000, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x30}) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) syz_open_dev$evdev(&(0x7f0000012fee)='/dev/input/event#\x00', 0x0, 0x0) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000080)={&(0x7f0000012000/0x3000)=nil, 0x3000}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f00000000c0)=0x7, 0x4) 07:34:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) fchdir(0xffffffffffffffff) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x60000, 0x0) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f00000002c0)="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") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r4, 0x80000000}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)={r5, 0x2, 0x3, [0x4, 0x8001, 0x401]}, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100020000) [ 1226.105881] FAULT_FLAG_ALLOW_RETRY missing 70 [ 1226.111556] CPU: 0 PID: 11384 Comm: syz-executor.2 Not tainted 4.14.172-syzkaller #0 [ 1226.119998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1226.129710] Call Trace: [ 1226.132344] dump_stack+0x13e/0x194 [ 1226.136193] handle_userfault.cold+0x3b/0x4b [ 1226.140774] ? perf_trace_lock+0x109/0x4b0 [ 1226.146100] ? userfaultfd_ioctl+0x2f80/0x2f80 [ 1226.151434] ? SOFTIRQ_verbose+0x10/0x10 [ 1226.155865] ? find_held_lock+0x2d/0x110 [ 1226.160429] ? __handle_mm_fault+0x29b8/0x3280 [ 1226.165223] ? lock_acquire+0x170/0x3f0 [ 1226.169256] ? lock_downgrade+0x6e0/0x6e0 [ 1226.173674] __handle_mm_fault+0x29c7/0x3280 [ 1226.178429] ? copy_page_range+0x1d70/0x1d70 [ 1226.183141] ? find_held_lock+0x2d/0x110 [ 1226.188008] handle_mm_fault+0x288/0x7a0 [ 1226.192108] __do_page_fault+0x4bc/0xb40 [ 1226.196399] ? vmalloc_fault+0xdf0/0xdf0 [ 1226.200486] ? do_page_fault+0x60/0x4f2 [ 1226.204479] ? page_fault+0x2f/0x50 [ 1226.208213] page_fault+0x45/0x50 [ 1226.212157] RIP: 0bf5:0x4cddcc 07:34:19 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) fsetxattr(r1, &(0x7f0000000080)=@known='system.posix_acl_access\x00', &(0x7f00000000c0)='/dev/kvm\x00', 0x9, 0x3) 07:34:19 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/bus/input/devices\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x121400, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f00000002c0)={0x0, 0x0, 0x661886, 0x80000000, 0x1}) ioctl$DRM_IOCTL_DMA(r1, 0xc0406429, &(0x7f00000002c0)={0x0, 0x3, &(0x7f00000001c0)=[0x560, 0x20, 0x9], &(0x7f0000000200)=[0x401, 0x1f6b8000], 0x22, 0x3, 0x3, &(0x7f0000000240)=[0xfb, 0x6, 0xfffffffe], &(0x7f0000000280)=[0x7, 0x1, 0x401, 0x74, 0x7]}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f00000000c0)={0x0, 0x20}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000180)={0x0, 0x0, [], @bt={0x4, 0x6, 0x2, 0xecb, 0x1, 0x8001, 0x8, 0x2}}) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='iocharset=c']) 07:34:19 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = socket$vsock_stream(0x28, 0x1, 0x0) fallocate(r3, 0x0, 0x0, 0x7fff) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffe58) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x7fff) bind$bt_hci(r5, &(0x7f0000000200)={0x1f, 0xfffb, 0x2}, 0x6) fallocate(r2, 0x0, 0x0, 0x7fff) ioctl$BLKRESETZONE(r2, 0x40101283, &(0x7f0000000080)={0x126f, 0x6}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) r6 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r6, &(0x7f0000000080)='threaded\x00', 0xfffffe58) getsockopt$netrom_NETROM_T2(r6, 0x103, 0x2, &(0x7f00000000c0)=0x1, &(0x7f0000000100)=0x4) 07:34:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) [ 1226.215626] RSP: be7806d4:000000000076bf20 EFLAGS: ffffffff [ 1226.495054] JFS: charset not found [ 1226.563159] FAULT_FLAG_ALLOW_RETRY missing 70 [ 1226.568687] CPU: 0 PID: 11404 Comm: syz-executor.2 Not tainted 4.14.172-syzkaller #0 [ 1226.576900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1226.586803] Call Trace: [ 1226.589465] dump_stack+0x13e/0x194 [ 1226.593381] handle_userfault.cold+0x3b/0x4b [ 1226.597825] ? perf_trace_lock+0x109/0x4b0 [ 1226.602262] ? userfaultfd_ioctl+0x2f80/0x2f80 [ 1226.607117] ? SOFTIRQ_verbose+0x10/0x10 [ 1226.611391] ? find_held_lock+0x2d/0x110 [ 1226.616068] ? __handle_mm_fault+0x29b8/0x3280 [ 1226.620694] ? lock_acquire+0x170/0x3f0 [ 1226.624698] ? lock_downgrade+0x6e0/0x6e0 [ 1226.628921] __handle_mm_fault+0x29c7/0x3280 [ 1226.634219] ? copy_page_range+0x1d70/0x1d70 [ 1226.638917] ? find_held_lock+0x2d/0x110 [ 1226.643190] handle_mm_fault+0x288/0x7a0 [ 1226.647746] __do_page_fault+0x4bc/0xb40 [ 1226.651840] ? vmalloc_fault+0xdf0/0xdf0 [ 1226.656461] ? do_page_fault+0x60/0x4f2 [ 1226.660742] ? page_fault+0x2f/0x50 [ 1226.664395] page_fault+0x45/0x50 [ 1226.668040] RIP: 0bf5:0x4cddcc 07:34:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) write$6lowpan_control(r2, &(0x7f0000000000)='connect aa:aa:aa:aa:aa:11 1', 0x1b) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffe58) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="300000001000010000000000fedbdf2500000000", @ANYRES32=0x0, @ANYBLOB="00100400600b050008001b000000000008001c00", @ANYRES32=r4, @ANYBLOB], 0x30}}, 0x0) 07:34:20 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x8d0, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x23d) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r4) stat(&(0x7f00000004c0)='./bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r5, 0x0) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r6, 0x0) stat(&(0x7f0000000200)='./bus\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r7, 0x0) stat(&(0x7f00000004c0)='./bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r8, 0x0) getgroups(0x5, &(0x7f0000000180)=[r5, r6, 0xee00, r7, r8]) write$FUSE_ENTRY(r2, &(0x7f0000000380)={0x90, 0x0, 0x3, {0x2, 0x2, 0x8, 0x0, 0x9, 0x2d68a04e, {0x4, 0x2, 0x10000, 0x20, 0x8f, 0x4, 0x8001, 0x4, 0x6, 0x3, 0x1, r4, r9, 0xcb8, 0x51e4}}}, 0x90) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xffffffff}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff}]) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r10 = syz_open_dev$video4linux(&(0x7f00000002c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r10, 0xc0585604, &(0x7f0000000300)) openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x800000, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r11 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r11, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) 07:34:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) fchdir(0xffffffffffffffff) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x60000, 0x0) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f00000002c0)="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") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r4, 0x80000000}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)={r5, 0x2, 0x3, [0x4, 0x8001, 0x401]}, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100020000) [ 1226.671569] RSP: be73e6d4:000000000076c060 EFLAGS: ffffffff [ 1227.259345] JFS: charset not found 07:34:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000340)={0xa30000, 0x800, 0x80000000, 0xffffffffffffffff, 0x0, &(0x7f0000000300)={0xa10001, 0x2, [], @string=&(0x7f00000001c0)=0xfc}}) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f0000000380)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) r4 = creat(0x0, 0x0) r5 = fcntl$getown(r4, 0x9) read(r4, &(0x7f0000000280)=""/83, 0x53) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x120000000000004, 0x1}, 0x8000, 0x6, 0x0, 0x0, 0x0, 0xe2e6}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={[], 0x5, 0x9, 0x0, 0xb4, 0x5, r5}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="a000000010003b0e00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000800012000800010076746936740002007000030000000000080006000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800020000000800fdff030000000000080004007f000001080005000000000008000400000000000800060000000000080006000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030000000000"], 0xa0}}, 0x0) 07:34:20 executing program 3: sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000000)={0x2c, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x10, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @loopback}}]}]}, 0x2c}}, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000300)={'wg2\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000000408000000000000000000000000000010"], 0x1}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f0000000040)={0x7, 0x3, 0x2a}) mount$9p_rdma(&(0x7f0000000080)='127.0.0.1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x1000084, &(0x7f0000000240)={'trans=rdma,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x9}}, {@common=@cache_loose='cache=loose'}, {@sq={'sq', 0x3d, 0x40}}, {@rq={'rq', 0x3d, 0xea5}}, {@timeout={'timeout', 0x3d, 0x8}}], [{@subj_user={'subj_user', 0x3d, '&md5sumvmnet1eth0,+user'}}]}}) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001d0001410000001def000c0001"], 0x1}}, 0x0) r2 = socket$inet6(0x10, 0x3, 0x10) sendto$inet6(r2, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 07:34:20 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$FBIOGET_VSCREENINFO(r0, 0x4600, &(0x7f0000000080)) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) [ 1227.638788] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1227.674957] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.3'. 07:34:20 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) gettid() sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=@newtfilter={0x4c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_flow={{0x9, 0x1, 'flow\x00'}, {0x1c, 0x2, [@TCA_FLOW_EMATCHES={0x10, 0xb, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x4}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xecfc}}]}, @TCA_FLOW_BASECLASS={0x8, 0x3, {0xffff}}]}}]}, 0x4c}}, 0x0) 07:34:21 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r3) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x2, 0x0, &(0x7f0000ffe000/0x2000)=nil}) 07:34:21 executing program 4: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fallocate(r0, 0x0, 0xe7a7, 0x8000) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r4, &(0x7f0000000280), 0x1033b) fdatasync(r4) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4}) [ 1227.980898] audit: type=1804 audit(1583220861.229:11497): pid=11422 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir375459426/syzkaller.oq4UMx/940/file0" dev="sda1" ino=17691 res=1 [ 1228.112728] audit: type=1800 audit(1583220861.229:11498): pid=11422 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed" comm="syz-executor.2" name="file0" dev="sda1" ino=17691 res=0 07:34:21 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="d7e1fc10a3c342c710ded45d2ecca04604fba107c712836d1efe26a5df8dbc14eac41c58261994419e5a947d6136444fb59467d423033fb91fbff9"], 0x1) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 07:34:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) fchdir(0xffffffffffffffff) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r4 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x60000, 0x0) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f00000002c0)="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") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r5, 0x80000000}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)={r6, 0x2, 0x3, [0x4, 0x8001, 0x401]}, 0xe) r7 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r7, r7, 0x0, 0x100020000) [ 1228.193582] audit: type=1804 audit(1583220861.259:11499): pid=11455 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir375459426/syzkaller.oq4UMx/940/file0" dev="sda1" ino=17691 res=1 07:34:21 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffe58) ioctl$KVM_GET_DEBUGREGS(r3, 0x8080aea1, &(0x7f00000000c0)) fchdir(r2) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x1) 07:34:21 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x800000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x100) accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x800) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x98428d57a99b5f44) io_setup(0xd, &(0x7f0000000100)=0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x7fff) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x67, 0x2, {0x2, 0x3, 0x4}}, 0x14) io_submit(r3, 0x200002f1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x7fff) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240)={0xffffffffffffffff}, 0x106, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000002c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x4e20, 0x0, @rand_addr="0cf3851bec39366a72058106aad8eec0", 0x9}, r5}}, 0x38) r6 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r6, &(0x7f0000000080)='threaded\x00', 0xfffffe58) ioctl$FBIO_WAITFORVSYNC(r6, 0x40044620, 0x0) 07:34:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000200)={0x2}) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000180)=@gcm_256={{0x304}, "295df9eb78a08518", "919ac0dbcaa195c4e70bcf5a7df3d7bc85b14c31d1c5a165138d8f30bdbb6fe0", "ec377342", "bed947d63a799c29"}, 0x38) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) listen(r2, 0x40) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000240)={0xa, 0x6e22, 0x0, @loopback}, 0x1c) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x400000, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "4420040b51fc953400", "6bdda720", "7eb81430da2133ad"}, 0x28) sendmsg$AUDIT_TTY_GET(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x300, 0x70bd26, 0x25dfdbff, "", ["", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x8080}, 0x20004844) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f0000000040)) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 07:34:22 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) capget(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) listen(r1, 0x0) socket$unix(0x1, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)) getsockopt$sock_buf(r2, 0x1, 0x1c, 0x0, &(0x7f0000000080)) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$setpipe(r3, 0x407, 0xfffffffffffffffe) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r4 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) getsockopt$sock_int(r5, 0x1, 0x6, &(0x7f0000000180), &(0x7f0000000240)=0x4) r6 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r6, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendfile(r3, r4, 0x0, 0x102000004) socket(0xa, 0x0, 0x8) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS_OLD(0xffffffffffffffff, 0xc1004111, &(0x7f0000000000)) socket$inet6_sctp(0xa, 0x0, 0x84) socket$inet6_sctp(0xa, 0x0, 0x84) 07:34:22 executing program 3: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) recvmmsg(r1, &(0x7f0000001c40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000240)=""/85, 0x55}], 0x1, 0x0) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x3, 0x2}, 0x2070}, 0x0, 0x3ffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000200)="3081a3", 0x1001, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x1) r5 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="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", 0xfdea, r5) add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000380)="07349a96dd680069eba7fc2d6f732d26f6dbc4eb791b2f36a34c37e9b4f642690a2590694a293b1b218273b8ee30c578af42d73e4a987cb1b6d675e777a431fe2d41c5faed77e36f318885467a67a8d72146a232789eeb30ed286ab670f74a966d18ef84aac37fa25cdd05f2f2", 0x6d, r5) ioctl$SNDCTL_DSP_SETFMT(r4, 0xc0045005, &(0x7f0000000000)=0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) pipe(0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000300)='./file0\x00'}, 0x10) close(0xffffffffffffffff) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={r6, 0xed18}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000640)=ANY=[@ANYRES32=r6, @ANYBLOB="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"], 0xad) bind$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 07:34:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) fchdir(0xffffffffffffffff) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r4 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x60000, 0x0) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f00000002c0)="e1f3b8865797dcca3a6e3c98ebed76ec8595e991fb61b5994813b67a252afa3a1c44740a4ed61acd6e0c2656fc1c005dc99d6bff57b3cea24be54c53f26ebffa0d1e15513460df34bc488b990d70064058d99fa8847413345d7af108015785254d578330c526be929ec33a00ab8f1a285b17ece8109adc48726b67754b268d702f9af7148d5b61a39a91b93f2e8b54fc7dfbfc8bb4ca0763c1ca3eb6e4a3dd49a086b7863e0166aba3c682858cccc9b0304b8d6929f2a44a498a5e5829ad761ed2578c4fa360b10314390277dfd444547d7f23c784c47d4014efc46f30cca8e9eb7c66961a73366a404185398872b19fe6cee31f91bad0a524795ec05355a92a") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r5, 0x80000000}, &(0x7f0000000140)=0xc) r6 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r6, r6, 0x0, 0x100020000) [ 1229.263669] audit: type=1804 audit(1583220862.509:11500): pid=11494 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="file0" dev="sda1" ino=17699 res=1 [ 1229.405041] audit: type=1800 audit(1583220862.509:11501): pid=11494 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed" comm="syz-executor.5" name="file0" dev="sda1" ino=17699 res=0 [ 1229.495251] audit: type=1804 audit(1583220862.529:11502): pid=11480 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="file0" dev="sda1" ino=17699 res=1 07:34:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x3c3200, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000013c0)={&(0x7f0000000200)="face9a8f7184e1c5de7abc9ae8d5288c523cfacae5c3ed037217f22e086baadd4f0d8c13c3ccb6e50c51ee090a36c899a1203affa0d7870f088ab085054d1e059fa081f32e3dc6f3a65a7af145590b7e1afbf53b80357e100985dac2384701c2e6e1aca5075e2851493b3b385cd1e033ef510e51e9515d02a5", &(0x7f0000000280)=""/4096, &(0x7f0000001280)="23c01f44e12bf3da525beca3835f556c65a38b99f2ee0fff87349af6c6d353ed76449bf1ff88929e0f0286c8026d73dd5f8d46172c190ca96b465698648bc85baafa7de69abfbb2c866a041727114768c5c1e9593df4ad81fda3cc1faaf6f0a08ead8570894f33ff32b992d3c9d83f507a680d87", &(0x7f0000001300)="e733d42182a47d3f2ac4d5e0ffbcf97621ae7254798f4c2a4564bae8239976645f8b9af0bbf2c65873f446676dc1a5467cb3a0e3abbe1bb2f95899a784365a28a5a31a7174fb1f5136e36b85e83e12d96fc5199255180276be7c74f4e30fb169541ef271a8fca6a44dee4fc5b48b683156b70e588d92ea388e807ba4626b062a29f769815d", 0x2, r2, 0x4}, 0x38) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffe58) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffe58) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000c78000/0x18000)=nil, &(0x7f0000001480)=[@textreal={0x8, &(0x7f0000001400)="660f3882af930066b9780b00000f322bb20b2b66b8001000000f23d00f21f866352000000c0f23f8f3ab0f011767660f3881100f01ca0f0fd5ae660f3880990000", 0x41}], 0x1, 0x0, &(0x7f00000014c0)=[@cstype0={0x4, 0x9}], 0x1) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x4, 0x9, 0x1, 0x1}]}) ioctl$VIDIOC_G_SLICED_VBI_CAP(0xffffffffffffffff, 0xc0745645, &(0x7f0000000180)={0x2, [0x2, 0x7, 0x9d1, 0x4, 0xff6, 0x6, 0x1ff, 0x20, 0x6, 0x609, 0x401, 0xd03, 0x3, 0x0, 0x8, 0x7, 0x81, 0x101, 0x7, 0x400, 0x9, 0x3, 0x6, 0x7f, 0x0, 0x1, 0x7, 0x7fff, 0xff, 0x2, 0x4, 0x8, 0x3, 0x8, 0x8, 0xfe01, 0x1, 0x5, 0x3, 0xf001, 0xffff, 0x7797, 0x2, 0x2, 0x5, 0x7f, 0x8cea, 0x31f], 0xc}) [ 1229.552291] audit: type=1804 audit(1583220862.699:11503): pid=11473 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir375459426/syzkaller.oq4UMx/941/file0" dev="sda1" ino=17700 res=1 07:34:23 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) fchdir(0xffffffffffffffff) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r4 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x60000, 0x0) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f00000002c0)="e1f3b8865797dcca3a6e3c98ebed76ec8595e991fb61b5994813b67a252afa3a1c44740a4ed61acd6e0c2656fc1c005dc99d6bff57b3cea24be54c53f26ebffa0d1e15513460df34bc488b990d70064058d99fa8847413345d7af108015785254d578330c526be929ec33a00ab8f1a285b17ece8109adc48726b67754b268d702f9af7148d5b61a39a91b93f2e8b54fc7dfbfc8bb4ca0763c1ca3eb6e4a3dd49a086b7863e0166aba3c682858cccc9b0304b8d6929f2a44a498a5e5829ad761ed2578c4fa360b10314390277dfd444547d7f23c784c47d4014efc46f30cca8e9eb7c66961a73366a404185398872b19fe6cee31f91bad0a524795ec05355a92a") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r5, 0x80000000}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)={r6, 0x2, 0x3, [0x4, 0x8001, 0x401]}, 0xe) r7 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r7, r7, 0x0, 0x100020000) [ 1229.800166] audit: type=1800 audit(1583220862.699:11504): pid=11473 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed" comm="syz-executor.2" name="file0" dev="sda1" ino=17700 res=0 07:34:23 executing program 3: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) recvmmsg(r1, &(0x7f0000001c40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000240)=""/85, 0x55}], 0x1, 0x0) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x3, 0x2}, 0x2070}, 0x0, 0x3ffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000200)="3081a3", 0x1001, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x1) r5 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="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", 0xfdea, r5) add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000380)="07349a96dd680069eba7fc2d6f732d26f6dbc4eb791b2f36a34c37e9b4f642690a2590694a293b1b218273b8ee30c578af42d73e4a987cb1b6d675e777a431fe2d41c5faed77e36f318885467a67a8d72146a232789eeb30ed286ab670f74a966d18ef84aac37fa25cdd05f2f2", 0x6d, r5) ioctl$SNDCTL_DSP_SETFMT(r4, 0xc0045005, &(0x7f0000000000)=0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) pipe(0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000300)='./file0\x00'}, 0x10) close(0xffffffffffffffff) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={r6, 0xed18}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000640)=ANY=[@ANYRES32=r6, @ANYBLOB="0200a500084b34a03f97282c14c1a6e5edd6de41d1eaf9d1eeea8bff74fbb344ae7a3092ee1d7ded8f95ba87bbd5f8627951a5facd363acb4f0d72250b637e500539e9aed0bafa0665965756f096db56c1f108992b629e59c4bf73dde7dd9a50f61b9774cb52033bc9e1cc23530980e8d17784c564d95920d89aa3f81cf3db5e2847b7b92762b30553a7a0c5925137cbb7783e8e8ccd93e66a3307818c37bbb710f6879a600f03f4a91c5a94517800000000000000002390d22411c222df0c0a88f87a51e911932551511f267038ac32f14c704631db8ea827864c6ee63df3ee994ea3755398c2a44a886e5ba6d851e29e600d16ee59d802bcfdb42def4405efcae5d772f32d765309ca0269b48ab3d5c802fd160708a9aba67703198d08e37fda6dad1b1ac79b40446e999278cd85c2391aa3e90c"], 0xad) bind$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 07:34:23 executing program 3: r0 = gettid() perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) process_vm_writev(r0, &(0x7f0000000000), 0x0, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) 07:34:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) fchdir(0xffffffffffffffff) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r4 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x60000, 0x0) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f00000002c0)="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") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x8) r6 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r6, r6, 0x0, 0x100020000) 07:34:23 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) fchdir(0xffffffffffffffff) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r4 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x60000, 0x0) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f00000002c0)="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") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r5, 0x80000000}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)={r6, 0x2, 0x3, [0x4, 0x8001, 0x401]}, 0xe) r7 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r7, r7, 0x0, 0x100020000) 07:34:24 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x50d082, 0x0) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x8) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) fsetxattr$security_ima(r3, &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="030000000000000086f0f5c0287c6af60295610e1448f990780a936db43f613623a92fda90485c343552f462f4fd55537d840aac7683f755b287e2f1829dbecb677773d16b6f39ea223ad3d92395098f1c6f7748fe85fa8f8b2708bf9cb6ca9410a2c3a221087c1f742b22534bb07293ef2e68e40c7cc6200f67e1e54a5ac5e5a9da08374128bb1d5eba5a040b7030"], 0x8f, 0x0) fcntl$getown(r0, 0x9) r4 = syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x7fff, 0x81) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f00000002c0)='illinois\x00', 0x9) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 07:34:24 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000002940)={&(0x7f0000000200)=ANY=[@ANYBLOB="4c00000030003b050000000000000000003b8a15520001003400010009000100766c662100000000200002801c0002000000000000000000b897ed746fa2633fbe7600000100000004000600"], 0x4c}}, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffe58) ioctl$SNDRV_PCM_IOCTL_PAUSE(r1, 0x40044145, &(0x7f0000000000)) 07:34:24 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r3) getsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000240), 0x4) bind$l2tp(r2, &(0x7f0000000200)={0x2, 0x0, @broadcast, 0x4}, 0x10) fchdir(r2) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080025bd7000fbdbdf25040000000800030004000700050006000600000014000100ff0100000000000000000000000000010500050000000000fd00040009000000ffffff7f819f0007050006007f00020008000200ffff0000140004000200cd9f0288c63ff4c700800300000004000400"], 0x78}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) [ 1231.509628] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1231.549353] tc_ctl_action: received NO action attribs [ 1231.830316] Dropped {multi|broad}cast of type= [86dd] [ 1232.167151] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1232.197163] tc_ctl_action: received NO action attribs 07:34:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) fchdir(0xffffffffffffffff) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r4 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x60000, 0x0) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f00000002c0)="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") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0], &(0x7f000095dffc)=0x8) r5 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r5, r5, 0x0, 0x100020000) 07:34:26 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x40, 0x0) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="4c0000000406010300000000000000000200000305002311fe44ae60654d01000700000009000073797a310000000005000000070000007796610c8e2c7669090002e795f6c4dddd027a00088e4e8b5d1446b1b5034e82a39241a5c0db9d2eb68c5527176471bd0b020f825c94e43340345e072ed66fb559823cc393"], 0x4c}, 0x1, 0x0, 0x0, 0x20000800}, 0x4001) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 07:34:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) fchdir(0xffffffffffffffff) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r4 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x60000, 0x0) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f00000002c0)="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") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r5, 0x80000000}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)={r6, 0x2, 0x3, [0x4, 0x8001, 0x401]}, 0xe) r7 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r7, r7, 0x0, 0x100020000) 07:34:26 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9, 0x200000) sendmsg$nl_generic(r2, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000001c00)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="51296c18c57160a274e750ebd8eb65c86973df546c43f78a892f1bc02b1dcf7e5c30a855d9ceab1c97d47a3165b8a5a8ca7acb2ab95d1a2895e0592e13bfa80cd716354c74821057f3e7719bb4d935ca6132c95050c95cac31c000a56a8474c0914489e06db3042111b4e7bd0098cf761550897419366c02c0037ff5dbd103a3dae7fb5306cf3fd22555ec30aaa5bb1d41c7df20632df1f53f47da841c0b77a390282f69705ac176b1cf4d90da584c820e32df19d8f36a7f2102aa3f097c129aaeeeb75e3c703481ae556e35de202f0f6ce4340782f92e36585c33f009a3d4a44d7da4a5efa2d34b371891a447dee7ea9fedad2814dffa4c5600088c850cdbbb1777573b9841c15960cea690a89dfac4d187d1a6a11dd3be2e2be1b8c48a56e954444caf97eb2223db42cc5ebb30abd7176a548d42093d71f49c3c05f9e1219feb75c551436625b1c122676e3c76e277c5caa075bb24234423902bdcdda6fa518631a7d5b6dbcb3a30fdcd1e90b7e00507ec8aedbd85b3f8c32333432b7b53d59317b0bc81d3d1a78ec3870d00f069b25dc6e3841466871510d158d9c1ccc8a0af517e086785027bdd3d20f43be457530a6242c0a151405417c29cbe23a464061f858be0a4e83a6dfb8e0bcbf0d5f792765c8a979d577f8c1083aa6f0b2def2223b098ccdaf074287d6031cdc418ef3fb7e7bf5bdfd4de47b8da1c34bd1963ca62a4a4e87688182ecac4a9c5ea74a1d34574b25b7e3fc9dde83adb82842aee9bd2d553fc6409ce3d487a68144bebb9c6c5e121446d61b9f42e281e7cc67a92fee8b45733be0b329a846c4163a2d694baffa26dd23e77338309e323c7ce4fb02f68de2f0378b06787b6660d908f009478c1bb7da3012532e7832114fea8e9b56431126bbf9132b83751deb2203e5bd90c0095f6ec45c37c29dfa9bec40ffb9011475d9acf61975e4931e948da21a9a31e79f96016c8a5fa8d4ca8e662b2e085806d37c0bd6763d25539fd54b09113d4742ed92055f18da1a7673049cd71afa6d8d14b98459c5cbcf343b037b53fc8b0d30d9f9be6b68e0c21cbf94588d8d45eed4858af11a9360cae0000"], 0x15e0}, 0x1, 0x0, 0x0, 0x40d4}, 0x20000002) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) unshare(0x44000600) r4 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x1) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r6, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r6, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3800000010000507000000000000000000000600", @ANYRES32=r7, @ANYBLOB="0000001201000d001800120008000100736974000c00020008000300", @ANYRES32], 0x38}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4000000010003901800000540000000000000000241cd22b3287ec6eada2e296f80cba3b8e8c11fdf9b2e8b43fa0dfcd15cbe3999e3b17551460701362e6152e47da6bf56d6f6d83ee970a10bb3c3abd710bab2085aeca529811540a5f63e05c6419613c497cc04cd43cf5a9467aee25373dfaabeb0abb3d8829a2dba1cb25334c7272880c273b441cbc818d557a74b7ff4f9e6fff2b08ec7e80c5c87ca5b3804298668575244aab24e9854efc2187f4bd8f27", @ANYRES32=r8, @ANYBLOB="03000000000000002000128008000100736974001400028008000200", @ANYRES32=r7, @ANYBLOB="a5000000e5000000"], 0x40}}, 0x0) 07:34:26 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000040), 0x8) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f0000000080)={0xe, 0x7, 0x40}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r3, 0x1, 0x70bd28, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4008800}, 0x0) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r3, 0x800, 0x70bd28, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x5}, 0x20000084) 07:34:26 executing program 4: r0 = creat(0x0, 0x0) r1 = fcntl$getown(r0, 0x9) write$binfmt_aout(r0, &(0x7f0000000280)={{0xcc, 0xde, 0x1f, 0x1fe, 0x1fc, 0x20, 0x9c, 0x7fffffff}, "1742c884b4cde10f0685172e43ac2070e221a83c1d3671bcc2c0f4fbb9f3543537ed012537a9787580acbd8e7f91182ea1aaf2e96897f5534f3538da844abe5c96f8825101652ea32be07f4db5e8c1883be9860780e39271b01a7c869074c6c5ffc32ef57e107f41ac7a66b7aa64c4055a760378304a4f7a3b9d60c2b4bd40e06867fbb4c3a08774fbd53f64185d84634a0800a36e8266fbe8d1fa524fdb2413ea6abdb3663e0de135dae1ea80ad5586201946323e633eb8b19ed58803223b0c2ec4b159b48371204bf74b0a909e58", [[], [], [], []]}, 0x4ef) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x120000000000000, 0x1}, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0xe2e6}, r1, 0xa, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, r1, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') socket(0x10, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_DELAY(0xffffffffffffffff, 0x80084121, &(0x7f0000000040)) umount2(&(0x7f0000000240)='./file0\x00', 0x0) 07:34:26 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x28000, 0x0) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000100)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x5c, r2, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_SECCTX={0x2a, 0x7, 'system_u:object_r:logrotate_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast1}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40}, 0x2004c8c1) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r3, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 07:34:26 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000040)={0x1f, @none}, 0x8) [ 1232.863022] IPVS: ftp: loaded support on port[0] = 21 [ 1232.867005] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 07:34:26 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x1fe, 0x0, &(0x7f0000c00000/0x400000)=nil}) 07:34:26 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000000)={0x1f, @fixed={[], 0x10}}, 0x8) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x7fff) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f0000000040)={0x77359400}, 0x10) 07:34:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x100000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd], 0x1f000}) syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000480)={&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000000}, &(0x7f0000000080)=0x10) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:34:26 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcsa\x00', 0x40, 0x0) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000280)={0x1a, 0x18, 0x6, 0x8, 0x39, 0x400, &(0x7f0000000240)="e08d474961197fc3f7faad36bffb5a06abb677cc6f46ebc01728db6df0b4d8b8b7c41730f44a06ba1cc4596abb16913858b13d0af59fab2ade"}) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x7fff) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x24, r4, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1f}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x7f}]}, 0x24}, 0x1, 0x0, 0x0, 0x40084}, 0x2000c845) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 07:34:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) fchdir(0xffffffffffffffff) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r4 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x60000, 0x0) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f00000002c0)="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") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r5 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r5, r5, 0x0, 0x100020000) 07:34:26 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x7fff) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000080)={0x3, 0x0, &(0x7f0000ca1000/0x3000)=nil}) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r4) 07:34:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) fchdir(0xffffffffffffffff) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x60000, 0x0) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f00000002c0)="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") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r4, 0x80000000}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)={r5, 0x2, 0x3, [0x4, 0x8001, 0x401]}, 0xe) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100020000) 07:34:26 executing program 4: preadv(0xffffffffffffffff, 0x0, 0x0, 0x10400003) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000140)={0x0, 0x20000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="8400000000000000020002000600ca3fa6ca3c000000000000f7ffff17feffff1fc12085e8cac28c030000000000000000ff7f0000000005000000e91200000080001000000000310ff32e30f56282e12b95723f068fe42d279601f5ff000000e3000000000012000000000000000000000080ebee92d3dcac85c433d96ae4cfff583b5b2cd8e282b73f7e74e82c5c57d1825c296c66101b311bc65d602ede0495233f9457af0202d2f6c827c9146533b06e2958fa87ea23fc72a2e18b7d620e0a72b61f376dfb7b30bbea23c12b74cd37c3f661a0f64320ac99257f0ac6c5f5cc2eef73642a4fa819b3d7636aa8c1043d8ed00121c88fa741dd06f1b8ba8fa93440f90c21fd6cd606fa680000000000027931218842024d98550ac9be5a69b7ade7c836a872c72b76be032747d15f3eee1603cbde1757661254655548d95f83560f1ab797c7f2d3752b0a032eb307caea02240ac9f5f9cfccacffa10ff3739af1c9d58739b102bf3fb5e77fedb0790d9141121dc34f3ce90e4deaea16b4aa25b456b6413584340d76817347975fe6334813717090b98292381db45b7682d24b17b3d60b58e000c7ad1ed5b1b0ef8059068b28d404efb494e535419f28b88406d2b010775d134a7ab4d2e9d24210be07d0d20a117d00000000000000000000000000000063c949fd77cd6b17e4ed7fac5b88ee25c0fb184c7bee57e56c3f40e555548f074de6771caa44e3ef3335c996d9dd565dca7aad15b0bc9dccad56fd1f12a499932cf4aa26a36a0f"], 0x22b) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f0000000300)=ANY=[]) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000240)={0x7}, 0x7) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000100)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) epoll_create1(0x80000) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00'}, 0x10) creat(&(0x7f0000000000)='./file0\x00', 0x0) 07:34:26 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) splice(r1, &(0x7f0000000380)=0x100, r2, &(0x7f00000003c0)=0x7723, 0xfffffffffffffffa, 0x8) connect$bt_sco(r0, &(0x7f0000000040), 0x8) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sendmsg$TIPC_NL_BEARER_GET(r3, &(0x7f0000000340)={&(0x7f0000000080), 0xc, &(0x7f0000000300)={&(0x7f00000007c0)=ANY=[@ANYBLOB="015909000000000000800000", @ANYRES16=r4, @ANYBLOB="00082dbd7000fbdbdf2504000000200007800c0003000500000000000000080001000200000008000100f7ffffff30000780080001009a6900000c0004000600000000000000080002000300000008000200020000000800010004000000180006800400020008000100ff0f00000400020004000200dc0004800900010073797a300000000044000780080001001e00000008000400070000000800030004000000080004000100008008000200ff0100000800030009000000080001000600000008000100180000000c00078008000300070000003c000780080002000200000008000300000200000800040005000000080001001f0000000800010016000000080004000000000008000200040000002c000780080002000700000008000400090000000800030000040000080003003f0000000800020000802204140007800800010000000000080001000d00000008000680040002009000048044000780080001001400000008000300050000000800010016000000080002000500000008000200030000000800040001040000080004000400000008000400020000003c00078008000300060000000800020003000000080001000b0000000800020003000000080001001f00000008000400aee9000008000200a90000000900010073797a3000000000"], 0x1f0}, 0x1, 0x0, 0x0, 0x804}, 0x4000) 07:34:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x7fff) ioctl$DRM_IOCTL_AUTH_MAGIC(r4, 0x40046411, &(0x7f0000000000)=0xff80) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000700)={0x4}) 07:34:26 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x42000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x4, 0x1000, &(0x7f0000fff000/0x1000)=nil}) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000040)={0x4, 0x0, &(0x7f0000f15000/0x3000)=nil}) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r3) ioctl$RTC_IRQP_SET(r3, 0x4008700c, 0x151b) 07:34:27 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r3, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) setsockopt$inet_tcp_int(r3, 0x6, 0x19, &(0x7f00000000c0), 0x4) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f0000000080)=0x5, 0x4) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffe58) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000100)={r3}) getsockopt$EBT_SO_GET_INIT_INFO(r5, 0x0, 0x82, &(0x7f00000001c0)={'broute\x00'}, &(0x7f0000000240)=0x78) fchdir(r2) ioctl$KVM_GET_API_VERSION(r2, 0xae00, 0x0) 07:34:27 executing program 0: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffe58) connect$bt_sco(r0, &(0x7f0000000000)={0x1f, @fixed={[], 0x11}}, 0x8) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x7fff) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f00000000c0)=""/65) 07:34:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cuse\x00', 0x2, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000280)=0x2) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a40)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000001f0000000600000018070000000000001801000040000000000000000004000048060000480617004f128bbbb1e2245c48020000060000005c5a49fdb6d56cefa8cc96571314474da1b241ee354b198c3f76d08e", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB='\x00'/96], @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c7465720000000000000000000000000000000000000000000000000000000000004800444e5054000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010f3401ff0000000000000000000000000000000000000001ff010000000000000000000000000001000000ffffffffffffffff00ffffffff000000ffffffff00ffffff00ffffff0067726530000000000000000000000000626f6e645f736c6176655f30000000000000000000000000000000000000000000000000000000000000000000000000730001020200000000000000f80020010000000000000000000000000000000000000000000000002800727066696c7465720000000000000000000000000000000000000000000005000000000000002800727066696c7465720000000000000000000000000000000000000000000003000000000000002800434845434b53554d000000000000000000000000000000000000000000000100000000000000fe8000000000000000000000000000aaff02000000000000000000000000000100000000ffffffff0000000000000000ff000000ffffff00ffffffff00ffff0076657468305f766972745f77696669006970766c616e3000000000000000000000000000000000000000000000000000000000000000000000000000000000000c00ad030600000000000000a800f0000000000000000000000000000000000000000000000000004800444e5054000000000000000000000000000000000000000000000000000000000002000000000000000000000000ac14140a0000000000000000000000003006020000000000ff020000000000000000000000000001fe8000000000000000000000000000aa00000000ff000000e2ce4f630000000000000000000000ffffffff00ffffffff76657468305f766972745f7769666900766574683100000000000000000000000000000000000000000000000000000000000000000000000000000000000000840003052000000000000000d00018010000000000000000000000000000000000000000000000002800686c0000000000000000000000000000000000000000000000000000000003040000000000004800444e505400000000000000000000000000000000000000000000000000007f00000100000000000000000000000000000000000000000000000000000001251f683200000000fe880000000000000000000000000101fe880000000000000000000000000001ff000000ff000000ffffffff000000ffffffffff00ffffff000000000000000076657468315f746f5f626f6e6400000076657468305f746f5f68737200000000ff00000000000000000000000000000000000000000000000000000000000000320081074000000000000000e001080200000000000000000000000000000000000000000000000038017274000000000000000000000000000000000000000000000000000000000400000000000000050000000000000020050000fe8000000000000000000000000000bbfe8000000000000000000000000000aaff020000000000000000000000000001fe8000000000000000000000000000bb00000000000000000000000000000000fe880000000000000000000000000101fe880000000000000000000000000001fe8000000000000000000000000000bb00000000000000000000000000000000fe880000000000000000000000000101fe88000000000000000000000000010100000000000000000000000000000000fe8000000000000000000000000000aafe80000000000000000000000000003500000000000000000000000000000000ff0100000000000000000000000000010c00000028005443504d535300000000000000000000000000000000000000000000000001010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x778) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000100)={0x8, 0xff, 0x6, 0x0, 0x3, [{0x0, 0x2f, 0x401, [], 0x8}, {0x8, 0x80000001, 0x40, [], 0x2490}, {0x90, 0x0, 0x3, [], 0x1181}]}) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x40, &(0x7f0000000040)={[{@errors_continue='errors=continue', 0x3d}]}) 07:34:27 executing program 4: r0 = socket(0x23, 0x3, 0x0) write(r0, &(0x7f0000000000)="1c0000004a005f0214f90707000904000a00"/28, 0x37f) accept4$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000180)=0x1c, 0x80000) ioctl$USBDEVFS_CLAIMINTERFACE(0xffffffffffffffff, 0x8004550f, &(0x7f0000000040)=0xff) read(0xffffffffffffffff, &(0x7f00000001c0)=""/217, 0xd9) [ 1234.139451] REISERFS warning (device loop3): super-6506 reiserfs_getopt: bad value "continue=" for option "errors" [ 1234.139451] 07:34:27 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x6, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000040)="d781b08b5cdd", 0x0, 0x0, 0x24, 0x0, 0x0}) [ 1234.249045] REISERFS warning (device loop3): super-6506 reiserfs_getopt: bad value "continue=" for option "errors" [ 1234.249045] 07:34:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) fchdir(0xffffffffffffffff) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x60000, 0x0) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f00000002c0)="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") r4 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r4, r4, 0x0, 0x100020000) 07:34:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x50, 0x2, 0x6, 0x801, 0x0, 0x0, {0x0, 0x0, 0xfffc}, [@IPSET_ATTR_DATA={0x10, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @rand_addr=0x9}}]}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x7}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x3}]}, 0x50}}, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x600000, 0x0) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0xa0, r2, 0x400, 0x70bd29, 0x25dfdbfb, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x6}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x6, 0x4, 0x3}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6, 0x4, 0x3}}]}, 0xa0}, 0x1, 0x0, 0x0, 0x10}, 0x20008000) 07:34:27 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000005c0)={0x0, 0x4, 0x8, 0x100000001}) connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @local, 'macsec0\x00'}}, 0x1e) sendmmsg(0xffffffffffffffff, &(0x7f00000003c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="95bd917278a2a08273ab50033dbf9ff7487a4c081aca5e624b05e7107c696eedb1bbc5bc1055716f5e63b1c69b423b309f8040f513a273d31bdb81ea58c04019be3ecf36bd71c401fc49063bae3b67e095e43f21bdc2ec36825266a330553796eeb39db3528c17eb4dcd62249dc330fc12325e7df870861111cad6910a7d262e9cdf616369ce9c976a0f4310b536ec734fb2e3c82e0285b77722bfa0f44be4bfa8d2cfd49159a923da49", 0xaa}], 0x1, &(0x7f0000000100)=[{0x18, 0x109, 0x3, "db587da1d2aa62"}], 0x18}}, {{&(0x7f0000000140)=@can, 0x80, &(0x7f0000000380)=[{&(0x7f00000001c0)="688d42f2f9dbadfba5dce685653d5f8e9e4b68d8057bb9a3de334912352eb1befb1db20da25ad484988e5fb4a5ae9b2fed44afa21909e8ecc105c15aed8262c5c91082054e53f8296b1df97af980228415e45c6a7fc35013bd0e790f370f486fe18cb261773314d2b1b6153bbf8985bcbed89f4e275df6f8707fe9a7f1c766135b90d65729bcd89e9e2288d73661df4668f732d736018a4304a8cfa9de70292b44648741841bd5e4eb74d4b7f984ca7b29067e00fa25c752371e60232f51250a823115cedd140dc5864f6353397595179e36a7b312", 0xd5}, {&(0x7f00000002c0)="4aac5a7ec18eb5d34fb974782c492eca4e01582d9f236dcddf808e46a514f3b7a57134159796bfc6e2dbba8013813727ced743623500d1f9d33b5b19cec97dc36fb5ad0bfa69c7720d3d62bb3c4f17681844ceb398a24e9518085957264ca3357606276da9bfcfdefd77a5466e5e79cd9f4e53c8e6f509e00136f230709cd8642dd0dafabc", 0x85}], 0x2, &(0x7f0000000600)=ANY=[@ANYBLOB="f80000000000000005010000090000004182884c91f1a142707eb56ab37490bb69d96e5782771c2bbacdb1c8609f24d2ea1a085162d36b805fdc9a6a676d5c2f94017ad7e453f2b8fa6f96d5f8d3bd50b0e9733dd374302b7404abf208869fb031e50d6bf429dfdacc1942355666d2771473c6a22440e5041c6e8e1d2ecc03558621c4fd769161a47255ee7a9bcd698acd1841aec53825b65ca4cd64e01d7eecb4abb9b60fbb9a42a52b09d61006e904ee2d861da7d190b86dc4fd3aafd4072f3bac31d2973c09164c114fbb3dcd76527edb0d7f213e94ccdd5707210ebf3ae8195f0c42c628df9ca025fd0bcdc2a64be0126c00000000001000000000000000000000003e6b652221a5e52dd79c"], 0x108}}], 0x2, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000480)={0x0, 0x8000, 0x68, 0x5, 0x80}) 07:34:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) fchdir(0xffffffffffffffff) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x60000, 0x0) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f00000002c0)="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") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r4, 0x80000000}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)={r5, 0x2, 0x3, [0x4, 0x8001, 0x401]}, 0xe) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100020000) 07:34:28 executing program 4: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001580)=ANY=[@ANYBLOB="280000001e000100000000000100000007000040140000010000a061da3df1056d60646837e50000aed20000fdf1f9c51f9339e56afaf080c478c72df2a835b8ab4c79b7d3a38a06df2bffcb300c10c2c76d311b8572dc8af1079a167b33a41606a9fda185b97fd192a9434f127328eb4e1a9f02cc4a738f4e122c1f5df301c50e150b86d06663b7158efc0f7379bc6e3c4ed1d5e64dda5171cdef63e2becd397961e093b4911cf945c632cd7e2e1314f936a76d08a1296de4d3aaae2ea208bc9219401b86bca29312951c11fd33aa773fb80ef12e1577a847c464f56a4200"/235], 0x28}}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="220000002000070700be0000090007010a", 0x11) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000001680)={0x0, 0x9, 0x4, 0x2000010, 0x1, {0x0, 0x2710}, {0x5, 0xc, 0x9, 0x80, 0x0, 0x98, "1080eff8"}, 0xb14, 0x4, @offset=0x7fff, 0x3, 0x0, r0}) ioctl$VIDIOC_SUBDEV_G_SELECTION(r2, 0xc040563d, &(0x7f0000001700)={0x1, 0x0, 0x100, 0x1, {0x5, 0x0, 0x7fffffff, 0x3}}) process_vm_readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/102, 0x66}], 0x1, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/226, 0xe2}, {&(0x7f00000002c0)=""/5, 0x5}, {&(0x7f0000000300)=""/83, 0x53}, {&(0x7f0000000380)=""/61, 0x3d}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/76, 0x4c}, {&(0x7f0000001440)=""/89, 0x59}, {&(0x7f00000014c0)=""/5, 0x5}], 0x8, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) 07:34:28 executing program 3: mknod(&(0x7f0000000200)='./bus\x00', 0x1000, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x2, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x42202, 0x0) splice(r0, 0x0, r1, 0x0, 0x3, 0x0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x40227e, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = dup2(r2, r1) write$FUSE_IOCTL(r6, &(0x7f0000000000)={0x20, 0xfffffffffffffff5}, 0x20) 07:34:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) fchdir(0xffffffffffffffff) socket$inet6_sctp(0xa, 0x10000000005, 0x84) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x60000, 0x0) r3 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r3, r3, 0x0, 0x100020000) 07:34:28 executing program 5: prctl$PR_SET_TSC(0x1a, 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0xf000, 0x1000, &(0x7f0000fff000/0x1000)=nil}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x200002, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0x2) ioctl$TIOCMIWAIT(r2, 0x545c, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) [ 1234.898391] kauditd_printk_skb: 2 callbacks suppressed [ 1234.898400] audit: type=1800 audit(1583220868.139:11507): pid=11696 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed" comm="syz-executor.5" name="file0" dev="sda1" ino=17329 res=0 07:34:28 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000040), 0x8) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffe58) bind$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) 07:34:28 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PDEATHSIG(0x1, 0xe) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x8, 0x262080) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000340)={0x5, 0x1, "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"}) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x801}, 0x20}}, 0x0) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}, 0x8f}, 0x1c) r6 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r6, 0x800448d3, &(0x7f0000000240)={@any, 0x10000, 0x7f, 0x9, 0x400, 0x6, "5760bca456f9fa584dfc1ec9ff20ad8ffb1f83b84305dd9ff68aef7c1cace2b1304beb9d082074dd3fee3bbbd67fe8b5dd38143d7f1d51e7aa5b781d64e91273b43404871045499b1cb6ec2ca0e7a214570b8edcebfad1f3919ede325f4db9dfe5c9bcd9bf26ad267b5eeb389d17d94b596e31a53e3e64595838be7c21752376"}) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x29, 0x1, &(0x7f0000000c80), 0x4) 07:34:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) fchdir(0xffffffffffffffff) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r3, r3, 0x0, 0x100020000) 07:34:28 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)={0x81}) 07:34:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) fchdir(0xffffffffffffffff) r3 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r3, r3, 0x0, 0x100020000) 07:34:28 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x410501, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x7fff) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f00000000c0)={0x34, 0x0, &(0x7f0000000080)}) 07:34:28 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) signalfd4(r0, &(0x7f0000000300)={[0x3]}, 0x8, 0x180800) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000040)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, 0x2, 0x20}) syz_mount_image$xfs(&(0x7f00000001c0)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000005c0)=[{0x0, 0x0, 0x1400000000000}, {&(0x7f0000000200)="c7f1e8b036e886e24b1096c47f0a24eb36257c8ce5b469b4b8e3d5a53ce2102e4d1e99696fb71479b4261893ec372dee4601f246d6f29aa4a6bd741645ff1b101254a271930505630257747e61e5237a99cbdc80fe22abfb1d18be3dfb768ac3648cf971e5ae2e8fe4921f4100de5558d871c4dd90d213bc79fec4808ff9c9bad1b26e1a02e0a641159141724886fce40fe3bdebf6bd7ed87c4456dbf2e597e7cf1046118e7a84bade8dbe65b89d624364c54c7d9408f89f0f3a22552f43a5dcb77bde05693860a8772c4c80c2d4a47aeb47b2a812ec932c2a7df3ce", 0xdc}, {&(0x7f00000004c0)="f0554eee66b67a282ca567066081d670bf7ba116e78f4cf1509fc9e7ed600f1bcdfe23efb9c924050a958040c9211a36d0a365a1f3a640c24f981a3e35bd74b0b19c216e5215537584c37a10502eb8c14933538afd0edc457328a25e1d6ed475", 0x60, 0x6}], 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/seq/clients\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000100)={0x0, {}, 0x0, {}, 0x0, 0x3, 0x3, 0x6, "a036348ed20df90d85549793acf38cfbe846178ea1cc7b7513484068e2d2b7a138ea0a6f83be48c3f99ff9416526d9b7a719505c7979ad9341d0964109d77d49", "92af86f9ebe0ba6cb921ff3d09497f6cbbbc374b933758bcd0386a36707ab0cd", [0xdf1, 0x7]}) 07:34:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) fchdir(0xffffffffffffffff) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x60000, 0x0) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f00000002c0)="e1f3b8865797dcca3a6e3c98ebed76ec8595e991fb61b5994813b67a252afa3a1c44740a4ed61acd6e0c2656fc1c005dc99d6bff57b3cea24be54c53f26ebffa0d1e15513460df34bc488b990d70064058d99fa8847413345d7af108015785254d578330c526be929ec33a00ab8f1a285b17ece8109adc48726b67754b268d702f9af7148d5b61a39a91b93f2e8b54fc7dfbfc8bb4ca0763c1ca3eb6e4a3dd49a086b7863e0166aba3c682858cccc9b0304b8d6929f2a44a498a5e5829ad761ed2578c4fa360b10314390277dfd444547d7f23c784c47d4014efc46f30cca8e9eb7c66961a73366a404185398872b19fe6cee31f91bad0a524795ec05355a92a") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r4, 0x80000000}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)={r5, 0x2, 0x3, [0x4, 0x8001, 0x401]}, 0xe) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100020000) 07:34:28 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/avc/hash_stats\x00', 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000380)={&(0x7f00000003c0)="1c7534ca00a740ec7f2c4537e58c69b9315ba3bba4ef5cffd6e8feb9482fecfab4cf0367260fd2f2006b52a997607a16f10d625a93b71f977534241578947a4f68b76a25378d27ab3ac7df3ce2e836026233bfa7df4c784a65d3d288e248eb98a006329b4105b4153bf3f0d403318f6f5e0e5fcd8a8157ffffff7f0000000064ac", &(0x7f0000000180)=""/239, &(0x7f0000000280)="815db5062e547d8de6eab8a08b257af72b99eac2519afb341da5c496ead18817fca684810f1a3c178603096a0905df099f893403511e76453f597c76a1059fb3682773a72255080f031baff9c3b0d73f9188d12a6249936c4aecdef016b98d16a38e1623d02c6eea9a531e18dc7a52c68a4968fcba08a1eec17026342592cf1a751a4151978a050a485db24b187983299d2317992811c4bf3fa5bf773b33c408186d1830f0", &(0x7f0000000100)="e66af73cbf3fd0d6f8a7971983113d6eb033a1b0f4c0e520", 0x5, r2}, 0x38) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r3, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) setsockopt$inet_tcp_int(r3, 0x6, 0x19, &(0x7f00000000c0), 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000480)='tls\x00', 0x4) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000080)={@local, @multicast1, 0x1, 0x4, [@multicast1, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback]}, 0x20) [ 1235.556868] XFS (loop4): Invalid superblock magic number 07:34:29 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xfffffffffffffffe}, 0x0, 0x5, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x1a7) socket$inet(0x2, 0x803, 0xa0) connect(0xffffffffffffffff, &(0x7f0000000340)=@l2tp6={0xa, 0x0, 0x8, @remote, 0x80000000}, 0x80) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000000)={{}, {}, 0x0, {0x2, 0x0, @broadcast}, 'veth0_to_bond\x00'}) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) stat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f0000000700)='./file0\x00', &(0x7f00000003c0), 0x800) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f00000002c0), 0x2500) setresgid(0x0, 0x0, 0x0) setresgid(0x0, r4, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents(r5, &(0x7f0000000000)=""/62, 0xd6147cbb6f273a13) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='schedstat\x00') sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) r7 = creat(0x0, 0x0) lseek(r7, 0x7ffffc, 0x0) socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @empty}, 0x10) sendmmsg(r1, &(0x7f0000006d00), 0x0, 0x1ffffffe) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r8 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r8, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r8, &(0x7f0000006d00), 0x800000000000237, 0x1ffffffe) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000fb00000000000000424d86a0e70e1570d1ed7a0c697db55fca8131474efafd2555902f570c7ca1c719486009160bb419f3e41f8b4aa8479e1f7e64c4d4607ea223d910670fba14fa0b822f1ad3fec73db5d73b2669abe0e80c41df5dd2a582f02805beee00"], 0x1c}}, 0x0) 07:34:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) r3 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r3, r3, 0x0, 0x100020000) 07:34:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:29 executing program 0: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x51) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffe58) bind$l2tp6(r2, &(0x7f0000000000)={0xa, 0x0, 0xfa98, @empty, 0x7, 0x4}, 0x20) fallocate(r1, 0x0, 0x0, 0x7fff) connect$bt_sco(r1, &(0x7f0000000040)={0x1f, @fixed={[], 0x10}}, 0x8) 07:34:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x0, @dev, 0x0, 0x0, 'lblcr\x00'}, 0x2c) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="340100001000010800"/20, @ANYRESOCT, @ANYBLOB="200000000000000008000400", @ANYRES32=r3, @ANYBLOB="1400030076657468315f746f5f62726964676500050021000300000024002b8008000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="000001000080000000000000", @ANYRES32=r4, @ANYBLOB="08001b0003000000240024006512da13406fe15c29f5d228c5792f40ff6af4c62ffe60880a2390cdc33e80ff1400030076657468315f6d6163767461700000007c003480140035007465616d5f736c6176655f31000000001400350076747468315f746f5f68737200000000140035007663616e3000000000000000000000001400350076657468305f766972745f77696669001400350073697430000000000000000000000000140035007767320000000000000000000000000008002e00080000000500100084000000"], 0xb}, 0x1, 0x0, 0x0, 0x800}, 0x0) bind(r0, &(0x7f0000000180)=@can={0x1d, r3}, 0x80) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0xfffffffd, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x2]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) recvmsg(r5, &(0x7f00000009c0)={&(0x7f00000007c0)=@x25, 0x80, &(0x7f0000000880)=[{&(0x7f0000000040)=""/38, 0x26}, {&(0x7f0000000840)=""/37, 0x25}], 0x2, &(0x7f00000008c0)=""/198, 0xc6}, 0x60) 07:34:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) getuid() ioctl$VIDIOC_DBG_G_CHIP_INFO(0xffffffffffffffff, 0xc0c85666, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='smaps_rollup\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001180)=ANY=[@ANYRES16=r1, @ANYRES32=0x0, @ANYRES16=r0], 0x3}}, 0x20000810) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='smaps_rollup\x00') ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f0000000140)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001180)=ANY=[@ANYRES16=r2, @ANYRES32=0x0, @ANYRES16], 0x3}}, 0x20000810) lstat(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) r5 = syz_open_procfs(0x0, &(0x7f0000000580)='net/ip_vs\x00') getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000480)={'nat\x00'}, &(0x7f0000000200)=0x54) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001180)=ANY=[@ANYRES16=r5, @ANYRES32=0x0, @ANYRES16=r4], 0x3}}, 0x20000810) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {0x1, 0x2}, [{0x2, 0x2}, {}], {}, [{0x8, 0x0, r0}, {0x8, 0x4}, {0x8, 0x0, r0}, {0x8, 0x0, r0}, {0x8, 0x2, r0}, {0x8, 0x1}, {0x8, 0x6}, {0x8, 0x3, r3}, {0x8, 0x2, r4}], {0x10, 0x5}, {0x20, 0x1}}, 0x7c, 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) mknod$loop(&(0x7f0000000000)='.//ile0\x00', 0x0, 0x0) socket(0x0, 0x0, 0x1f) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, &(0x7f0000000100)) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r6, &(0x7f0000000180)='.//ile0\x00', r6, &(0x7f00000007c0)='./file0/f.le.\x00') 07:34:29 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x140, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffe58) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x7fff) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x208000, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r3, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 07:34:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) fchdir(0xffffffffffffffff) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r4 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x60000, 0x0) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f00000002c0)="e1f3b8865797dcca3a6e3c98ebed76ec8595e991fb61b5994813b67a252afa3a1c44740a4ed61acd6e0c2656fc1c005dc99d6bff57b3cea24be54c53f26ebffa0d1e15513460df34bc488b990d70064058d99fa8847413345d7af108015785254d578330c526be929ec33a00ab8f1a285b17ece8109adc48726b67754b268d702f9af7148d5b61a39a91b93f2e8b54fc7dfbfc8bb4ca0763c1ca3eb6e4a3dd49a086b7863e0166aba3c682858cccc9b0304b8d6929f2a44a498a5e5829ad761ed2578c4fa360b10314390277dfd444547d7f23c784c47d4014efc46f30cca8e9eb7c66961a73366a404185398872b19fe6cee31f91bad0a524795ec05355a92a") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r5, 0x80000000}, &(0x7f0000000140)=0xc) r6 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r6, r6, 0x0, 0x100020000) 07:34:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r0, r0, 0x0, 0x100020000) 07:34:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r0, r0, 0x0, 0x100020000) 07:34:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r0, r0, 0x0, 0x100020000) 07:34:30 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="030000000000000000004500fde50000000000329078ac1e0001e000000100000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="500000009078000044"], 0xfdef) 07:34:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:30 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) mount(&(0x7f0000000200)=ANY=[@ANYRES64=0x0, @ANYRESDEC, @ANYRESDEC, @ANYRES16=0x0, @ANYRESHEX=r0, @ANYPTR=&(0x7f00000007c0)=ANY=[@ANYBLOB="00f8adc9fef7ca489dba9ef69bc2cfbc1f57c8913b9640a55ec3fab23c96e1481095c9911fb442696850d588ccee9c2130fcdcef3358f1a7aba60d49ed0782c5a42074964e0ea09ec2591b3b0b23624a1264fccc5c93c2a3869c6407f5474c5869e66e2993c6b43216e5d64e8a5c1b7b0db16e263766904808005971b39bae74b5221a75a522e49b64ec2e23aefc4c2b90ed5f96f9889cb3b80ad1b58bd1d4ba3b187b3d90b9f41f88e813d1106d0c6d5d599219b19eae1c1a6796af53132cb1cc3a95f9f778e5c7070050e456a8155413cb2ee767f5b1f4c22814a0cf81d0ebbeddfa8ff9da6aafe643", @ANYRESOCT=r1, @ANYBLOB="3efaf6ea107a2d7b1a5ee16afaf13baa11cad803e1e4cfa9d3aca5e545092c1af8bf66dbe10359efed9ed62c1d46b493a323b154bf4df203de5bf42ceb7fc5e4602bafff9424ddd40a6c69d2cd96a01abad66b3904841f3b40ec4c9fd1df0c58359301fee8e354510c30f286cbd2419c12a8c8deeafd689e11a4b0a22a9630d8b6c37167702f6fa51bb4b738062b051c0775af6e0f2a8f8d70ced642bac8e289e734d6d482605940a3ec7be899840a77aeee68f679c787860b07", @ANYRESHEX=r0, @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB="40f5e3c7f6ce61994c8a7dc66dd449a734a41d7fbc2b7866d9e76af0c4bfbeeb052a13adb99f0fd793a6beae149510f472377056cd23472b9b75a6cfe41541a0cd93f800a95f166758da3d20ddbb96ddd9a12cf51756a754d272dffa4f918fb5f6e18a8e0cf53ee176510c079bff4a145eaf019aa2d9aeede52b86cb3f626c8bbacc599bd3", @ANYBLOB="7528f6c4e31622e9"], @ANYRESOCT, @ANYRES16=0x0], @ANYBLOB="fec9d2c7a8f79c83b71b2a94bab7dbc48570e3b5a27393928beed50ff32166903c07e14e1d27bfe215e983afba691aef57a64d543a4d9e34f337010287e2", @ANYRESDEC], &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x0, 0x0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x7fff) recvmmsg(r1, &(0x7f0000001340)=[{{&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000a40)=[{&(0x7f00000002c0)=""/208, 0xd0}, {&(0x7f00000009c0)=""/93, 0x5d}], 0x2, &(0x7f0000000a80)=""/49, 0x31}, 0xffffffff}, {{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000000ac0)=""/169, 0xa9}, {&(0x7f0000000b80)=""/125, 0x7d}, {&(0x7f0000000c00)=""/235, 0xeb}, {&(0x7f0000000d00)=""/80, 0x50}, {&(0x7f0000000d80)=""/51, 0x33}, {&(0x7f0000000dc0)=""/101, 0x65}, {&(0x7f0000000e40)=""/43, 0x2b}], 0x7, &(0x7f0000000f00)=""/41, 0x29}}, {{&(0x7f0000000f40)=@ipx, 0x80, &(0x7f0000001140)=[{&(0x7f0000000fc0)=""/98, 0x62}, {&(0x7f0000001040)=""/249, 0xf9}], 0x2}, 0x398}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000001180)=""/192, 0xc0}], 0x1, &(0x7f0000001280)=""/136, 0x88}, 0x61}], 0x4, 0x10100, &(0x7f0000001440)={0x77359400}) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, 0xffffffffffffffff) 07:34:30 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x8000, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000040), 0x8) 07:34:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) fchdir(0xffffffffffffffff) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r4 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x60000, 0x0) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f00000002c0)="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") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x8) r6 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r6, r6, 0x0, 0x100020000) 07:34:30 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mknod$loop(&(0x7f00000003c0)='./bus/file1\x00', 0x0, 0x1) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffe58) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/73, 0x49}, {&(0x7f0000000140)=""/24, 0x18}], 0x3, &(0x7f00000001c0)=""/38, 0x26}, 0x2000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) lsetxattr$security_capability(&(0x7f0000000340)='./bus/file1\x00', &(0x7f0000000380)='security.capability\x00', 0x0, 0x0, 0x0) chown(&(0x7f0000000600)='./bus/file1\x00', 0x0, 0x0) 07:34:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r2 = dup3(r1, 0xffffffffffffffff, 0x80000) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r2, 0x54a2) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r4, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 07:34:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:31 executing program 3: r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000800)) fchdir(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r3 = accept$netrom(0xffffffffffffffff, &(0x7f0000000100)={{0x3, @null}, [@remote, @bcast, @null, @bcast, @bcast, @remote, @default, @null]}, &(0x7f00000001c0)=0x48) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000380)={r2, r3, 0x92, 0xbe, &(0x7f00000002c0)="c38968f1435313c138869de966cc20f9d20dcfd48afda4a7c3fce88f601048de6b426ef40e83eb1d6635bc309c34b10d8572f7e2acd145ac4ed4613042dc4503c7bfd6181a38c02b4120af546a83740a983f58f2d86afe5c68b9b457c062f8eba0a4e073723e00ddeb438db13a47bdcf9c34a3a099db9e37b18692232125aecf101920bc48eed30e15e16b389da8adbf259c62e096e8efb5ceea5aba0a822c8eb882f730c5bb36392695cd2e082319e8837d07b4d08b21a7a5ac7c1f781f", 0xed, 0x20, 0xf0d, 0x5, 0x4, 0x1, 0x0, 'syz0\x00'}) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r6 = openat$cgroup_ro(r0, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r6, 0x84, 0x21, &(0x7f0000000240)=0x3ff, 0x4) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000005c0)=0x14) openat$cgroup_int(r0, &(0x7f00000007c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000280)={0x0, 0xfffffffffffffe35, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="3800000024006d7f528e09000000000000000058", @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100686866000c00020008000300000000335a18edbb00"], 0x38}}, 0x0) [ 1237.824241] overlayfs: './file0' not a directory 07:34:31 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x3, 0x3, 0x0, 0x2000, &(0x7f0000f2e000/0x2000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 07:34:31 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000040), 0x8) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000000)) 07:34:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:31 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x55a3899244379708, 0x0) open_by_handle_at(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x800) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 07:34:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="580000000206010000000000000000000000000013000300686173683a6e65742c6966616365000005000400000000000900020073797a30000000001c00078008000640000000000500010002000000f900f612e2102d770d26af72deb12433c98a6609445d3a8151fcfdff29e7ad7e8285089376dcb696240cb7b39cb76f8a69b330d71dbd00"/148], 0x58}}, 0x0) 07:34:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:31 executing program 0: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='gfs2\x00', 0x800000, &(0x7f0000000100)='.vboxnet1\x00') r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x7fff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) ftruncate(r1, 0xcc) connect$bt_sco(r0, &(0x7f0000000040)={0x1f, @none}, 0x8) [ 1238.345699] gfs2: invalid mount option: .vboxnet1 [ 1238.359686] gfs2: can't parse mount arguments [ 1238.474078] overlayfs: './file0' not a directory 07:34:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) fchdir(0xffffffffffffffff) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r4 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x60000, 0x0) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f00000002c0)="e1f3b8865797dcca3a6e3c98ebed76ec8595e991fb61b5994813b67a252afa3a1c44740a4ed61acd6e0c2656fc1c005dc99d6bff57b3cea24be54c53f26ebffa0d1e15513460df34bc488b990d70064058d99fa8847413345d7af108015785254d578330c526be929ec33a00ab8f1a285b17ece8109adc48726b67754b268d702f9af7148d5b61a39a91b93f2e8b54fc7dfbfc8bb4ca0763c1ca3eb6e4a3dd49a086b7863e0166aba3c682858cccc9b0304b8d6929f2a44a498a5e5829ad761ed2578c4fa360b10314390277dfd444547d7f23c784c47d4014efc46f30cca8e9eb7c66961a73366a404185398872b19fe6cee31f91bad0a524795ec05355a92a") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0], &(0x7f000095dffc)=0x8) r5 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r5, r5, 0x0, 0x100020000) 07:34:31 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, 0x0, 0x2, 0x70bd2a, 0x25dfdbfc, {}, [@NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x3}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000800) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 07:34:31 executing program 3: setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) creat(0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002900)=[{{0x0, 0x0, 0x0}, 0xfffff258}], 0x1, 0x40000103, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x10000000000001, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000380)='net/route\x00') preadv(r5, &(0x7f00000017c0), 0x1a0, 0xf0ffff) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r7, 0xae60) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) r8 = dup3(r6, r7, 0x0) write$FUSE_BMAP(r8, &(0x7f00000000c0)={0x18, 0x0, 0x1, {0x6}}, 0x18) dup2(r8, 0xffffffffffffffff) r9 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r9) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r9, 0x40045730, &(0x7f0000000140)=0xffffffff) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ppoll(&(0x7f0000000500)=[{r1, 0x2103, 0x64}], 0x1, &(0x7f0000000580)={0x0, r10+10000000}, 0x0, 0x0) 07:34:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:31 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000040), 0x8) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) setsockopt$ax25_SO_BINDTODEVICE(r1, 0x101, 0x19, &(0x7f0000000140)=@rose={'rose', 0x0}, 0x10) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x400080, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000a00)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="16c608000000000000", @ANYRES16=r3, @ANYBLOB="170000000000000000000800000018000480"], 0x3}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f00000001c0)=0x401, &(0x7f0000000240)=0x2) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f00000003c0)=ANY=[@ANYBLOB="7261730000000000000000000000000000000000000000000000000000000000c1030000030000007003000000000000000000000000000000000000b8010000a0020000a0020000a0020000a0020000a00200000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000035537c210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000005001b80100000000000000000000000000000000000000000000000050006d756c7469706f72740000000000000000000000000000000000000000010400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005800686173686c696d69740000000000000000000000000000000000000000016261746164765f736c6176655f300000000000000000000000000000000000000000000000000000000000000000000000000000000000006800435400000000000000000000000000000000000065bb8f57d088cc57000100000000000000000000000073797a3000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800e80000000000000000000000000000000000000000000000000040005443504f505453545249500000000000000000000000000000000000000000000000000000000000cbe7d103da241a9400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x3d0) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r6 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r6, &(0x7f0000000080)='threaded\x00', 0xfffffe58) ioctl$VIDIOC_TRY_EXT_CTRLS(r6, 0xc0205649, &(0x7f0000000c00)={0x5737bb03bdcbea99, 0x3, 0x3ff, r2, 0x0, &(0x7f0000000bc0)={0x9b0971, 0x7, [], @value64=0x8}}) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000c80)='nl80211\x00') sendmsg$NL80211_CMD_SET_WIPHY(r7, &(0x7f0000000d80)={&(0x7f0000000c40), 0xc, &(0x7f0000000d40)={&(0x7f0000000cc0)={0x54, r8, 0x121, 0x70bd2a, 0x25dfdbfc, {}, [@NL80211_ATTR_TXQ_QUANTUM={0x8, 0x10c, 0x8}, @NL80211_ATTR_WIPHY_FRAG_THRESHOLD={0x8, 0x3f, 0x800}, @NL80211_ATTR_WIPHY_RTS_THRESHOLD={0x8, 0x40, 0x3}, @NL80211_ATTR_WIPHY_FRAG_THRESHOLD={0x8, 0x3f, 0xffffffff}, @NL80211_ATTR_TXQ_LIMIT={0x8, 0x10a, 0x8}, @NL80211_ATTR_TXQ_QUANTUM={0x8, 0x10c, 0xc62}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xff, 0x3}}, @NL80211_ATTR_WIPHY_DYN_ACK={0x4}]}, 0x54}, 0x1, 0x0, 0x0, 0x24000800}, 0x20000004) fallocate(r5, 0x0, 0x0, 0x7fff) ioctl$PPPIOCGL2TPSTATS(r5, 0x80487436, &(0x7f0000000380)="a533bfe285") getsockopt$sock_int(r4, 0x1, 0x7, &(0x7f0000000300), &(0x7f0000000340)=0x4) sendmsg$TIPC_NL_NAME_TABLE_GET(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000280)={&(0x7f00000007c0)={0x1c0, r3, 0x108, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_MEDIA={0x84, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_SOCK={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7ff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7d8746e4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x40000000}]}, @TIPC_NLA_NODE={0xc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10001}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}]}, @TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xa5}]}, @TIPC_NLA_LINK={0x84, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5a0d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}]}]}, 0x1c0}, 0x1, 0x0, 0x0, 0x2}, 0x100) 07:34:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x15) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200000, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="4800000010000fff00"/20, @ANYRES32=r3, @ANYBLOB="00000000000000002000128008000100687372001400028c08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="0500110001000000"], 0x7}}, 0x800) 07:34:31 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:32 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000063, 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0/file0\x00', &(0x7f0000000340)='./file0\x00') lsetxattr$trusted_overlay_redirect(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0/file0\x00', 0x5d, 0x2) r5 = add_key(&(0x7f0000000000)='blacklist\x00', 0x0, 0x0, 0x0, 0x0) r6 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="0c417e6ce7838595cfa349d6fb4f77c6ca7f78aa5505ade07fee577d8bf3eb2f198a7c6868e0601454944d10e0a4baf162ca81a9182b2e35019cbd87f35e384db4a2595b88ecf168b9259d077bed41c092a0d772b65a832606bc03b9e8b9", 0x5e, 0xfffffffffffffff8) r7 = add_key(&(0x7f00000006c0)='ceph\x00', &(0x7f0000000700)={'syz', 0x2}, &(0x7f0000000740)="454daa21a4b5f6de00fbf3c6b0574c5289e3511c0ef9ec1b6843e15af74c60c7592446bfca8dbe4556ba2d3d67abbe33c60faf6f9cc6e3e146466ad6", 0x3c, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000780)={r5, r6, r7}, 0x0, 0x0, &(0x7f0000000a00)={&(0x7f00000008c0)={'sha3-224-ce\x00'}, &(0x7f0000000900)}) r8 = request_key(&(0x7f0000000380)='trusted\x00', &(0x7f00000005c0)={'syz', 0x2}, &(0x7f0000000600)=',\x00', r5) r9 = add_key(&(0x7f0000000000)='blacklist\x00', 0x0, 0x0, 0x0, 0x0) r10 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="0c417e6ce7838595cfa349d6fb4f77c6ca7f78aa5505ade07fee577d8bf3eb2f198a7c6868e0601454944d10e0a4baf162ca81a9182b2e35019cbd87f35e384db4a2595b88ecf168b9259d077bed41c092a0d772b65a832606bc03b9e8b9", 0x5e, 0xfffffffffffffff8) r11 = add_key(&(0x7f00000006c0)='ceph\x00', &(0x7f0000000700)={'syz', 0x2}, &(0x7f0000000740)="454daa21a4b5f6de00fbf3c6b0574c5289e3511c0ef9ec1b6843e15af74c60c7592446bfca8dbe4556ba2d3d67abbe33c60faf6f9cc6e3e146466ad6", 0x3c, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000780)={r9, r10, r11}, 0x0, 0x0, &(0x7f0000000a00)={&(0x7f00000008c0)={'sha3-224-ce\x00'}, &(0x7f0000000900)}) r12 = request_key(&(0x7f0000000640)='cifs.spnego\x00', &(0x7f0000000680)={'syz', 0x2}, &(0x7f00000006c0)='/dev/loop#\x00', r9) keyctl$negate(0xd, r8, 0x200, r12) setxattr$trusted_overlay_origin(&(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000240)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x5) socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000100)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) r13 = dup3(r0, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_nlink(r13, 0x0, &(0x7f0000000300)={'U+', 0x8}, 0x16, 0x0) 07:34:32 executing program 5: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f000001d080)={&(0x7f0000000100)={0x20, r2, 0x709, 0x0, 0x0, {}, [@NL80211_ATTR_WDEV={0xc}]}, 0x20}}, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x60, r2, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_REG_RULES={0x3c, 0x22, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x2}, @NL80211_ATTR_FREQ_RANGE_END={0x8}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x2}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0xc6}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x2}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x9}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x4}]}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x9}, @NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0x60}, 0x1, 0x0, 0x0, 0x10}, 0x11) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x7fff) ioctl$VIDIOC_RESERVED(r5, 0x5601, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r4, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 07:34:32 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x61aa01, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x2710, 0x3, 0x0, 0x1000, &(0x7f0000c36000/0x1000)=nil}) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x7fff) setsockopt$netlink_NETLINK_NO_ENOBUFS(r2, 0x10e, 0x5, &(0x7f00000004c0)=0x1, 0x4) r3 = socket$inet6(0xa, 0x804, 0x7) recvmsg(r3, &(0x7f0000000480)={&(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/185, 0xb9}, {&(0x7f0000000280)=""/232, 0xe8}], 0x2, &(0x7f0000000380)=""/195, 0xc3}, 0x40010301) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 07:34:32 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) [ 1239.332569] could not allocate digest TFM handle sha3-224-ce [ 1239.360945] could not allocate digest TFM handle sha3-224-ce 07:34:32 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) fchdir(0xffffffffffffffff) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r4 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x60000, 0x0) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f00000002c0)="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") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r5 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r5, r5, 0x0, 0x100020000) 07:34:32 executing program 1: mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0xfc, 0x2e5}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000080)=0x400, &(0x7f0000000100)=0x4) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="38001e0010220000008000"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100736974000c00028008000300", @ANYRES32=0x0, @ANYBLOB], 0x38}}, 0x0) 07:34:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x7fff) ioctl$TCSETX(r2, 0x5433, &(0x7f0000000080)={0x8, 0x8000, [0x1, 0x1, 0x5, 0x80, 0x8], 0x6}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) [ 1239.597767] audit: type=1804 audit(1583220872.839:11508): pid=11976 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir877835599/syzkaller.pzADnu/1329/file0" dev="sda1" ino=16673 res=1 [ 1239.683768] could not allocate digest TFM handle sha3-224-ce [ 1239.716493] audit: type=1800 audit(1583220872.839:11509): pid=11976 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed" comm="syz-executor.0" name="file0" dev="sda1" ino=16673 res=0 [ 1239.772585] audit: type=1804 audit(1583220872.869:11510): pid=12018 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir877835599/syzkaller.pzADnu/1329/file0" dev="sda1" ino=16673 res=1 07:34:33 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) r2 = semget$private(0x0, 0x3, 0x23) semctl$SETALL(r2, 0x0, 0x11, &(0x7f0000000080)=[0x2, 0x0]) 07:34:33 executing program 1: mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:33 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) capget(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x7fff) r3 = openat(r2, &(0x7f0000000240)='./file0\x00', 0x400, 0x10) ioctl$IMCLEAR_L2(r3, 0x80044946, &(0x7f0000000280)=0x17d) listen(r1, 0x0) socket$unix(0x1, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$setpipe(r4, 0x407, 0xfffffffffffffffe) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xfe}}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r5 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) r6 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r6) ioctl$VT_ACTIVATE(r6, 0x5606, 0xffffffffffffff70) r7 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r7, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r7) sendfile(r4, r5, 0x0, 0x102000004) socket(0x0, 0x0, 0x8) r8 = syz_open_dev$sndpcmc(&(0x7f0000000400)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffffc, 0x5a1700) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS_OLD(r8, 0xc1004111, &(0x7f0000000000)) socket$inet6_sctp(0xa, 0x0, 0x84) socket$inet6_sctp(0xa, 0x0, 0x84) 07:34:33 executing program 0: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffe58) connect$bt_sco(r0, &(0x7f0000000100)={0x1f, @fixed={[], 0x12}}, 0x8) [ 1239.844316] audit: type=1804 audit(1583220873.079:11511): pid=12019 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir877835599/syzkaller.pzADnu/1329/file0" dev="sda1" ino=16673 res=1 07:34:33 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f00000001c0)={{0xffffffffffffffff, 0x3, 0x80000000, 0x2, 0x3}}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x8000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x1fd, 0x2, 0x4000, 0x1000, &(0x7f0000fff000/0x1000)=nil}) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r3) write$FUSE_NOTIFY_POLL(r3, &(0x7f00000000c0)={0x18, 0x1, 0x0, {0x9}}, 0x18) 07:34:33 executing program 1: mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:33 executing program 3: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x204) r1 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf\x00\x00', 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$setown(r1, 0x8, 0x0) execveat(r1, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x100) [ 1240.285072] audit: type=1804 audit(1583220873.519:11512): pid=12055 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir757629939/syzkaller.rieSjx/1153/file0" dev="sda1" ino=16735 res=1 07:34:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:33 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x104, r2, 0x100, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0xb0, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc50f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe21d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff0}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x89eb}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_SOCK={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffffff48}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x800}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xb1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000005, 0x40010, r4, 0x2de1f000) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffe58) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000300)=0x51b616f0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$smc(&(0x7f00000009c0)='SMC_PNETID\x00') sendmsg$SMC_PNETID_GET(r5, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000a00)={0x14, r6, 0x1}, 0x14}}, 0x0) sendmsg$SMC_PNETID_FLUSH(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r6, 0x400, 0x70bd27, 0x25dfdbff, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000008}, 0x4040800) 07:34:33 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) fchdir(0xffffffffffffffff) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x60000, 0x0) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f00000002c0)="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") r4 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r4, r4, 0x0, 0x100020000) 07:34:33 executing program 3: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) recvmmsg(r1, &(0x7f0000001a40), 0x0, 0x40010002, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x1) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pivot_root(&(0x7f0000000180)='./file0\x00', 0x0) socket$packet(0x11, 0x0, 0x300) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x102}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') socket$packet(0x11, 0x3, 0x300) 07:34:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) [ 1240.551737] device lo entered promiscuous mode [ 1240.559608] device tunl0 entered promiscuous mode [ 1240.568341] device gre0 entered promiscuous mode [ 1240.576135] device gretap0 entered promiscuous mode [ 1240.585098] device erspan0 entered promiscuous mode [ 1240.594108] device ip_vti0 entered promiscuous mode [ 1240.605986] device ip6_vti0 entered promiscuous mode 07:34:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) [ 1240.628239] device sit0 entered promiscuous mode [ 1240.637376] device ip6tnl0 entered promiscuous mode [ 1240.645284] device ip6gre0 entered promiscuous mode [ 1240.654735] device syz_tun entered promiscuous mode [ 1240.662873] device ip6gretap0 entered promiscuous mode [ 1240.673953] bridge0: port 2(bridge_slave_1) entered disabled state [ 1240.680882] bridge0: port 1(bridge_slave_0) entered disabled state [ 1240.687752] device bridge0 entered promiscuous mode [ 1240.697660] device vcan0 entered promiscuous mode [ 1240.705408] device bond0 entered promiscuous mode [ 1240.711127] device bond_slave_0 entered promiscuous mode [ 1240.717055] device bond_slave_1 entered promiscuous mode [ 1240.726182] device team0 entered promiscuous mode [ 1240.731642] device team_slave_0 entered promiscuous mode [ 1240.737480] device team_slave_1 entered promiscuous mode [ 1240.746790] device dummy0 entered promiscuous mode [ 1240.757851] device nlmon0 entered promiscuous mode [ 1240.765157] device caif0 entered promiscuous mode [ 1240.773538] device batadv0 entered promiscuous mode [ 1240.783162] device vxcan0 entered promiscuous mode [ 1240.789942] device vxcan1 entered promiscuous mode [ 1240.796328] device veth0 entered promiscuous mode [ 1240.804437] device veth1 entered promiscuous mode [ 1240.812629] device veth0_to_bridge entered promiscuous mode [ 1240.824190] device veth1_to_bridge entered promiscuous mode [ 1240.838064] device veth0_to_bond entered promiscuous mode [ 1240.848072] device veth1_to_bond entered promiscuous mode [ 1240.857396] device veth0_to_team entered promiscuous mode [ 1240.876087] device veth1_to_team entered promiscuous mode [ 1240.888514] device veth0_to_batadv entered promiscuous mode [ 1240.897116] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1240.905344] device batadv_slave_0 entered promiscuous mode [ 1240.914737] device veth1_to_batadv entered promiscuous mode [ 1240.923755] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1240.931359] device batadv_slave_1 entered promiscuous mode [ 1240.940470] device veth0_to_hsr entered promiscuous mode [ 1240.961294] device veth1_to_hsr entered promiscuous mode [ 1240.985287] device veth1_virt_wifi entered promiscuous mode [ 1240.995243] device veth0_virt_wifi entered promiscuous mode [ 1241.017764] device vlan0 entered promiscuous mode [ 1241.023011] device vlan1 entered promiscuous mode [ 1241.052124] device macvlan0 entered promiscuous mode [ 1241.100291] device macvlan1 entered promiscuous mode [ 1241.108196] device ipvlan0 entered promiscuous mode [ 1241.113702] device ipvlan1 entered promiscuous mode [ 1241.170715] device macvtap0 entered promiscuous mode [ 1241.179120] device macsec0 entered promiscuous mode [ 1241.188405] device geneve0 entered promiscuous mode [ 1241.196840] device geneve1 entered promiscuous mode [ 1241.204624] device ip6gre1 entered promiscuous mode [ 1241.226968] device þ€ entered promiscuous mode [ 1241.232239] device veth2 entered promiscuous mode [ 1241.237419] device veth3 entered promiscuous mode [ 1241.243937] device sit2 entered promiscuous mode [ 1241.401016] audit: type=1804 audit(1583220874.639:11513): pid=12055 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir757629939/syzkaller.rieSjx/1153/file0" dev="sda1" ino=16735 res=1 07:34:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) fchdir(0xffffffffffffffff) socket$inet6_sctp(0xa, 0x10000000005, 0x84) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x60000, 0x0) r3 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r3, r3, 0x0, 0x100020000) 07:34:34 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)={'syz0'}, 0x4) write$P9_RXATTRCREATE(r0, &(0x7f0000000040)={0x3ba}, 0x7) ioctl$KVM_S390_INTERRUPT_CPU(0xffffffffffffffff, 0x4010ae94, &(0x7f0000000000)={0x0, 0x5, 0x7fffffff}) 07:34:34 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x675b, 0x0) write$UHID_INPUT2(r0, &(0x7f0000000080), 0x6) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x49, 0x1, {0x0, 0x4}}, 0x14) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r1, &(0x7f0000000040), 0x8) 07:34:34 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x20100, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000080)=0x100000000, 0x8) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) read(r3, &(0x7f00000001c0)=""/187, 0xbb) 07:34:34 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='clear_refs\x00') pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x6) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='pagemap\x00') sendfile(r1, r3, &(0x7f0000000040)=0x100060, 0xa808) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffe58) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r4, 0xc01064c7, &(0x7f00000002c0)={0x3, 0x0, &(0x7f0000000140)=[0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r2, 0xc01864c6, &(0x7f0000000300)={&(0x7f0000000100)=[0xfffffffc, 0x8, 0x8, 0xb28a], 0x4, 0x800, r5}) r6 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r6, 0x29, 0x2a, &(0x7f0000000200)={0x1, {{0xa, 0x4e23, 0xfffffffb, @loopback, 0xffffffe0}}}, 0x88) 07:34:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x10000, 0x3, 0x0, 0x1000, &(0x7f0000fff000/0x1000)=nil}) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x7eeb3b9fa49f699, 0x0) ioctl$TCSETSW2(r2, 0x402c542c, &(0x7f00000000c0)={0xfffffffe, 0x3f, 0x20, 0x6, 0x9f, "269b674dcb3adff7ab3809ef54a5543f2cb38a", 0x7, 0xb3}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 07:34:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) fchdir(0xffffffffffffffff) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r3, r3, 0x0, 0x100020000) 07:34:35 executing program 0: r0 = add_key(&(0x7f0000000000)='blacklist\x00', 0x0, 0x0, 0x0, 0x0) r1 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="0c417e6ce7838595cfa349d6fb4f77c6ca7f78aa5505ade07fee577d8bf3eb2f198a7c6868e0601454944d10e0a4baf162ca81a9182b2e35019cbd87f35e384db4a2595b88ecf168b9259d077bed41c092a0d772b65a832606bc03b9e8b9", 0x5e, 0xfffffffffffffff8) r2 = add_key(&(0x7f00000006c0)='ceph\x00', &(0x7f0000000700)={'syz', 0x2}, &(0x7f0000000740)="454daa21a4b5f6de00fbf3c6b0574c5289e3511c0ef9ec1b6843e15af74c60c7592446bfca8dbe4556ba2d3d67abbe33c60faf6f9cc6e3e146466ad6", 0x3c, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000780)={r0, r1, r2}, 0x0, 0x0, &(0x7f0000000a00)={&(0x7f00000008c0)={'sha3-224-ce\x00'}, &(0x7f0000000900)}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000000)='trusted\x00', &(0x7f0000000080)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r3, &(0x7f0000000040), 0x8) 07:34:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) ioctl$DRM_IOCTL_CONTROL(r2, 0x40086414, &(0x7f0000000080)={0x3, 0x7}) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffe58) r4 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x18300) ioctl$KVM_HYPERV_EVENTFD(r3, 0x4018aebd, &(0x7f0000000100)={0x4, r4, 0x1}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x7fff) read$rfkill(r5, &(0x7f0000000200), 0x8) 07:34:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) fchdir(0xffffffffffffffff) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r3, r3, 0x0, 0x100020000) 07:34:35 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00') r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r0, 0x0, 0x209) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000040)) mkdir(&(0x7f0000000000)='./bus\x00', 0x4) [ 1242.205455] could not allocate digest TFM handle sha3-224-ce [ 1242.260753] could not allocate digest TFM handle sha3-224-ce [ 1242.555333] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1242.569771] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1242.596835] bridge0: port 2(bridge_slave_1) entered disabled state [ 1242.652945] bridge0: port 1(bridge_slave_0) entered disabled state [ 1242.828815] audit: type=1804 audit(1583220876.069:11514): pid=12176 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="file0" dev="sda1" ino=17650 res=1 [ 1242.858622] audit: type=1804 audit(1583220876.069:11515): pid=12169 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="file0" dev="sda1" ino=17650 res=1 [ 1243.026339] team0 (unregistering): Port device team_slave_1 removed [ 1243.065324] team0 (unregistering): Port device team_slave_0 removed [ 1243.092304] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1243.136276] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1243.283606] bond0 (unregistering): Released all slaves [ 1245.362062] IPVS: ftp: loaded support on port[0] = 21 [ 1246.195935] chnl_net:caif_netlink_parms(): no params data found [ 1246.264806] bridge0: port 1(bridge_slave_0) entered blocking state [ 1246.271888] bridge0: port 1(bridge_slave_0) entered disabled state [ 1246.279185] device bridge_slave_0 entered promiscuous mode [ 1246.286583] bridge0: port 2(bridge_slave_1) entered blocking state [ 1246.293262] bridge0: port 2(bridge_slave_1) entered disabled state [ 1246.301343] device bridge_slave_1 entered promiscuous mode [ 1246.327895] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1246.337377] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1246.364342] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1246.372289] team0: Port device team_slave_0 added [ 1246.378180] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1246.385683] team0: Port device team_slave_1 added [ 1246.404979] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1246.411857] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1246.437460] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1246.448893] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1246.456148] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1246.481605] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1246.492480] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1246.500392] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1246.565337] device hsr_slave_0 entered promiscuous mode [ 1246.610636] device hsr_slave_1 entered promiscuous mode [ 1246.651150] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1246.658608] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1246.749696] bridge0: port 2(bridge_slave_1) entered blocking state [ 1246.756337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1246.763076] bridge0: port 1(bridge_slave_0) entered blocking state [ 1246.769614] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1246.813987] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1246.820918] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1246.831006] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1246.842100] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1246.849667] bridge0: port 1(bridge_slave_0) entered disabled state [ 1246.867266] bridge0: port 2(bridge_slave_1) entered disabled state [ 1246.879457] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1246.885879] 8021q: adding VLAN 0 to HW filter on device team0 [ 1246.896365] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1246.905052] bridge0: port 1(bridge_slave_0) entered blocking state [ 1246.911504] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1246.923893] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1246.931782] bridge0: port 2(bridge_slave_1) entered blocking state [ 1246.938167] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1246.959560] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1246.967920] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1246.979794] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1246.998281] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1247.008943] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1247.021653] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1247.029420] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1247.038251] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1247.046307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1247.064752] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1247.073089] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1247.079924] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1247.093967] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1247.181590] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1247.191114] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1247.201235] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1247.208430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1247.222333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1247.264027] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1247.272186] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1247.279062] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1247.290264] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1247.297095] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1247.305462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1247.314699] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1247.324846] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1247.334622] device veth0_vlan entered promiscuous mode [ 1247.348824] device veth1_vlan entered promiscuous mode [ 1247.356087] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1247.367638] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1247.385914] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1247.398405] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1247.405928] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1247.414898] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1247.422879] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1247.432262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1247.444680] device veth0_macvtap entered promiscuous mode [ 1247.451198] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1247.461632] device veth1_macvtap entered promiscuous mode [ 1247.468048] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1247.478077] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1247.488657] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1247.498798] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1247.509136] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1247.518504] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1247.528467] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1247.537927] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1247.547771] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1247.558296] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1247.565668] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1247.576724] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1247.584988] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1247.592925] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1247.601318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1247.612520] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1247.622830] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1247.633263] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1247.643445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1247.652810] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1247.662920] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1247.673360] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1247.683240] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1247.694156] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1247.702375] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1247.711012] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1247.721429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 07:34:42 executing program 3: creat(&(0x7f0000000080)='./file0\x00', 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x0, 0x7, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000040)) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@dev, 0xfffffffe}) 07:34:42 executing program 0: r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000000000)={0x5}) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r1, &(0x7f0000000040), 0x8) 07:34:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) fchdir(0xffffffffffffffff) r3 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r3, r3, 0x0, 0x100020000) 07:34:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x1, &(0x7f0000000200)=ANY=[@ANYBLOB="8500000012000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) r2 = socket(0x1, 0x803, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x2, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffe58) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x0, 0x80000000, 0x4}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r3, @ANYBLOB="af7e35b5b18cf224e5f9c0f3552d7e034f488cce879181acd87a8a0928069e2346d8e1872338fbb17486edc176edfcc7a1bddbb68e92bfe58d591d8b87c1dd95d946cbd1edf178954d6a60b63b860be4ae9a3a6ebc47bc1608de52b047e31594138ded07b0c77e6edf6cb5d38442444d015daaa94d4b62b3b07475736119f345c6385c597faccc6f696004c0154cb590653eb04b4d9b68901ca569a4507294ad11d8998d97d6d9f51dc74bf473bfaa98abfd4f06e174981b4152613bbdde463fd0e0310f9da2e5285f2050c21f3fb0e7962b1d769bb0629886afbd21a48e63e9c0bd9e3bbf8af791fd086ab4bf"], 0x3c}}, 0x0) 07:34:42 executing program 5: r0 = dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040)={r2}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000100)={r2, 0x7f}, 0x8) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffe58) bind$isdn_base(r5, &(0x7f00000000c0)={0x22, 0x20, 0x1f, 0x4, 0x40}, 0x6) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x1) ioctl$KVM_GET_DIRTY_LOG(r4, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 07:34:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) r3 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r3, r3, 0x0, 0x100020000) 07:34:42 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000040), 0x8) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f00000000c0)={0x80, 0xb, 0x4, 0x400000, 0x0, {r2, r3/1000+10000}, {0x2, 0x0, 0x7, 0x7, 0xea, 0x3f, "a5dc1728"}, 0x0, 0x4, @planes=&(0x7f0000000080)={0x1000, 0x5, @userptr=0x7, 0x800}, 0x40, 0x0, r0}) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000140)={0x0, @multicast2, @multicast1}, &(0x7f0000000180)=0xc) 07:34:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(0x0, 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(0x0, 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:43 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(0x0, 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:43 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0xc000, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f00000000c0)={@fixed={[], 0x56}, 0x1000}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="75396b5b2699b91fb8da36b548f347673cb35a4a97acd4f8260b3b120e0f377d5ddbd74d5c829d723edccd2743c0339be18197ccd36fcbb59dd2c96f57d2ef6a40f1391ef1e43d90d50e767f47c3c3f48f58d459a9782470273a7b03462c1f5a5b8e1e0019e2680b2925a4902049c165b87c1d85ff8a144008c365da265b0dca7c7809116f6fc6", @ANYRES16=r3, @ANYBLOB="000400000000040000000100e4ff04000500050000000400040014000100fe8000000000000000000000000000bb"], 0x34}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r3, 0x300, 0x70bd2d, 0x25dfd3fc, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xfffffffd}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xec00}]}, 0x24}, 0x1, 0x0, 0x0, 0x20068000}, 0x800) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2001, 0x0) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000300)={0x6, {0x0, 0x1f, 0x36, 0x1}, {0x5f, 0x4c3e, 0xa76}, {0xdbe1, 0x81}}) ioctl$DRM_IOCTL_MODE_CURSOR2(r4, 0xc02464bb, &(0x7f0000000340)={0xf29f845f4e3ca712, 0x8, 0x5, 0x6, 0x401, 0x8, 0x7, 0x81, 0x8}) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffe58) connect$bt_sco(r5, &(0x7f0000000000), 0x8) 07:34:43 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x88, 0x0, @rand_addr, @multicast1}, @dest_unreach={0x3, 0x0, 0x0, 0x0, 0x0, 0x6f, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @loopback}}}}}}, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffe58) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0x18f) [ 1249.937334] audit: type=1804 audit(1583220883.179:11516): pid=12272 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir757629939/syzkaller.rieSjx/1156/file0" dev="sda1" ino=17721 res=1 [ 1250.031095] audit: type=1800 audit(1583220883.179:11517): pid=12272 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed" comm="syz-executor.4" name="file0" dev="sda1" ino=17721 res=0 [ 1250.114217] audit: type=1804 audit(1583220883.179:11518): pid=12308 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir757629939/syzkaller.rieSjx/1156/file0" dev="sda1" ino=17721 res=1 07:34:43 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x1ff) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 07:34:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:43 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r0, r0, 0x0, 0x100020000) 07:34:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = request_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)='Z\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000000)='blacklist\x00', 0x0, 0x0, 0x0, 0x0) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="0c417e6ce7838595cfa349d6fb4f77c6ca7f78aa5505ade07fee577d8bf3eb2f198a7c6868e0601454944d10e0a4baf162ca81a9182b2e35019cbd87f35e384db4a2595b88ecf168b9259d077bed41c092a0d772b65a832606bc03b9e8b9", 0x5e, 0xfffffffffffffff8) r5 = add_key(&(0x7f00000006c0)='ceph\x00', &(0x7f0000000700)={'syz', 0x2}, &(0x7f0000000740)="454daa21a4b5f6de00fbf3c6b0574c5289e3511c0ef9ec1b6843e15af74c60c7592446bfca8dbe4556ba2d3d67abbe33c60faf6f9cc6e3e146466ad6", 0x3c, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000780)={r3, r4, r5}, 0x0, 0x0, &(0x7f0000000a00)={&(0x7f00000008c0)={'sha3-224-ce\x00'}, &(0x7f0000000900)}) keyctl$unlink(0x9, r2, r5) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0xd2) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000002c0)=0x7, 0x2da) setsockopt$inet_tcp_TCP_MD5SIG(r8, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x4e20, 0x3, @empty, 0x9b50}}, 0x0, 0x0, 0x18, 0x0, "266bf88393778c4a66e12ee8a2bd02e415b2d82e1143af641967e92376cb873af17e58d8d903d93bd43d640f49c3d7e52d1bedf01cdcc4367702e0133260ccc694062c4fe6905811cbb428908ca19056"}, 0xd8) fcntl$setpipe(r7, 0x407, 0x0) write(r7, &(0x7f0000000340), 0x41395527) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(0x0, 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f00000000c0)) r9 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc0000000000000, 0x5}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, r9, 0x0) write(r10, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) r11 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r11, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7e", 0x3f) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r11, 0x0) sendfile(r11, r11, &(0x7f0000000200), 0xff8) r12 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0xffff, 0x0, 0x0, 0xffffffffffffff7b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x40082406, &(0x7f0000000180)='Z\x00') 07:34:43 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r0, r0, 0x0, 0x100020000) 07:34:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:43 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = request_key(&(0x7f0000000040)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='-\x00', 0xfffffffffffffffa) keyctl$setperm(0x5, r0, 0x1043802) exit_group(0x0) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) pkey_alloc(0x0, 0x2) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000003000050ad22780648c6394fb0107fc001007b8400c000200053582c137153e37090001802564170400bd", 0x2e}], 0x1}, 0x0) 07:34:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r0, r0, 0x0, 0x100020000) 07:34:43 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r0, r0, 0x0, 0x100020000) [ 1250.547542] could not allocate digest TFM handle sha3-224-ce 07:34:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e3a66696c65302c777b63e8254dde5f5d7066bee3fb6f726be469723d2e"]) [ 1250.693111] device 0 entered promiscuous mode [ 1250.833165] overlayfs: unrecognized mount option "w{cè%MÞ_]pf¾ãûorkäir=." or missing value [ 1250.871799] overlayfs: unrecognized mount option "w{cè%MÞ_]pf¾ãûorkäir=." or missing value 07:34:44 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x7fff) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000000)) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r1, &(0x7f0000000040), 0x8) 07:34:44 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r0, r0, 0x0, 0x100020000) 07:34:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1) syz_emit_ethernet(0x4a, &(0x7f0000000300)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "083ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_emit_ethernet(0xa6, &(0x7f0000000140)={@local, @remote, @void, {@ipx={0x8137, {0xffff, 0x98, 0x2, 0x0, {@current, @random="e14564759e01", 0x2}, {@broadcast, @current, 0x8}, "3d5af55fb5035c7007ec9f5f3e432d1cd1850c9dd211ae4c55f9514b6acb578b86822e53c1b940e97a6d4089ed5e857fe21aa91ff2ede4977d2eeb9f8d10bf7a00ece3797edc0ae3b5f5d98dad4446477fe821843a3a1034ff8bdcc25fb66cb1c2b7f5b0c1bc8c9dd66ad39ffa94767a69dfd2a854b6b2be02f6"}}}}, 0x0) 07:34:44 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635202100000f22c067f3af", 0x3c}], 0x0, 0x0, 0x0, 0x68) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x133) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000fb], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:34:44 executing program 4: r0 = epoll_create1(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x41, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f00000000c0)) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x7fff) r3 = syz_open_pts(r2, 0x200) r4 = dup3(r3, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000000000)) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x7fff) ioctl$KVM_NMI(r5, 0xae9a) 07:34:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r0, r0, 0x0, 0x100020000) 07:34:44 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:44 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:44 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) connect$bt_sco(r0, &(0x7f0000000000)={0x1f, @none}, 0x8) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffe58) ioctl$VT_RELDISP(r2, 0x5605) 07:34:44 executing program 3: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x25008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$SNDCTL_DSP_STEREO(0xffffffffffffffff, 0xc0045003, &(0x7f0000000100)) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f00000000c0), 0x4) pipe(&(0x7f0000000280)) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 07:34:44 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:44 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_ro(r2, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x2343a726) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x7db101, 0x0) getsockopt$netrom_NETROM_T4(r4, 0x103, 0x6, &(0x7f00000002c0)=0xffffffff, &(0x7f0000000300)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f0000000840)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c1030000030000007003000000000000000000000000000000000000b8010000a0020000a0020000a0020000a0020000a002000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000005001b80100000000000000000000000000000000000000000000000050006d756c7469706f72740000000000000000000000000000000000000000010400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005800686173686c696d69740000000000000000000000000000000000000000016261746164765f736c6176655f30000000000000000000000000000000000000000000000000000000000000000000000000000000000000680043540000000000000000000000000000000000000000000000000000000100000000000000000000000073797a3000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800e80000000000000000000000000000000000000000000000000040005443504f505453545249500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000481e863cd39382cc6a70a93829e65e28db007ac376735df4fde05490e2d9fa90aa50f0cbeba5e992b1976a8186253f9b6554a53547a0db82f299815ba825d9780ec311a280e372823dbc96a275e617c401c19d88a082a270444b7998e1777182a0506010eaffc0c48ea9a20c7f2ee2c81e89a371ba6b62137d8da556045eb23a077f0870ed4f5775ec8431e7bb772df6dce684acc3fa43789a6e16f6"], 0x3d0) r8 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dsp\x00', 0x40000, 0x0) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/autofs\x00', 0x111800, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r10, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r11, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r12, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) ioctl$FIDEDUPERANGE(r6, 0xc0189436, &(0x7f0000000600)=ANY=[@ANYBLOB="ffff00000000000009000000000000000800000000000000", @ANYRES32=r0, @ANYBLOB="000000000500"/28, @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00U`\x00'/28, @ANYRES32=r8, @ANYBLOB="005d0000018000"/28, @ANYRES32=r9, @ANYBLOB="000000000300"/28, @ANYRES32=r10, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00|\x00'/28, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\a\x00'/28, @ANYRES32=r11, @ANYBLOB='\x00\x00\x00\x00\t\x00'/28, @ANYRES32=r12, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28]) fallocate(r5, 0x0, 0x0, 0x7fff) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000340)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x4, "d8b42b", "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"}}, 0x110) r13 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r13, 0x107, 0xb, &(0x7f0000000000), &(0x7f0000005500)=0x4) r14 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r15 = syz_open_dev$vcsa(&(0x7f0000000480)='/dev/vcsa#\x00', 0x26, 0x402) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r15, 0x84, 0x16, &(0x7f0000000500)=ANY=[@ANYBLOB="0100001aafc7"], &(0x7f0000000540)=0x6) ioctl$KVM_ARM_SET_DEVICE_ADDR(r15, 0x4010aeab, &(0x7f00000004c0)={0x5, 0x4000}) write$cgroup_type(r14, &(0x7f0000000080)='threaded\x00', 0xfffffe58) r16 = accept4$nfc_llcp(r14, &(0x7f00000000c0), &(0x7f0000000140)=0x60, 0x81c00) accept$nfc_llcp(r16, &(0x7f0000000200), &(0x7f0000000180)=0x60) 07:34:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:45 executing program 4: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x200, 0x0) ftruncate(r2, 0x7) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffe58) ioctl$VIDIOC_S_EXT_CTRLS(r3, 0xc0205648, &(0x7f0000000140)={0x9a0000, 0x5, 0x5, r0, 0x0, &(0x7f0000000100)={0x990a66, 0x1, [], @value64=0x1}}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r1, 0x100000063, 0x804000, 0x28120001) 07:34:45 executing program 3: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x7fff) ioctl$KDENABIO(r0, 0x4b36) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) 07:34:45 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100020000) 07:34:45 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) [ 1252.051134] XFS (loop3): Mounting V4 Filesystem [ 1252.116607] XFS (loop3): totally zeroed log [ 1252.141990] XFS (loop3): Metadata corruption detected at xfs_agi_read_verify+0x24b/0x2c0, xfs_agi block 0x2 [ 1252.174453] XFS (loop3): Unmount and run xfs_repair [ 1252.187944] XFS (loop3): First 64 bytes of corrupted metadata buffer: [ 1252.218407] ffff88804e818540: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1252.227587] audit: type=1804 audit(1583220885.459:11519): pid=12412 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir877835599/syzkaller.pzADnu/1337/file0" dev="sda1" ino=16777 res=1 [ 1252.292058] ffff88804e818550: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1252.320248] ffff88804e818560: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1252.329276] ffff88804e818570: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1252.339194] audit: type=1800 audit(1583220885.459:11520): pid=12412 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed" comm="syz-executor.0" name="file0" dev="sda1" ino=16777 res=0 [ 1252.380371] audit: type=1804 audit(1583220885.499:11521): pid=12468 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir877835599/syzkaller.pzADnu/1337/file0" dev="sda1" ino=16777 res=1 [ 1252.380474] XFS (loop3): metadata I/O error: block 0x2 ("xfs_trans_read_buf_map") error 117 numblks 1 07:34:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100020000) 07:34:45 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:45 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000000)={0x1f, @none}, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r2, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) setsockopt$inet_tcp_int(r2, 0x6, 0x19, &(0x7f00000000c0), 0x4) getsockopt$inet_dccp_int(r2, 0x21, 0x3, &(0x7f00000001c0), &(0x7f0000000200)=0x4) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000080)=""/235, &(0x7f0000000180)=0xeb) connect$bt_sco(r0, &(0x7f0000000040), 0x8) [ 1252.452566] XFS (loop3): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 07:34:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100020000) [ 1252.517154] XFS (loop3): failed to read root inode 07:34:45 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:46 executing program 2: mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:46 executing program 3: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x7fff) ioctl$KDENABIO(r0, 0x4b36) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) 07:34:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100020000) 07:34:46 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000040), 0x8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet6_int(r1, 0x29, 0x16, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f0000000140)={0x9e0000, 0x6, 0xffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000100)={0x9a0916, 0x8, [], @ptr=0x6}}) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x10000, 0x0) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffe58) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r5) ioctl$KVM_SET_PIT(r3, 0x8048ae66, &(0x7f0000000180)={[{0x7, 0x800, 0x0, 0xf9, 0x2, 0x40, 0x99, 0xde, 0xb3, 0xeb, 0x6, 0x2, 0x9}, {0x8, 0x20, 0x9, 0x0, 0x6, 0xdf, 0x5, 0x7, 0x9, 0x4, 0x5, 0x0, 0x5}, {0xff, 0x4, 0x5, 0x4, 0x9, 0x1, 0x20, 0x80, 0x4a, 0x7, 0x22, 0x0, 0x3}], 0x800}) pipe2(&(0x7f0000000280)={0xffffffffffffffff}, 0x80800) ioctl$USBDEVFS_RELEASEINTERFACE(r6, 0x80045510, &(0x7f00000002c0)=0x95ef) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000200)={0x6, 0x2, 0x1}) 07:34:46 executing program 2: mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:46 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="340100001000010800"/20, @ANYRES32=0x0, @ANYBLOB="200000000000000008000400", @ANYRES32=r3, @ANYBLOB="1400030076657468315f746f5f62726964676500050021000300000024002b8008000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="080003000000000008000100", @ANYRES32, @ANYBLOB="08001b0003000000240024006512da13406fe15c29f5d228c5792f40ff6af4c62ffe60880a2390cdc33e80ff1400030076657468315f6d6163767461700000007c003480140035007465616d5f736c6176655f31000000001400350076747468315f746f5f68737200000000140035007663616e3000000000000000000000001400350076657468305f766972745f77696669001400350073697430000000000000000000000000140035007767320000000000000000000000000008002e00080000000500100084000000"], 0x134}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000010c0)={'dummy0\x00', r3}) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001100)={{{@in6=@mcast2, @in=@remote, 0x4e22, 0x0, 0x4e24, 0x6, 0xa, 0x0, 0x20, 0x5c, r4, r6}, {0x53, 0x8, 0x3, 0x2, 0x5, 0x101, 0x3, 0xcf}, {0x7f, 0x4, 0x4, 0x101}, 0x8, 0x6e6bbf, 0x0, 0x1, 0x3}, {{@in6=@ipv4={[], [], @empty}, 0x4d4, 0x32}, 0x2, @in6=@mcast1, 0x3507, 0x3, 0x3, 0x6e, 0xff, 0x56, 0x6}}, 0xe8) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000, 0x6}, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) ioctl$KVM_SET_XSAVE(0xffffffffffffffff, 0x5000aea5, &(0x7f00000000c0)={[0x80000001, 0x1, 0x0, 0x3, 0x6, 0xdd94, 0xffff, 0x2, 0x8, 0x6, 0x7, 0x5, 0x0, 0xdd, 0xfffffff2, 0x4, 0x2, 0x4, 0x85, 0x40, 0xb048, 0x800, 0x1, 0x8, 0xe1, 0x2, 0x83, 0xbf6, 0x6, 0x2, 0x3, 0x8, 0x1dd, 0x3f, 0x400, 0x86b, 0x6, 0x4, 0x7f, 0x9, 0x4, 0x6, 0xfff, 0x3ff, 0x10001, 0xcc9, 0x2, 0x0, 0xa0, 0x5, 0x8, 0x4, 0x40, 0x8, 0x8, 0xbfa4, 0x8, 0xa3, 0x6, 0x77c, 0x9, 0xfffffffe, 0x5d4b, 0x6, 0x9, 0x80, 0x4, 0x8, 0x0, 0x2, 0x2, 0x8, 0x7, 0x6, 0x200, 0xee36, 0x3, 0xce, 0x7ff, 0x3e, 0x1f, 0x1200000, 0xb, 0x7, 0xdc6, 0x9, 0x57, 0x1, 0xff, 0x69, 0x2, 0x1, 0x4, 0xb4, 0x6, 0xfffffffc, 0xf26, 0x902, 0x7fff, 0x7fff, 0x2, 0x10001, 0x7fff, 0x3, 0x0, 0x7, 0x8, 0xff, 0x8, 0x4, 0x200, 0x1ff, 0x224, 0xa27, 0xfffffc01, 0x1, 0x4, 0x2, 0x60ca, 0x73ed, 0x4, 0x714, 0x81, 0x5, 0x3f, 0x80, 0xfffffffc, 0x2, 0x80000000, 0x20, 0x6, 0xa4, 0x400, 0x1, 0x1, 0xfffffff7, 0x7, 0x8, 0x78, 0x401, 0x6, 0x9, 0xfffffffb, 0x6, 0x78, 0x1f, 0x2, 0x8, 0x0, 0x401, 0x8a9f, 0x8, 0x3, 0x4, 0x3d9, 0x4, 0x7, 0xfff, 0x1, 0x8, 0x93, 0x2, 0x80000000, 0x6, 0x0, 0x1, 0x3, 0x3f, 0x8c, 0x22, 0x1, 0x9, 0x1000, 0x0, 0x7, 0x0, 0x0, 0x5, 0x7, 0xffffffff, 0x10000, 0x2, 0x7, 0xf099, 0x80, 0x7ff, 0x7, 0x9, 0x8, 0x3, 0x1, 0x3, 0x10001, 0x6, 0xbdaf, 0x5eb, 0x3, 0x388, 0x88, 0x9b, 0x1ff, 0xfff, 0x7ff, 0xfdf, 0x6f780000, 0x6, 0x1ff, 0x8, 0x3, 0x1, 0x6, 0xffff, 0xc3, 0x7, 0x3ff, 0x3, 0x1, 0x4, 0x3f, 0x8, 0x4, 0xb71, 0x5, 0xac, 0x23, 0x10000, 0x8, 0x81, 0x5, 0x4, 0x7d6, 0x8000000, 0x3ff, 0x43bb, 0x0, 0x5, 0x100, 0x200, 0x7fffffff, 0x7ff, 0x97, 0x3ff, 0x23d, 0x8f1, 0x2, 0x1, 0x2, 0x7fff, 0x7, 0xff, 0xff, 0x2, 0x4, 0x8bc9, 0x8, 0xdf, 0xffff, 0x4, 0x7, 0x0, 0x6, 0x2, 0x5, 0xfffffffe, 0x81, 0x7ff, 0x7, 0x0, 0x3, 0x79, 0x2, 0x1, 0x80000001, 0xb5, 0x5, 0x0, 0x80, 0x8, 0x20, 0x76fa, 0x7fffffff, 0x80, 0x5f, 0x7, 0x9bf3, 0x2, 0x2, 0x0, 0x6269, 0x8, 0xfffff001, 0x5, 0x7fffffff, 0x9, 0x3, 0x4, 0x3f, 0x4, 0x7cc11174, 0x5, 0x2, 0x8001, 0x9, 0x1, 0x6, 0x80000000, 0xf3, 0x7def, 0x3, 0x52e, 0x4, 0x7ff, 0x2, 0x0, 0x400, 0x7fffffff, 0x0, 0x3f00000, 0xffff0001, 0x400, 0x1, 0xb38a, 0xfffffffd, 0x4, 0x1f, 0x5, 0xb1, 0x8, 0x7, 0xffffffe1, 0x9, 0x8, 0x1, 0xfffeffff, 0x6, 0xff, 0x1, 0x2, 0x8000, 0x1, 0x1f, 0x10001, 0x9, 0x80000000, 0x1ff, 0xfff, 0x9, 0x100, 0xfffff07f, 0xa6ae, 0x5c70, 0xc6, 0x80, 0xfffffffd, 0x0, 0x7, 0xc0, 0x5, 0x1, 0x6, 0x2, 0x9, 0xcb0, 0x7, 0x3, 0x4, 0x0, 0x40, 0x80000000, 0x2, 0x3ff, 0xff, 0x5, 0x8, 0x1, 0xfff, 0x8, 0x1, 0x80000000, 0x9, 0x8, 0x292, 0x1, 0x200, 0xfff, 0xfffffffa, 0x2, 0x1f, 0x3ff, 0xe53, 0x0, 0xfffffe00, 0x4, 0x10001, 0xffff, 0x100, 0xfff, 0x2, 0x800, 0x0, 0x80000000, 0x1ff, 0x8, 0x8, 0x80000001, 0x9, 0x5, 0x8001, 0x4, 0x7, 0x5, 0xffffffff, 0x8, 0x4, 0x9f55, 0xffffffff, 0xffffffff, 0x9, 0x20, 0x88fa, 0x2, 0x6a4, 0x80000001, 0x400, 0x101, 0xfffffffd, 0x9, 0x8, 0xffffffff, 0x2, 0x3, 0x2, 0xffff, 0x1, 0x3, 0x80, 0x8d9, 0x90000000, 0x3, 0xfffffffd, 0x4, 0x3b9f, 0x5, 0x401, 0x3, 0x1a6c, 0xffffffff, 0x1, 0xfff, 0x7, 0xfffff87e, 0x5, 0x800, 0x3, 0x2, 0x20, 0x6, 0x7, 0x8bf2, 0x7fffffff, 0x200, 0xffff, 0x1, 0x101, 0x1, 0x0, 0x80000001, 0x200, 0x3, 0x7, 0x4, 0x44931e37, 0x3ff, 0x8001, 0xab, 0x4198, 0x82c8, 0x7, 0x8000, 0x80000001, 0x5, 0x8, 0x3, 0xb5, 0x7fffffff, 0x7ff, 0x1, 0x8, 0x5, 0x2, 0x0, 0x4, 0xffff, 0x6, 0xe4, 0x4, 0x2, 0x1, 0x8, 0x0, 0x0, 0x1, 0x8, 0x7ff, 0x5, 0x4, 0x8c, 0x0, 0x5, 0x9, 0x2, 0xffffffff, 0x0, 0xf9, 0x4, 0x0, 0x5fdd6f6f, 0x1000, 0x4, 0x6, 0x2f2e, 0x5, 0xffff1644, 0x6, 0x8, 0x1, 0x2, 0x5e, 0x81, 0x80000000, 0x5, 0x3ff, 0x0, 0x6, 0x7ff, 0x5, 0x1000, 0x40, 0x9, 0x10001, 0x1000, 0x7f, 0x6, 0xffff, 0x91d, 0x0, 0x9, 0xfff, 0x0, 0x5, 0x8001, 0x101, 0x9, 0x7, 0x3ff, 0xffff, 0x0, 0x6, 0x3, 0x2910, 0x1, 0x7de, 0x8001, 0x6, 0x5, 0x5, 0x2, 0x38c4b08, 0x6, 0x7, 0x3, 0x680, 0x800, 0x3, 0x3, 0xffff8000, 0x1, 0x8000, 0x5, 0x401, 0x3cd, 0x9, 0xfffff690, 0x100, 0xff, 0x7fff, 0x2, 0x1, 0x3f, 0xfffffe6c, 0x5, 0x81e, 0x10001, 0xca1, 0x80000000, 0x9, 0x7f2, 0x1, 0x2, 0x1, 0xda, 0xfffffffb, 0x0, 0x6, 0xff, 0x8, 0x9, 0x1d, 0x0, 0xfffffbff, 0xfffffff8, 0x9, 0xe2, 0x101, 0xe, 0x7, 0x5, 0x101, 0x3f, 0x2, 0x3, 0xa1e, 0x4, 0x7767, 0x958, 0x8000, 0x7fff, 0x9d800000, 0x63b, 0xffffffff, 0x1, 0x2, 0x80, 0x1, 0xffff, 0x8, 0x6, 0x0, 0x0, 0x0, 0x6, 0x7, 0x2, 0x810, 0x3f, 0x103d, 0x8000, 0xe1, 0x80, 0x4, 0x9, 0x80000001, 0x1, 0x1ff, 0xfffffffb, 0x80000000, 0x0, 0x40, 0xff, 0xdc, 0x2, 0x7, 0x434, 0x92f, 0x7, 0x4, 0x1, 0x0, 0x80, 0xfffffb43, 0x7, 0x2, 0x6, 0x3, 0xfff, 0x4, 0x8, 0x9, 0x8, 0x2, 0x4, 0xdcb, 0xcb, 0x8, 0x7fff, 0x8, 0x80000000, 0xa, 0x10000, 0x9ef0, 0x8, 0x7, 0xffffffff, 0x9, 0x40, 0x7f, 0x6, 0xc08, 0x80, 0x7, 0x37a3, 0x7fff, 0x1832, 0xfffffffb, 0xf85d, 0x3, 0x4, 0x200, 0x1, 0x1, 0x5, 0x81, 0x1, 0xff, 0xffffffff, 0x2, 0x4, 0x3, 0x4, 0x8, 0x7, 0x332, 0xf11, 0x7, 0x3, 0x4, 0x3, 0x10001, 0x80, 0x1, 0x7ff, 0x6, 0xbd4f, 0x4b, 0x0, 0x0, 0x6, 0x2, 0x80, 0x8000, 0x7, 0x9, 0x9, 0xd8000000, 0x4, 0x6, 0x499, 0x4, 0x4, 0x7, 0x6, 0x4, 0x1, 0x9, 0x9, 0x80, 0x1e258000, 0xfffffffb, 0x7ff, 0x0, 0x5, 0x400, 0x7ff, 0x6, 0x7, 0x62, 0x1, 0xcec8, 0x1, 0x0, 0x8, 0xfffffbc5, 0x3f, 0x5, 0x5ea, 0x1, 0x3, 0x4000, 0xffffffff, 0x7, 0x9, 0x3, 0x1f, 0x10000, 0x0, 0xad0f, 0x577, 0x1, 0x6, 0x0, 0x1ff, 0x3, 0x3, 0x1c28d21e, 0x9, 0x8, 0xd24c, 0x1, 0x0, 0x101, 0x5, 0x10000, 0x40, 0x3f, 0x985, 0x80, 0x200, 0x5, 0x3, 0x2, 0x7fffffff, 0xffff, 0x8, 0x2f, 0x1, 0x6, 0x9, 0x7, 0x9, 0x3ff, 0x8, 0xffffffff, 0x2, 0x4, 0x1, 0x80000000, 0x1, 0x183, 0x1, 0x967c, 0x4, 0x0, 0xa4, 0x0, 0x2, 0x81e, 0x9, 0x40, 0xffffffff, 0x4, 0x6, 0x8000, 0xffffffff, 0x4, 0x1ff, 0xeb23, 0x4, 0x6295, 0x2b6, 0x4, 0xf5cc, 0x3, 0xa4, 0x1, 0xa0f4, 0x8000, 0x8000, 0x9, 0x4, 0x1, 0x9, 0x0, 0xffff8001, 0x80000001, 0x1, 0x400, 0x3f, 0xffff, 0xa379, 0x2, 0x5, 0x3, 0x7, 0x100, 0x80000001, 0xbe, 0xfffffffd, 0x5, 0x8000, 0x10000, 0x8, 0x9, 0x8, 0x5, 0x1, 0xfff7, 0x3f, 0x8b6, 0x8, 0x8, 0xf579, 0x40, 0x80, 0x0, 0x1, 0x3, 0x9a12, 0x2, 0x4, 0x933, 0xc390, 0x0, 0x4, 0x10000000, 0x1f, 0x0, 0x10000, 0x4, 0x0, 0x0, 0xea, 0x1, 0x0, 0x1, 0x598, 0xffffffff, 0xf1, 0x1, 0x1, 0x7, 0x800, 0x18, 0x3, 0x6, 0x0, 0x1, 0xfffffff9, 0x8, 0x1, 0xfffffffc, 0x9, 0x4, 0x8001, 0x7ff, 0x9, 0x6810000, 0x1ff, 0x0, 0x8, 0x6, 0x1, 0x2e99, 0x800, 0x6, 0x80000000, 0x7, 0xcc83, 0x7fffffff, 0x0, 0x80000001, 0xfff, 0x1, 0x8, 0x9, 0x44b5, 0x8001, 0xfffffb69, 0xab3b, 0xfffffffa, 0x9, 0x8, 0x63, 0x6, 0xffffffff, 0x0, 0x80, 0x3ff, 0x1, 0x3ff, 0x1ff, 0x81, 0x9, 0x160d, 0xfff, 0x0, 0x9, 0x5, 0x2, 0x1, 0x80000001, 0x9c8, 0x0, 0x8, 0x9ca9, 0x3ff, 0x5, 0x1ff, 0x0, 0x100, 0x3, 0x4, 0xb69e, 0x6, 0x1, 0x0, 0x2, 0x7ff, 0xc5, 0x1000, 0x5b, 0x20, 0x3ff, 0xe1, 0x7f, 0x7ff, 0x2, 0x2, 0x1, 0x7fffffff, 0x8, 0xb5, 0x6, 0x5, 0x9, 0x8, 0x1, 0x1, 0x2, 0xffff8000, 0x9, 0x78d, 0x3ff, 0x200, 0x20]}) 07:34:46 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x5, 0x10080) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r2 = getpid() tkill(r2, 0x9) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$batadv(0x0) sendto$inet(r3, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x7f, 0x3, 0x4, 0x0, 0x1, 0x3e, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x100000001, 0x2}}, 0x0, 0xffffffffffffffff, r1, 0x4) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r6 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r6, &(0x7f0000000080)='threaded\x00', 0xfffffe58) ioctl$KVM_GET_REG_LIST(r6, 0xc008aeb0, &(0x7f00000001c0)={0x9, [0x7, 0x8, 0x1, 0x53, 0x1ff, 0x8, 0x6, 0x4, 0xff]}) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r7, 0x40186f40, 0x76006e) bind$isdn_base(r7, &(0x7f0000000140)={0x22, 0x79, 0x6, 0x6, 0xd1}, 0x6) lseek(r5, 0x800000, 0x0) r8 = creat(&(0x7f0000000700)='./bus\x00', 0x0) sendfile(r8, r5, 0x0, 0x8000fffffffe) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000000)) accept(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r9, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r9) [ 1253.043395] A link change request failed with some changes committed already. Interface veth1_macvtap may have been left with an inconsistent configuration, please check. [ 1253.061106] XFS (loop3): Mounting V4 Filesystem 07:34:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100020000) 07:34:46 executing program 2: mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) [ 1253.116113] XFS (loop3): totally zeroed log [ 1253.125998] XFS (loop3): Metadata corruption detected at xfs_agi_read_verify+0x24b/0x2c0, xfs_agi block 0x2 [ 1253.182302] XFS (loop3): Unmount and run xfs_repair [ 1253.187420] XFS (loop3): First 64 bytes of corrupted metadata buffer: [ 1253.265441] ffff888088902000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 07:34:46 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) [ 1253.329550] ubi0: attaching mtd0 07:34:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100020000) [ 1253.360140] ffff888088902010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1253.369048] ffff888088902020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1253.424287] ubi0: scanning is finished 07:34:46 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) [ 1253.521557] ffff888088902030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 07:34:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x0) [ 1253.628687] XFS (loop3): metadata I/O error: block 0x2 ("xfs_trans_read_buf_map") error 117 numblks 1 [ 1253.680821] XFS (loop3): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 1253.748388] XFS (loop3): failed to read root inode 07:34:47 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0x2, 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x4) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = socket$kcm(0x2, 0x0, 0x2) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f000000adc0)={0x3, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f000000ab40), 0x10}, 0x78) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r4, 0x11, 0x2, &(0x7f0000000040)=""/32, &(0x7f0000000080)=0x20) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x1) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) 07:34:47 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) [ 1254.007652] ubi0 error: ubi_attach_mtd_dev: cannot spawn "ubi_bgt0d", error -4 [ 1254.030667] audit: type=1804 audit(1583220887.279:11522): pid=12559 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir877835599/syzkaller.pzADnu/1339/file0" dev="sda1" ino=17004 res=1 07:34:47 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = accept(r0, &(0x7f0000000080)=@l2={0x1f, 0x0, @none}, &(0x7f0000000000)=0x80) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000100)=0xffffffffffffffff, 0x4) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x5332c0, 0x0) connect$bt_sco(r2, &(0x7f0000000040), 0x8) 07:34:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x0) 07:34:47 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xac, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f0000000080)={0x2710, 0x0, &(0x7f0000ffd000/0x3000)=nil}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000100)={'ipvs\x00'}, &(0x7f0000000180)=0x1e) [ 1254.107908] audit: type=1800 audit(1583220887.279:11523): pid=12559 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed" comm="syz-executor.0" name="file0" dev="sda1" ino=17004 res=0 07:34:47 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x101000, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f0000000540)='^', 0x1, 0xffffffffffffffff) keyctl$chown(0x4, r3, 0xee01, 0x0) r4 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r4, &(0x7f0000002340)=""/4096, 0x1000) keyctl$reject(0x13, r3, 0x31c, 0x4, r4) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000380)={0x1ff, 0x2, 0x10000, 0x1000, &(0x7f0000015000/0x1000)=nil}) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ttyprintk(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e22, @broadcast}}, 0x401, 0x3, 0x1ef, 0x2, 0x2, 0x9ba, 0x6}, &(0x7f0000000000)=0x9c) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={r5, 0x2}, &(0x7f0000000240)=0x8) pipe2(0x0, 0x4000) ioctl$KVM_GET_EMULATED_CPUID(r2, 0xc008ae09, &(0x7f0000001340)=""/4096) creat(&(0x7f0000000280)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f0000000340), 0x0) syz_open_dev$audion(0x0, 0x0, 0x404001) semget$private(0x0, 0x0, 0x140) openat$vfio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vfio/vfio\x00', 0x40, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000600)='devlink\x00') sync() r6 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000000c0)={[], 0x1f004}) ioctl$KVM_RUN(r6, 0xae80, 0x0) close(r2) r7 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r7) r8 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$VIDIOC_TRY_EXT_CTRLS(r8, 0xc0205647, &(0x7f00000000c0)={0xf000000, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x9b0906, 0x0, [], @p_u8=0x0}}) 07:34:47 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) [ 1254.227405] audit: type=1804 audit(1583220887.279:11524): pid=12563 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir877835599/syzkaller.pzADnu/1339/file0" dev="sda1" ino=17004 res=1 07:34:47 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x0) 07:34:47 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:47 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) ftruncate(r0, 0x48280) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) setxattr$security_ima(0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="038451fd49ac9e2bf80200a582ebb7c8a54b8b60eb9e455fc7a0b7ff3c25c53d0658a145efd6145b0c5ed079ed19b41f2427c1cd413f116ed94060b60ada5d00000000"], 0x1, 0x2) write$P9_RATTACH(r3, &(0x7f0000000000)={0x14, 0x69, 0x0, {0x40}}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r4 = socket(0x10, 0x2, 0xf6) write(r4, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000400)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_ADD(r4, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20040800}, 0x4000020) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) syz_open_dev$evdev(0x0, 0x0, 0x123c00) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x3, 0x5, [0x200, 0x1f, 0x100, 0x5, 0xe7cf]}, &(0x7f0000000100)=0x12) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f00000002c0)={r6, @in6={{0xa, 0x4e23, 0x49, @mcast1, 0xeb}}}, &(0x7f0000000440)=0x84) read$fb(0xffffffffffffffff, 0x0, 0x0) write$P9_RREMOVE(r5, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r7 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x7fff) ioctl$UFFDIO_COPY(r7, 0xc028aa03, &(0x7f0000000240)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000044000/0x4000)=nil, 0x3000}) r8 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fdatasync(r5) ioctl$EXT4_IOC_MOVE_EXT(r8, 0xc028660f, &(0x7f0000000200)={0x100000, r5, 0x9}) 07:34:47 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000040), 0x8) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x20, r3, 0x314, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x20}, 0x1, 0x0, 0x0, 0xe5b7357f24e69288}, 0x8) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r5) ioctl$PIO_CMAP(r5, 0x4b71, &(0x7f0000000100)={0x18000, 0x7, 0x0, 0x8001, 0x80000001, 0x80000001}) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000080)={0xf000000, 0xada, 0x5, r4, 0x0, &(0x7f0000000000)={0x9909c8, 0x7, [], @value=0xc4e9}}) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f00000000c0)=r6) 07:34:47 executing program 1 (fault-call:5 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:47 executing program 5: socket(0x80000000000000a, 0x2, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1070c5, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x7fff) r2 = syz_genetlink_get_family_id$tipc(0x0) r3 = openat(r0, &(0x7f0000000140)='./file0\x00', 0x48400, 0x4) sendmsg$TIPC_CMD_GET_LINKS(r3, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x24, r2, 0x0, 0x70bd28, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x3ff}}, [""]}, 0x24}}, 0x4000000) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x30, r2, 0x0, 0x70bd27, 0x25dfdbfb, {{}, {}, {0x14, 0x19, {0x8, 0x6, 0x3, 0xe77}}}, ["", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20004041}, 0x8c4) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) pipe(0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x141042, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x141042, 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/slabinfo\x00', 0x0, 0x0) dup2(r6, r4) sendfile(r5, r4, 0x0, 0xa198) [ 1254.549322] audit: type=1804 audit(1583220887.789:11525): pid=12609 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir757629939/syzkaller.rieSjx/1162/file0" dev="sda1" ino=17737 res=1 07:34:47 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) [ 1254.734030] FAULT_INJECTION: forcing a failure. [ 1254.734030] name failslab, interval 1, probability 0, space 0, times 0 07:34:48 executing program 0: ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000200)={0x7, @pix_mp={0x40, 0x9, 0x38303553, 0x4, 0x8, [{0x2, 0x400}, {0x80, 0x2}, {0x9, 0x3ff}, {0x5cbb, 0x1f}, {0x6, 0x4}, {0x3, 0x20000}, {0xfff, 0x7}, {0x5, 0x101}], 0x20, 0x2a, 0x7, 0x2, 0x6}}) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$pppoe(0x18, 0x1, 0x0) connect$bt_sco(r0, &(0x7f0000000040), 0x8) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x7fff) read$fb(r1, &(0x7f0000000080)=""/214, 0xd6) socket$inet6(0xa, 0x4, 0x63) 07:34:48 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) [ 1254.848523] CPU: 0 PID: 12629 Comm: syz-executor.1 Not tainted 4.14.172-syzkaller #0 [ 1254.856915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1254.866719] Call Trace: [ 1254.869331] dump_stack+0x13e/0x194 [ 1254.873084] should_fail.cold+0x10a/0x14b [ 1254.877255] should_failslab+0xd6/0x130 [ 1254.881247] kmem_cache_alloc_trace+0x2db/0x7b0 [ 1254.885927] ? __lock_is_held+0xad/0x140 [ 1254.890135] alloc_pipe_info+0xaa/0x380 [ 1254.894212] splice_direct_to_actor+0x581/0x730 07:34:48 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x1040900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffe58) r2 = creat(0x0, 0x0) r3 = fcntl$getown(r2, 0x9) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x120000000000000, 0x1}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xe2e6}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r4 = creat(0x0, 0x0) r5 = fcntl$getown(r4, 0x9) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x800, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x80, 0x7}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xe2e6, 0xfff}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) tkill(r6, 0x2e) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x6, 0xa5}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r7 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r7) r8 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r9 = creat(0x0, 0x0) r10 = fcntl$getown(r9, 0x9) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x120000000000000, 0x1}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xe2e6}, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r11 = getpgrp(r10) ioctl$ASHMEM_GET_PROT_MASK(r9, 0x7706, &(0x7f0000000000)) ptrace$setregs(0x9b3ee28467c6a8b8, r11, 0xfea40c5, &(0x7f00000002c0)="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") fchdir(r8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r8, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e24, @remote}}, 0x5, 0x200}, &(0x7f0000000040)=0x90) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r7, 0x84, 0x79, &(0x7f00000003c0)={r12, 0x63, 0xda2e}, 0x8) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1254.898925] ? avc_policy_seqno+0x5/0x10 [ 1254.902998] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1254.907858] ? do_splice_to+0x150/0x150 [ 1254.911860] ? rw_verify_area+0xe1/0x2a0 [ 1254.915983] do_splice_direct+0x164/0x210 [ 1254.920241] ? splice_direct_to_actor+0x730/0x730 [ 1254.925100] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1254.930126] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 1254.934899] do_sendfile+0x469/0xaf0 [ 1254.938632] ? do_compat_pwritev64+0x140/0x140 [ 1254.943228] SyS_sendfile64+0xff/0x110 [ 1254.947239] ? SyS_sendfile+0x130/0x130 [ 1254.951239] ? do_syscall_64+0x4c/0x640 [ 1254.955224] ? SyS_sendfile+0x130/0x130 [ 1254.959325] do_syscall_64+0x1d5/0x640 [ 1254.963227] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1254.968508] RIP: 0033:0x45c479 [ 1254.971798] RSP: 002b:00007f590557dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1254.979702] RAX: ffffffffffffffda RBX: 00007f590557e6d4 RCX: 000000000045c479 [ 1254.986981] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000004 07:34:48 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x23, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x40001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000100)='\\vmnet0?\'`@{,vmnet1em0user\x00', 0x0) socket(0x1d, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x40000) ftruncate(r1, 0x1000000) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0x30, 0x1, 0x4, 0x201, 0x0, 0x0, {0x7}, [@NFULA_CFG_NLBUFSIZ={0x8}, @NFULA_CFG_FLAGS={0x6, 0x6, 0x1, 0x0, 0x1}, @NFULA_CFG_MODE={0xa, 0x2, {0x9, 0x2}}]}, 0x30}, 0x1, 0x0, 0x0, 0x11}, 0x4040) sendfile(r0, r1, &(0x7f00000000c0)=0xf18010, 0xeefffdef) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r2, 0x402c5342, &(0x7f0000000200)={0x80000001, 0x1, 0x9, {0x9, 0x8001}, 0x6}) [ 1254.994466] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1255.001747] R10: 0000000100020000 R11: 0000000000000246 R12: 0000000000000005 [ 1255.009034] R13: 00000000000008d1 R14: 00000000004cb364 R15: 0000000000000000 [ 1255.016812] kauditd_printk_skb: 11 callbacks suppressed [ 1255.016822] audit: type=1804 audit(1583220888.099:11537): pid=12640 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="file0" dev="sda1" ino=16690 res=1 07:34:48 executing program 3: syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x805, 0x0) r1 = socket(0x1e, 0x2, 0x0) ioctl$SIOCX25GSUBSCRIP(r1, 0x89e0, &(0x7f0000000240)={'veth1_to_batadv\x00', 0x0, 0x8}) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x45c) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffe58) r4 = openat$cgroup_type(r3, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r4, &(0x7f0000000040)={0xa0000014}) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xaf93010e, &(0x7f0000000200)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000000400028008000a0036459cdb26cd03ccb7e638a66c86", @ANYRES32, @ANYBLOB="8932914656823d2df5e653efb0adb962b7d3d0cfcf30a61fd44f347733e5a459a7fbb9772ae8d192fe7591cef7a84282f65f698f1e44adf6f51f7b96704dc6cd6467d0dd6a89e4770b8161b9612e137a157971f761af99f5dc7536df900a25d9391df50cc6522825c2410a1f3215ebe206d71128225189a8580be0af7282a7893235e1c52f6d312b251f9443a0cc6b1a1c424066fcf00cabd870ba4ce0ffb97a05570a326c8e46ea628d9b8cc0df9263ebcd91ebf3ffeef1da9947bb16d223a98375ec5cae1016ff8c7252c829c4bfeeb7ce75ed684c317e5add1dd7d19a9306a88cf2a4c8fc229454569e42a87b2b4e78d2e6ac93633460593845686a3e37eae71bd8fce4327ca942fa98a19dfc38e617b80c37ef16305b5b6367694e5e9b1840ab"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f00000000c0), 0x492492492492627, 0x0) 07:34:48 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:48 executing program 1 (fault-call:5 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) [ 1255.158269] can: request_module (can-proto-0) failed. [ 1255.199624] can: request_module (can-proto-0) failed. 07:34:48 executing program 5: ioctl$SNDRV_PCM_IOCTL_LINK(0xffffffffffffffff, 0x40044160, &(0x7f0000000580)=0x8000) openat$hwrng(0xffffffffffffff9c, 0x0, 0x141, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000020c0)=[{{&(0x7f0000000480)=@isdn, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f0000000a00)=[{0x0}], 0x1, &(0x7f0000000a80)=""/154, 0x9a}}, {{&(0x7f0000001fc0)=@rc={0x1f, @fixed}, 0x80, 0x0}, 0x6}], 0x3, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) lseek(0xffffffffffffffff, 0x401, 0x0) r4 = creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(r4, 0x28e35741eef1f293, 0x0, 0x84003ff) clone(0x503, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='clear_refs\x00') r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x7fff) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) sendmsg$FOU_CMD_ADD(r5, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000400)={&(0x7f00000005c0)={0x34, r6, 0x200, 0x70bd29, 0x25dfdbff, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e24}, @FOU_ATTR_IFINDEX={0x8, 0xb, r7}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x4040040) accept$unix(0xffffffffffffffff, &(0x7f0000001cc0), &(0x7f0000000340)=0x6e) sched_setattr(0x0, &(0x7f0000000380)={0x38, 0x6, 0x30000028, 0x3, 0x0, 0x9, 0x2, 0x100, 0x8, 0x3}, 0x0) r8 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffa, r8, 0x0) getpid() ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f0000000240)={0x3ff, 0x733fce92, 0x7ff, 0x2, 0x7}) socket$nl_route(0x10, 0x3, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r9 = openat$cgroup_procs(r3, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) ioctl$FITRIM(r9, 0xc0185879, &(0x7f00000001c0)={0x0, 0x101, 0x9}) 07:34:48 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(0x0, 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) [ 1255.321074] FAULT_INJECTION: forcing a failure. [ 1255.321074] name failslab, interval 1, probability 0, space 0, times 0 [ 1255.335218] device vxlan0 entered promiscuous mode 07:34:48 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x4a2c40, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x2}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={r2, 0xfffffff8}, 0xfffffffffffffe05) connect$bt_sco(r0, &(0x7f0000000040), 0x8) 07:34:48 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(0x0, 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) [ 1255.401962] CPU: 0 PID: 12672 Comm: syz-executor.1 Not tainted 4.14.172-syzkaller #0 [ 1255.409915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1255.419284] Call Trace: [ 1255.421912] dump_stack+0x13e/0x194 [ 1255.425573] should_fail.cold+0x10a/0x14b [ 1255.429899] should_failslab+0xd6/0x130 [ 1255.433990] __kmalloc+0x2e9/0x7c0 [ 1255.437554] ? kmem_cache_alloc_trace+0x63e/0x7b0 [ 1255.443113] ? alloc_pipe_info+0x156/0x380 [ 1255.447410] ? __lock_is_held+0xad/0x140 [ 1255.451507] alloc_pipe_info+0x156/0x380 [ 1255.455599] splice_direct_to_actor+0x581/0x730 [ 1255.460296] ? avc_policy_seqno+0x5/0x10 [ 1255.464378] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1255.469407] ? do_splice_to+0x150/0x150 [ 1255.473404] ? rw_verify_area+0xe1/0x2a0 [ 1255.477511] do_splice_direct+0x164/0x210 [ 1255.481820] ? splice_direct_to_actor+0x730/0x730 [ 1255.486689] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1255.491737] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 1255.496543] do_sendfile+0x469/0xaf0 [ 1255.500288] ? do_compat_pwritev64+0x140/0x140 [ 1255.504902] SyS_sendfile64+0xff/0x110 [ 1255.508840] ? SyS_sendfile+0x130/0x130 [ 1255.512837] ? do_syscall_64+0x4c/0x640 [ 1255.516840] ? SyS_sendfile+0x130/0x130 [ 1255.521392] do_syscall_64+0x1d5/0x640 [ 1255.530481] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1255.535689] RIP: 0033:0x45c479 [ 1255.538902] RSP: 002b:00007f590557dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 07:34:48 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r2 = fcntl$dupfd(r0, 0x406, r1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x54, r3, 0x200, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x101}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffff80}]}, 0x54}, 0x1, 0x0, 0x0, 0x40001}, 0x4000) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, 0x1, {0x6}}, 0x18) connect$bt_sco(r0, &(0x7f0000000040), 0x8) 07:34:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000c00)=@raw={'raw\x00', 0x2, 0x3, 0x280, 0x0, 0x0, 0x108, 0x108, 0x108, 0x1e8, 0x1e8, 0x1e8, 0x1e8, 0x1e8, 0x3, 0x0, {[{{@ip={@loopback, @remote, 0x0, 0x0, 'team_slave_1\x00', 'batadv_slave_0\x00'}, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@unspec=@physdev={{0x68, 'physdev\x00'}, {'ipvlan1\x00', {}, 'tunl0\x00'}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, 0x0, 0x0, 'hsr0\x00', 'macsec0\x00'}, 0x0, 0x70, 0xe0}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "c792859c8052630dc135ef7516aee014e9dfb141af8f02a0f33b4095283dd4b3aefb31e66f509b6eb826c2661ffb3e22b53a0f8c1961af54943ea66ad851e376"}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0xc002, 0x0) ioctl$SIOCRSGL2CALL(r1, 0x89e5, &(0x7f0000000040)) [ 1255.546634] RAX: ffffffffffffffda RBX: 00007f590557e6d4 RCX: 000000000045c479 [ 1255.553931] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 1255.561291] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1255.568586] R10: 0000000100020000 R11: 0000000000000246 R12: 0000000000000005 [ 1255.575887] R13: 00000000000008d1 R14: 00000000004cb364 R15: 0000000000000001 07:34:48 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(0x0, 0x200042, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) [ 1255.960663] audit: type=1804 audit(1583220889.209:11538): pid=12668 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir187981469/syzkaller.nzJe39/9/file0" dev="sda1" ino=16673 res=1 [ 1256.037462] audit: type=1800 audit(1583220889.209:11539): pid=12668 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed" comm="syz-executor.3" name="file0" dev="sda1" ino=16673 res=0 [ 1256.065786] audit: type=1804 audit(1583220889.209:11540): pid=12698 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.3" name="/root/syzkaller-testdir187981469/syzkaller.nzJe39/9/file0" dev="sda1" ino=16673 res=1 [ 1256.791086] NOHZ: local_softirq_pending 08 07:34:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x3) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:51 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffe58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r3 = dup3(r1, r2, 0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x400000000000000}, 0x1010, 0x31, 0x8, 0x9, 0x0, 0x3d9a04c0}, 0x0, 0x0, r3, 0x2) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, 0x0, 0x0) clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = fcntl$dupfd(r5, 0x0, r6) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r8 = memfd_create(&(0x7f0000000040)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r8, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 07:34:51 executing program 0: ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000001080)={0x8000, 0x7, 0x4, 0x20000000, 0x40, {}, {0x5, 0x1, 0x0, 0x3f, 0x6, 0x0, "4d6da808"}, 0x8bea, 0x11f444d47d6dfb54, @planes=&(0x7f0000001040)={0xe4c9, 0x85, @userptr=0x3f, 0x9}, 0x99, 0x0, 0xffffffffffffffff}) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) lsetxattr$trusted_overlay_opaque(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)='trusted.overlay.opaque\x00', &(0x7f0000001200)='y\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040)={r2}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000001100)={r2, 0xb75d, 0x0, 0x7f}, &(0x7f0000001140)=0x10) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000001240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r4 = socket$inet_dccp(0x2, 0x6, 0x0) write(r4, &(0x7f0000000040)="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", 0x1000) connect$bt_sco(r3, &(0x7f0000000000), 0x8) 07:34:51 executing program 3: syz_mount_image$vfat(&(0x7f00000009c0)='vfat\x00', &(0x7f0000000a40)='./file0\x00', 0xa53a, 0x1, &(0x7f0000000000)=[{&(0x7f0000000a00)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1d2ac826c0ed4294, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x7fff) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000040)=0x2) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r6, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r7, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r7, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r7, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r8 = open(&(0x7f0000000300)='./file0\x00', 0x20000, 0x12) fchdir(r8) perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x70, 0x80, 0x1f, 0x6, 0x81, 0x0, 0x9, 0x11810, 0xa, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0xc4f, 0x6}, 0xa00, 0x8000, 0x9, 0x2, 0x9, 0x5, 0x3ff}, r2, 0x5, r8, 0xa) setsockopt$sock_int(r7, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r7, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) setsockopt$inet_tcp_int(r7, 0x6, 0x19, &(0x7f00000000c0), 0x4) sendto$inet(r7, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e24, @local}, 0x10) setsockopt$sock_int(r6, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$inet_tcp_int(r6, 0x6, 0x19, &(0x7f00000000c0), 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000000080)={0x7fffffff, 0x8, 0x3ff, 0x8, 0x3}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendfile(r0, r2, 0x0, 0x8400f7fffff8) 07:34:51 executing program 1 (fault-call:5 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) [ 1257.998428] FAULT_INJECTION: forcing a failure. [ 1257.998428] name failslab, interval 1, probability 0, space 0, times 0 [ 1258.054357] CPU: 0 PID: 12719 Comm: syz-executor.1 Not tainted 4.14.172-syzkaller #0 [ 1258.062307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1258.071688] Call Trace: [ 1258.074308] dump_stack+0x13e/0x194 [ 1258.077970] should_fail.cold+0x10a/0x14b [ 1258.082184] should_failslab+0xd6/0x130 [ 1258.086181] kmem_cache_alloc_node_trace+0x292/0x7b0 [ 1258.091509] ? lock_acquire+0x170/0x3f0 [ 1258.095586] ? lock_downgrade+0x6e0/0x6e0 [ 1258.099785] __kmalloc_node+0x38/0x70 [ 1258.102377] attempt to access beyond end of device [ 1258.103610] kvmalloc_node+0x46/0xd0 [ 1258.112433] iov_iter_get_pages_alloc+0x48c/0xe90 [ 1258.113473] loop3: rw=2049, want=130, limit=82 [ 1258.117379] ? iov_iter_revert+0x980/0x980 [ 1258.117391] ? iov_iter_pipe+0x93/0x2b0 [ 1258.117409] default_file_splice_read+0x17c/0x870 [ 1258.117419] ? save_stack+0x32/0xa0 [ 1258.117431] ? kasan_kmalloc+0xbf/0xe0 [ 1258.143158] ? __kmalloc+0x15b/0x7c0 [ 1258.146973] ? alloc_pipe_info+0x156/0x380 [ 1258.151228] ? do_sendfile+0x469/0xaf0 [ 1258.155137] ? SyS_sendfile64+0xff/0x110 [ 1258.159495] ? do_syscall_64+0x1d5/0x640 [ 1258.161465] buffer_io_error: 2 callbacks suppressed [ 1258.161474] Buffer I/O error on dev loop3, logical block 129, lost async page write [ 1258.163846] ? page_cache_pipe_buf_release+0x210/0x210 [ 1258.163862] ? check_preemption_disabled+0x35/0x240 [ 1258.163878] ? perf_trace_lock+0x109/0x4b0 [ 1258.163893] ? fsnotify+0x897/0x1110 [ 1258.175886] attempt to access beyond end of device [ 1258.177057] ? __fsnotify_update_child_dentry_flags.part.0+0x2e0/0x2e0 [ 1258.177068] ? fsnotify+0x1110/0x1110 [ 1258.177083] ? __inode_security_revalidate+0xcf/0x120 [ 1258.196735] loop3: rw=2049, want=131, limit=82 [ 1258.201037] ? avc_policy_seqno+0x5/0x10 [ 1258.201048] ? selinux_file_permission+0x7a/0x440 [ 1258.201065] ? security_file_permission+0x82/0x1e0 [ 1258.201082] ? rw_verify_area+0xe1/0x2a0 [ 1258.201093] ? page_cache_pipe_buf_release+0x210/0x210 [ 1258.201101] do_splice_to+0xfb/0x150 [ 1258.201109] ? alloc_pipe_info+0x2dc/0x380 [ 1258.201125] splice_direct_to_actor+0x20a/0x730 [ 1258.201137] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1258.201148] ? do_splice_to+0x150/0x150 [ 1258.201158] ? rw_verify_area+0xe1/0x2a0 [ 1258.201169] do_splice_direct+0x164/0x210 [ 1258.201180] ? splice_direct_to_actor+0x730/0x730 [ 1258.201195] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1258.201204] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 1258.201218] do_sendfile+0x469/0xaf0 [ 1258.201235] ? do_compat_pwritev64+0x140/0x140 [ 1258.201252] SyS_sendfile64+0xff/0x110 [ 1258.219856] Buffer I/O error on dev loop3, logical block 130, lost async page write [ 1258.223051] ? SyS_sendfile+0x130/0x130 [ 1258.223065] ? do_syscall_64+0x4c/0x640 [ 1258.223073] ? SyS_sendfile+0x130/0x130 [ 1258.223085] do_syscall_64+0x1d5/0x640 [ 1258.223101] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1258.223110] RIP: 0033:0x45c479 [ 1258.223115] RSP: 002b:00007f590557dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1258.223145] RAX: ffffffffffffffda RBX: 00007f590557e6d4 RCX: 000000000045c479 07:34:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="f4a23c0000001000010400"/20, @ANYRES32=r2, @ANYBLOB="00000000000000001c0012800900010069706970000000000c00028005000a0000000000"], 0x3}}, 0x0) r3 = add_key(&(0x7f00000000c0)='ceph\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000200)="a8923312fef88377c2", 0x9, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, r3, 0x8) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x2002, 0x0) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4), 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000040)={r6}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f0000000300)={r6, @in={{0x2, 0x1, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x5, 0x8, 0x0, 0x8}, &(0x7f00000001c0)=0x98) [ 1258.223150] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 1258.223154] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1258.223159] R10: 0000000100020000 R11: 0000000000000246 R12: 0000000000000005 [ 1258.223163] R13: 00000000000008d1 R14: 00000000004cb364 R15: 0000000000000002 [ 1258.396317] attempt to access beyond end of device 07:34:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4000000}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_open_dev$mice(0x0, 0x0, 0x14040) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000040)={0x28, r1, 0x1, 0x0, 0x0, {0x6}, [@L2TP_ATTR_IFNAME={0x14}]}, 0x28}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 1258.407115] loop3: rw=2049, want=301, limit=82 07:34:51 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000080)={0x40, 0xf, 0x3f, 0xeee, 0x1000, 0x3, &(0x7f0000000400)="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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x1000}, r0, 0x0, 0xffffffffffffffff, 0x1) socket$inet6_sctp(0xa, 0x0, 0x84) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet_smc(0x2b, 0x1, 0x0) fsetxattr$trusted_overlay_origin(r4, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x92d9b88509498c73) close(r3) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x5f50c2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xffc1) splice(r1, 0x0, r3, 0x0, 0x4ffe7, 0x0) 07:34:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r0, r0, 0x0, 0x100020000) [ 1258.454887] audit: type=1804 audit(1583220891.699:11541): pid=12728 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir187981469/syzkaller.nzJe39/10/file0/bus" dev="loop3" ino=204 res=1 07:34:51 executing program 1 (fault-call:5 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) [ 1258.516314] attempt to access beyond end of device [ 1258.524035] loop3: rw=2049, want=132, limit=82 [ 1258.529882] Buffer I/O error on dev loop3, logical block 131, lost async page write [ 1258.540889] attempt to access beyond end of device 07:34:51 executing program 5: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x9, 0x7fff}, 0x0, 0x4528, 0x0, 0x0, 0x8, 0x40, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) getpid() bind$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000180), 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) shmctl$IPC_INFO(0x0, 0x3, 0x0) stat(0x0, &(0x7f00000001c0)) socket$inet_udplite(0x2, 0x2, 0x88) setgid(0x0) r0 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$chown(0x4, 0x0, r1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setgid(0x0) r3 = getpid() rt_tgsigqueueinfo(r3, 0x0, 0x16, 0x0) ptrace(0x10, r3) r4 = getpid() rt_tgsigqueueinfo(r4, r4, 0x16, &(0x7f00000000c0)) ptrace(0x10, r4) r5 = add_key(&(0x7f0000000040)='trusted\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000240)="4c571c625b4e5443ffb69d63e9102abd70b963653ecc16a10d03b9e8416e6edcfe2692cf8b08823db20a7aceee340af2830bb014057c196f3a006a9882b365b3392d2a2bd0f440ccfe6013cad8ec47785bb7d9b250521496d55e942c740d2c3bd37cca08a19e97d69566ec97c165c1f30ea52b0bf9989dfc522608d6e982a0d77b0446f02948b612848240f5bf49967e829c74f6f14ba00b2172aa4ab4909154230efcfcc7299c142061038376217fdc1dd5d7405b0da4c99163dc7933a9ff91015ee9cc7cd698230c794c73b753022aa00ba58901", 0xd5, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, r5, &(0x7f00000009c0)=[{&(0x7f0000000340)="f61d43620c92a730e78caf312346d17e3d6ecc28e93e757bbe55e8d2ba927c950be20139fca3d98961705515f02786af65642e02b0e97f57ec31a22ee20f49516a45062ae659cca826a1d2fdbc6e6e79f5195ff1e19c1f633cadcb441aa398dd0a4589ee82b5a021048fec6fb46400a8ac7b358f6ea2b1a595329e717837370fe6fcfec83159", 0x86}, {&(0x7f0000000600)="ae4e46b82e6907dea374d4ec678d589422ad5712d597517bf705c9b781da50a7f86a43527b494f4a2a44edfbd2e01f2f4ac72a46655e6fdf40a92a7f0f754325abed26310d484ae87dc428b1090451aaf9dbcfe0f3cf5eb8df1a8c8d4e2947d09d3c882337cb3175cef700527e544f72ab19d80066024d127119471a3c6f40a6258f474ed991d973d46b369acb4257407c94ad517c5841532e7fb8f4772ce91994e6d63cf08193687bca8ea65e00256f87c6e84be9db7391c8a5c10453053746db1cad66b79ea33a9f7aba60", 0xcc}, {&(0x7f0000000700)="cf37bfb3e621df8cf91220ecfc52787e8eaf50cb22bbad3b98a3a72e0ba0a5791a8df2048e20164b4f82c88cabd0fefffad931550edb214739a46cb82b9697959a6ebb5100a06fd775baa19b66bbf396dbd1d5b8d1e0c3cb5c6d7a117acb86576916326badebfefdb5fe63721826a2d45ffb49283e113e4ab7589c60033160c758bc814cbb5e825577245140f2baaaa2e9808f42bc77b53420abedc0b89848c2e4ccef6390fa204ed24c49fc4643a79d06842f9c18f6254be391f4b5bb112ebae0b14702f2988e226bc7f87a3297936cf4559cf5b0d4f279c1304c549035d2398ee3264ab3b6232a92f97c287772dad7be9294", 0xf3}, {&(0x7f0000000800)="a12e76bb69b0668e54973f199d45a0023d95c07e01864d0796c0807f68e2fab89f1dfbc63b092a72ce37d376820b5d9f50b91e9adca4d2e42906ea70a3e22c14cf7bb07e8578762b28ea309c071364582d8c8c3fce5311f83ebe366c6b78bf6e1964f1d5ac8337851f2f43a615f05b6abece11e55cfdc61bed8be65585e6d0ad94ab78ea8dd215c9cb3807fd6cc16075202547b521cdbacbb52c75a602397a256560f9ebf83da880133fc596d8a11853c9312c2575a54192e9efba4f0f42df", 0xbf}, {&(0x7f00000008c0)="78163a44cf2762d6e7ceaf76027766058c8dbb74c530555466ced878103ae3769f2ff0a98337e83e66d0247ce98033aa59dcbcd9a2b97ca2d7cb6b49817fe899f88afacfa6ccc24d82d76b95a6370cb4a08f0383edd6cefbbcce61eb1f32dcb1692bb49c52905fd63c14", 0x6a}, {&(0x7f0000000940)="52faf34c7a7f2f80575be7ccb94dbefbde32b835e8288303d30a988eb158efcc07886043554089cc7b626ec64c496ecb03fc672b07fa2eb9eaeb0ef6f52052999ffb137711c1a8d6b003aede947238ab09a55671b914679d6c940719d85a14", 0x5f}], 0x6, r2) ptrace$setregs(0xf, 0x0, 0x0, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9000000010001fff0000000020000457ce000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800080001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="56d5a3faf4ceefd48b8e1a2b6db4fb5e8c27a1c4d7075dc9e6d30db21dbb84e16579d36010d794832fa89c39d6005cc41be50b53ce821aeea7bd857b44793dca6f22a997ba1681c7bbbcfdfbf013a9599c9287b40cb05ae9f6a0e9e012a6996ccb8296061b8e37048e174dcf28a350d61ce725cb104f59fb5334d4db8ac410773100"/142], 0x90}}, 0x0) [ 1258.567718] loop3: rw=2049, want=133, limit=82 [ 1258.583361] Buffer I/O error on dev loop3, logical block 132, lost async page write [ 1258.613314] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=12750 comm=syz-executor.4 [ 1258.624937] attempt to access beyond end of device 07:34:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r0, r0, 0x0, 0x100020000) [ 1258.665308] loop3: rw=2049, want=142, limit=82 [ 1258.669968] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=22206 sclass=netlink_xfrm_socket pig=12750 comm=syz-executor.4 [ 1258.674122] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=12750 comm=syz-executor.4 [ 1258.713470] Buffer I/O error on dev loop3, logical block 141, lost async page write [ 1258.728063] attempt to access beyond end of device [ 1258.733414] loop3: rw=2049, want=143, limit=82 [ 1258.738317] Buffer I/O error on dev loop3, logical block 142, lost async page write [ 1258.747856] FAULT_INJECTION: forcing a failure. [ 1258.747856] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1258.751789] attempt to access beyond end of device [ 1258.769289] loop3: rw=2049, want=144, limit=82 [ 1258.804355] attempt to access beyond end of device [ 1258.809966] loop3: rw=2049, want=305, limit=82 [ 1258.810913] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=12750 comm=syz-executor.4 [ 1258.817963] Buffer I/O error on dev loop3, logical block 143, lost async page write [ 1258.827464] CPU: 0 PID: 12757 Comm: syz-executor.1 Not tainted 4.14.172-syzkaller #0 [ 1258.842691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1258.852170] Call Trace: [ 1258.854777] dump_stack+0x13e/0x194 [ 1258.858430] should_fail.cold+0x10a/0x14b [ 1258.863115] __alloc_pages_nodemask+0x1bf/0x700 [ 1258.867826] ? __lock_is_held+0xad/0x140 [ 1258.870303] audit: type=1804 audit(1583220892.109:11542): pid=12727 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir187981469/syzkaller.nzJe39/10/file0/bus" dev="loop3" ino=204 res=1 [ 1258.872155] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1258.872171] ? __kmalloc_node+0x38/0x70 [ 1258.872189] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1258.872203] ? kmem_cache_alloc_node_trace+0x38c/0x7b0 [ 1258.872219] alloc_pages_current+0xe7/0x1e0 [ 1258.872236] push_pipe+0x3bf/0x730 [ 1258.872252] iov_iter_get_pages_alloc+0x4da/0xe90 [ 1258.931694] attempt to access beyond end of device [ 1258.932605] ? iov_iter_revert+0x980/0x980 [ 1258.932616] ? iov_iter_pipe+0x93/0x2b0 [ 1258.932634] default_file_splice_read+0x17c/0x870 [ 1258.932644] ? save_stack+0x32/0xa0 [ 1258.932651] ? kasan_kmalloc+0xbf/0xe0 [ 1258.932663] ? __kmalloc+0x15b/0x7c0 [ 1258.932671] ? alloc_pipe_info+0x156/0x380 [ 1258.932682] ? do_sendfile+0x469/0xaf0 [ 1258.932688] ? SyS_sendfile64+0xff/0x110 [ 1258.932698] ? do_syscall_64+0x1d5/0x640 [ 1258.932713] ? page_cache_pipe_buf_release+0x210/0x210 [ 1258.932729] ? check_preemption_disabled+0x35/0x240 [ 1258.932744] ? perf_trace_lock+0x109/0x4b0 [ 1258.950528] loop3: rw=2049, want=306, limit=82 [ 1258.951309] ? fsnotify+0x897/0x1110 07:34:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r0, r0, 0x0, 0x100020000) [ 1258.982951] Buffer I/O error on dev loop3, logical block 305, lost async page write [ 1258.984439] ? __fsnotify_update_child_dentry_flags.part.0+0x2e0/0x2e0 [ 1258.984452] ? fsnotify+0x1110/0x1110 [ 1258.984470] ? __inode_security_revalidate+0xcf/0x120 [ 1258.984482] ? avc_policy_seqno+0x5/0x10 [ 1258.984492] ? selinux_file_permission+0x7a/0x440 [ 1258.984507] ? security_file_permission+0x82/0x1e0 [ 1258.984520] ? rw_verify_area+0xe1/0x2a0 [ 1258.984534] ? page_cache_pipe_buf_release+0x210/0x210 07:34:52 executing program 0: r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f0000000140)={0xa9, &(0x7f0000000080)="3de26a0d09b7bf337374684649d59e890abc7a548aa78f374c563376fa7a75d90f537cdef8bf9162dedc2f0c308868322ca6fee25f12d5fbc7c540b5b19922252dfbc4f7e61019ee6d649d9e841f9f769055626ea5645cbfd6073758912d9e4e2a74331f22e3496db9852720ec5479726e86cca237fcb1d41ce021d8054f5dabd94172e8a8929294d2f3f38c8d0ed37242bd5cc12c1b2fae4cefa34271ba46b299ad5e807a579e9e2f"}) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r1, &(0x7f0000000040), 0x8) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x7fff) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000000000)={r1, 0xff, 0x3f, 'r'}) [ 1259.003968] attempt to access beyond end of device [ 1259.010694] do_splice_to+0xfb/0x150 [ 1259.010708] ? alloc_pipe_info+0x2dc/0x380 [ 1259.010720] splice_direct_to_actor+0x20a/0x730 [ 1259.010733] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1259.010746] ? do_splice_to+0x150/0x150 [ 1259.010759] ? rw_verify_area+0xe1/0x2a0 [ 1259.010771] do_splice_direct+0x164/0x210 [ 1259.010782] ? splice_direct_to_actor+0x730/0x730 [ 1259.010803] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1259.010811] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 1259.010822] do_sendfile+0x469/0xaf0 [ 1259.010839] ? do_compat_pwritev64+0x140/0x140 [ 1259.010854] SyS_sendfile64+0xff/0x110 [ 1259.010863] ? SyS_sendfile+0x130/0x130 [ 1259.010875] ? do_syscall_64+0x4c/0x640 [ 1259.010883] ? SyS_sendfile+0x130/0x130 [ 1259.010893] do_syscall_64+0x1d5/0x640 [ 1259.010911] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1259.010920] RIP: 0033:0x45c479 [ 1259.010925] RSP: 002b:00007f590557dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1259.010935] RAX: ffffffffffffffda RBX: 00007f590557e6d4 RCX: 000000000045c479 [ 1259.010939] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 1259.010944] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1259.010949] R10: 0000000100020000 R11: 0000000000000246 R12: 0000000000000005 [ 1259.010954] R13: 00000000000008d1 R14: 00000000004cb364 R15: 0000000000000003 [ 1259.044863] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=12750 comm=syz-executor.4 [ 1259.065450] attempt to access beyond end of device [ 1259.071550] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=12750 comm=syz-executor.4 [ 1259.120150] loop3: rw=2049, want=145, limit=82 [ 1259.144303] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=12750 comm=syz-executor.4 [ 1259.178651] device ip6tnl1 entered promiscuous mode [ 1259.214454] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=12750 comm=syz-executor.4 [ 1259.252706] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=12750 comm=syz-executor.4 [ 1259.256812] loop3: rw=2049, want=307, limit=82 [ 1259.274086] audit: type=1804 audit(1583220892.519:11543): pid=12776 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir877835599/syzkaller.pzADnu/1346/file0" dev="sda1" ino=16829 res=1 [ 1259.276446] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=12750 comm=syz-executor.4 [ 1259.306608] Buffer I/O error on dev loop3, logical block 144, lost async page write [ 1259.327915] Buffer I/O error on dev loop3, logical block 306, lost async page write [ 1259.371228] attempt to access beyond end of device [ 1259.377508] attempt to access beyond end of device [ 1259.404144] bond6: ip6tnl1 is up - this may be due to an out of date ifenslave [ 1259.416839] loop3: rw=2049, want=153, limit=82 [ 1259.422206] loop3: rw=2049, want=308, limit=82 [ 1259.427276] attempt to access beyond end of device [ 1259.433291] attempt to access beyond end of device [ 1259.481618] loop3: rw=2049, want=309, limit=82 [ 1259.486386] loop3: rw=2049, want=182, limit=82 [ 1259.539536] attempt to access beyond end of device [ 1259.589043] loop3: rw=2049, want=183, limit=82 [ 1259.614789] attempt to access beyond end of device [ 1259.625683] loop3: rw=2049, want=184, limit=82 [ 1259.632131] attempt to access beyond end of device [ 1259.637261] loop3: rw=2049, want=185, limit=82 [ 1259.642253] attempt to access beyond end of device [ 1259.647205] loop3: rw=2049, want=206, limit=82 [ 1259.652101] attempt to access beyond end of device [ 1259.657259] loop3: rw=2049, want=207, limit=82 [ 1259.663264] attempt to access beyond end of device [ 1259.668339] loop3: rw=2049, want=208, limit=82 [ 1259.673192] attempt to access beyond end of device [ 1259.678302] loop3: rw=2049, want=209, limit=82 [ 1259.683428] attempt to access beyond end of device [ 1259.688468] loop3: rw=2049, want=258, limit=82 [ 1259.693270] attempt to access beyond end of device [ 1259.698226] loop3: rw=2049, want=259, limit=82 [ 1259.703093] attempt to access beyond end of device [ 1259.708041] loop3: rw=2049, want=260, limit=82 [ 1259.712866] attempt to access beyond end of device [ 1259.718344] loop3: rw=2049, want=261, limit=82 [ 1259.723185] attempt to access beyond end of device [ 1259.732615] loop3: rw=2049, want=270, limit=82 [ 1259.737295] attempt to access beyond end of device [ 1259.742514] loop3: rw=2049, want=271, limit=82 [ 1259.747178] attempt to access beyond end of device [ 1259.752279] loop3: rw=2049, want=272, limit=82 [ 1259.757026] attempt to access beyond end of device [ 1259.762139] loop3: rw=2049, want=273, limit=82 [ 1259.767047] attempt to access beyond end of device [ 1259.772122] loop3: rw=2049, want=297, limit=82 [ 1259.778532] audit: type=1804 audit(1583220893.019:11544): pid=12726 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir187981469/syzkaller.nzJe39/10/file0/file0" dev="loop3" ino=205 res=1 [ 1259.798993] FAT-fs (loop3): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1259.807319] audit: type=1800 audit(1583220893.019:11545): pid=12726 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed" comm="syz-executor.3" name="file0" dev="loop3" ino=205 res=0 [ 1259.821193] FAT-fs (loop3): Filesystem has been set read-only 07:34:53 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000040), 0x8) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000080)=[@in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1a}}, @in6={0xa, 0x4e23, 0x1ff, @rand_addr="a74d080c01c433c3575b985bc4585528", 0xfffffbff}, @in6={0xa, 0x4e24, 0x0, @remote, 0xdf1}, @in6={0xa, 0x4e24, 0x5, @ipv4={[], [], @loopback}, 0x6}], 0x74) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) ioctl$SG_GET_SCSI_ID(r2, 0x2276, &(0x7f0000000000)) 07:34:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:53 executing program 1 (fault-call:5 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:53 executing program 4: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_script(r0, &(0x7f0000004040)=ANY=[@ANYRESDEC, @ANYRES16, @ANYRESHEX, @ANYRES16, @ANYBLOB="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"/1404], 0xfc7c) fallocate(r0, 0x8, 0x0, 0x8000) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="340100001000010800"/20, @ANYRES32=0x0, @ANYBLOB="200000000000000008000400", @ANYRES32=r6, @ANYBLOB="1400030076657468315f746f5f62726964676500050021000300000024002b8008000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="080003000000000008000100", @ANYRES32, @ANYBLOB="08001b0003000000240024006512da13406fe15c29f5d228c5792f40ff6af4c62ffe60880a2390cdc33e80ff1400030076657468315f6d6163767461700000007c003480140035007465616d5f736c6176655f31000000001400350076747468315f746f5f68737200000000140035007663616e3000000000000000000000001400350076657468305f766972745f77696669001400350073697430000000000000000000000000140035007767320000000000000000000000000008002e00080000000500100084000000"], 0x134}, 0x1, 0x0, 0x0, 0x800}, 0x0) bind$packet(r2, &(0x7f0000000000)={0x11, 0xf6, r6, 0x1, 0x5, 0x6, @local}, 0x14) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) 07:34:53 executing program 5: getrusage(0x0, &(0x7f0000000400)) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newtfilter={0x48, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0x4, 0xffe6}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @ipv4={[], [], @multicast1}}]}}]}, 0x48}}, 0x0) socket(0x27, 0x80000, 0xc0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000200)=[{0x6, 0x0, &(0x7f0000000100), 0x9, &(0x7f00000005c0)=ANY=[@ANYBLOB="000000000000000017010000020000000000000015dc91768c78ba00b50b7a5e4e7907526d7c7c8aee968a562b00cb905e1826a8f9ee0ac480576a7134801fc070041984c5c23fa1f93b59075853f70545ce9c61b15ff65cde50405272edb16434a11869d08d8fef065de94710ee553b410c3c02a96c1568403f8d11c4af4a77e766f9ed8ec43830fe02bb22babf9b41d4e5ed7a49ba3f720465bf4ee9b63892030f4fea97d94bc6cd1a7d4d6869cb3185e5da3ca0da000000000000000000000017010000030000000000003d41ffe5804da326afca75c38d6500000000001701000004000000000000000000000000000eb6d7f66dc50eb30000040000000000000000000000000000000020170100000300000000000000000000000000000000000000170100000300"/318]}], 0x4924924924924b3, 0x0) [ 1259.838422] audit: type=1804 audit(1583220893.019:11546): pid=12728 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.3" name="/root/syzkaller-testdir187981469/syzkaller.nzJe39/10/file0/file0" dev="loop3" ino=205 res=1 [ 1259.892182] FAULT_INJECTION: forcing a failure. [ 1259.892182] name fail_page_alloc, interval 1, probability 0, space 0, times 0 07:34:53 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0xa, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0x65a0}, 0x14) ioctl$PPPIOCSNPMODE(0xffffffffffffffff, 0x4008744b, &(0x7f0000000240)={0x80fd, 0x3}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f00000002c0)=""/140) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000140)={0x8000, 0x1, 0x4, 0x400000, 0x3, {0x0, 0x7530}, {0x4, 0x8, 0x3f, 0x1, 0x0, 0xa6, "98ee60d0"}, 0x9, 0x1, @planes=&(0x7f0000000040)={0x5, 0x0, @fd=r0, 0x6}, 0x1, 0x0, r2}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0xe143, 0x0) read$usbfs(r5, &(0x7f00000012c0)=""/4096, 0x1000) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0x0, 0x0) write$cgroup_subtree(r6, &(0x7f00000007c0)={[{0x2b, 'io'}, {0x2d, 'cpu'}, {0x2d, 'cpu'}]}, 0xe) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000f80)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000d00200008001000098897e1c82ac316a1b7feabfa0699fc900000080010000000000000000000038020000380200003802000038020000380200000400000000000000000000007f000001ac14140000000000000000007f00000000000000000000000000000064756dea20f9524db2d96900000057c910a19f2bc02c00000000000000000000200000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280052454a454354000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000400000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000f9c9991d0000000000000000000000000000005000736574000000000000000000000000000000000000000000000000000003000005050000000000000000000000000000000000000000100000000000000008000000000000000000000000000000280052454a454354000000000000000100000000000000000000000000000000000000000000000000000000e00000020000000000000000766574b5315f766c616e00000000000062726964676530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000b80000000000000000000000000000000000000000004800544545000000000000000000000000000000d40200000000000000000001ac1414aa00000000000000000000000000000000000000000000000000b1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800"/801], 0x1) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f00000022c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x1b8, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [0xff, 0x0, 0x0, 0xff], [0xff, 0xffffffff, 0xffffff00, 0xffffff00], 'batadv0\x00', 'hsr0\x00', {0xff}, {}, 0x2e, 0x81, 0x1, 0x4}, 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00', {0x0, 0x0, 0x0, 0x0, 0x2}}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x7fffffff, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r9, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) splice(r9, 0x0, r7, 0x0, 0x4ffe2, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nvram\x00', 0x18240, 0x0) [ 1259.915388] CPU: 1 PID: 12794 Comm: syz-executor.1 Not tainted 4.14.172-syzkaller #0 [ 1259.923337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1259.932716] Call Trace: [ 1259.935359] dump_stack+0x13e/0x194 [ 1259.939205] should_fail.cold+0x10a/0x14b [ 1259.943392] __alloc_pages_nodemask+0x1bf/0x700 [ 1259.948103] ? __lock_is_held+0xad/0x140 [ 1259.952193] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1259.957301] ? __kmalloc_node+0x38/0x70 [ 1259.961329] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1259.966361] ? kmem_cache_alloc_node_trace+0x38c/0x7b0 [ 1259.971666] alloc_pages_current+0xe7/0x1e0 [ 1259.976036] push_pipe+0x3bf/0x730 [ 1259.979699] iov_iter_get_pages_alloc+0x4da/0xe90 [ 1259.984331] A link change request failed with some changes committed already. Interface veth1_macvtap may have been left with an inconsistent configuration, please check. [ 1259.984569] ? iov_iter_revert+0x980/0x980 [ 1259.984581] ? iov_iter_pipe+0x93/0x2b0 [ 1260.009704] default_file_splice_read+0x17c/0x870 07:34:53 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x82801, 0x0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffe58) accept$nfc_llcp(r2, 0x0, &(0x7f0000000100)) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r1, 0xd}, 0x10) connect$bt_sco(r0, &(0x7f0000000040), 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') [ 1260.015823] ? save_stack+0x32/0xa0 [ 1260.019996] ? kasan_kmalloc+0xbf/0xe0 [ 1260.024009] ? __kmalloc+0x15b/0x7c0 [ 1260.027742] ? alloc_pipe_info+0x156/0x380 [ 1260.032015] ? do_sendfile+0x469/0xaf0 [ 1260.037222] ? SyS_sendfile64+0xff/0x110 [ 1260.041311] ? do_syscall_64+0x1d5/0x640 [ 1260.045413] ? page_cache_pipe_buf_release+0x210/0x210 [ 1260.050722] ? check_preemption_disabled+0x35/0x240 [ 1260.055773] ? perf_trace_lock+0x109/0x4b0 [ 1260.060040] ? fsnotify+0x897/0x1110 [ 1260.064521] ? __fsnotify_update_child_dentry_flags.part.0+0x2e0/0x2e0 [ 1260.072103] ? fsnotify+0x1110/0x1110 [ 1260.075933] ? __inode_security_revalidate+0xcf/0x120 [ 1260.081234] ? avc_policy_seqno+0x5/0x10 [ 1260.085537] ? selinux_file_permission+0x7a/0x440 [ 1260.090416] ? security_file_permission+0x82/0x1e0 [ 1260.095377] ? rw_verify_area+0xe1/0x2a0 [ 1260.099465] ? page_cache_pipe_buf_release+0x210/0x210 [ 1260.104777] do_splice_to+0xfb/0x150 [ 1260.108510] ? alloc_pipe_info+0x2dc/0x380 [ 1260.112765] splice_direct_to_actor+0x20a/0x730 [ 1260.117463] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1260.122341] ? do_splice_to+0x150/0x150 [ 1260.126346] ? rw_verify_area+0xe1/0x2a0 [ 1260.130426] do_splice_direct+0x164/0x210 [ 1260.134593] ? splice_direct_to_actor+0x730/0x730 [ 1260.139456] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1260.145199] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 1260.149986] do_sendfile+0x469/0xaf0 [ 1260.153837] ? do_compat_pwritev64+0x140/0x140 [ 1260.158451] SyS_sendfile64+0xff/0x110 [ 1260.162362] ? SyS_sendfile+0x130/0x130 [ 1260.166354] ? do_syscall_64+0x4c/0x640 [ 1260.170350] ? SyS_sendfile+0x130/0x130 [ 1260.174344] do_syscall_64+0x1d5/0x640 [ 1260.178251] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1260.183446] RIP: 0033:0x45c479 [ 1260.186645] RSP: 002b:00007f590557dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1260.194369] RAX: ffffffffffffffda RBX: 00007f590557e6d4 RCX: 000000000045c479 [ 1260.201830] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 1260.209469] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 07:34:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:53 executing program 1 (fault-call:5 fault-nth:5): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) [ 1260.217113] R10: 0000000100020000 R11: 0000000000000246 R12: 0000000000000005 [ 1260.224682] R13: 00000000000008d1 R14: 00000000004cb364 R15: 0000000000000004 07:34:53 executing program 5: r0 = socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x80000, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x6) r2 = getpid() tkill(r2, 0x9) write(r0, &(0x7f0000000280)="1c0000001a009b8a14e5f4070009042400000000ff00000000000000", 0x1e5) recvmmsg(r0, &(0x7f0000002ec0), 0xd, 0x0, &(0x7f00000001c0)={0x77359400}) [ 1260.365407] A link change request failed with some changes committed already. Interface veth1_macvtap may have been left with an inconsistent configuration, please check. [ 1260.392652] FAULT_INJECTION: forcing a failure. [ 1260.392652] name fail_page_alloc, interval 1, probability 0, space 0, times 0 07:34:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) [ 1260.421756] CPU: 1 PID: 12818 Comm: syz-executor.1 Not tainted 4.14.172-syzkaller #0 [ 1260.429702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1260.439095] Call Trace: [ 1260.441711] dump_stack+0x13e/0x194 [ 1260.445369] should_fail.cold+0x10a/0x14b [ 1260.449545] __alloc_pages_nodemask+0x1bf/0x700 [ 1260.454242] ? __lock_is_held+0xad/0x140 [ 1260.458320] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1260.463372] ? __kmalloc_node+0x38/0x70 [ 1260.467370] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1260.472398] ? kmem_cache_alloc_node_trace+0x38c/0x7b0 [ 1260.477873] alloc_pages_current+0xe7/0x1e0 [ 1260.482214] push_pipe+0x3bf/0x730 [ 1260.485814] iov_iter_get_pages_alloc+0x4da/0xe90 [ 1260.490683] ? iov_iter_revert+0x980/0x980 [ 1260.494925] ? iov_iter_pipe+0x93/0x2b0 [ 1260.498910] default_file_splice_read+0x17c/0x870 [ 1260.503761] ? save_stack+0x32/0xa0 [ 1260.507391] ? kasan_kmalloc+0xbf/0xe0 [ 1260.511282] ? __kmalloc+0x15b/0x7c0 [ 1260.515000] ? alloc_pipe_info+0x156/0x380 [ 1260.519254] ? do_sendfile+0x469/0xaf0 [ 1260.523144] ? SyS_sendfile64+0xff/0x110 [ 1260.527300] ? do_syscall_64+0x1d5/0x640 [ 1260.531380] ? page_cache_pipe_buf_release+0x210/0x210 [ 1260.536666] ? check_preemption_disabled+0x35/0x240 [ 1260.541691] ? perf_trace_lock+0x109/0x4b0 [ 1260.545955] ? fsnotify+0x897/0x1110 [ 1260.549686] ? __fsnotify_update_child_dentry_flags.part.0+0x2e0/0x2e0 [ 1260.556362] ? fsnotify+0x1110/0x1110 [ 1260.560178] ? __inode_security_revalidate+0xcf/0x120 [ 1260.565373] ? avc_policy_seqno+0x5/0x10 07:34:53 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x7fff) setsockopt$ax25_SO_BINDTODEVICE(r0, 0x101, 0x19, &(0x7f0000000000)=@rose={'rose', 0x0}, 0x10) syz_read_part_table(0x0, 0x2, &(0x7f0000000080)=[{&(0x7f00000004c0)="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", 0x1ea, 0x16}, {&(0x7f0000000040)="0be5a941", 0x4}]) [ 1260.569439] ? selinux_file_permission+0x7a/0x440 [ 1260.574294] ? security_file_permission+0x82/0x1e0 [ 1260.579236] ? rw_verify_area+0xe1/0x2a0 [ 1260.583304] ? page_cache_pipe_buf_release+0x210/0x210 [ 1260.588587] do_splice_to+0xfb/0x150 [ 1260.592316] ? alloc_pipe_info+0x2dc/0x380 [ 1260.596566] splice_direct_to_actor+0x20a/0x730 [ 1260.601253] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1260.606110] ? do_splice_to+0x150/0x150 [ 1260.610244] ? rw_verify_area+0xe1/0x2a0 [ 1260.614323] do_splice_direct+0x164/0x210 07:34:53 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000040), 0x8) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) setsockopt$inet_tcp_int(r1, 0x6, 0x19, &(0x7f00000000c0), 0x4) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001080)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f00000010c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x41, r3}) getsockopt$inet_dccp_buf(r1, 0x21, 0xc, &(0x7f0000000080)=""/4096, &(0x7f0000000000)=0x1000) 07:34:53 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000440)="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", 0x1000}], 0x1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$KVM_GET_REGS(0xffffffffffffffff, 0x8090ae81, &(0x7f0000000200)) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x11d000}) ioctl$KVM_NMI(r2, 0xae9a) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x81}, 0x36017}) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000080)=""/49, 0x31) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$SOUND_MIXER_READ_DEVMASK(r4, 0x80044dfe, &(0x7f0000000180)) [ 1260.618508] ? splice_direct_to_actor+0x730/0x730 [ 1260.623369] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1260.628393] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 1260.633162] do_sendfile+0x469/0xaf0 [ 1260.636894] ? do_compat_pwritev64+0x140/0x140 [ 1260.641546] SyS_sendfile64+0xff/0x110 [ 1260.645451] ? SyS_sendfile+0x130/0x130 [ 1260.649433] ? do_syscall_64+0x4c/0x640 [ 1260.653419] ? SyS_sendfile+0x130/0x130 [ 1260.657410] do_syscall_64+0x1d5/0x640 [ 1260.661314] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1260.666506] RIP: 0033:0x45c479 07:34:53 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000040)={0x1f, @none}, 0xfeb0) 07:34:53 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000000200)={[0x40000000000fff]}, 0x0, 0x8) wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = gettid() write$FUSE_LK(r3, &(0x7f0000000000)={0x28, 0x0, 0x2, {{0x7f, 0x1, 0x2, r4}}}, 0x28) ptrace$cont(0x9, r0, 0x0, 0x1) [ 1260.669698] RSP: 002b:00007f590557dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1260.677419] RAX: ffffffffffffffda RBX: 00007f590557e6d4 RCX: 000000000045c479 [ 1260.684700] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 1260.691987] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1260.699272] R10: 0000000100020000 R11: 0000000000000246 R12: 0000000000000005 [ 1260.706562] R13: 00000000000008d1 R14: 00000000004cb364 R15: 0000000000000005 07:34:54 executing program 1 (fault-call:5 fault-nth:6): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) [ 1260.896950] FAULT_INJECTION: forcing a failure. [ 1260.896950] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1260.937506] CPU: 0 PID: 12859 Comm: syz-executor.1 Not tainted 4.14.172-syzkaller #0 [ 1260.945536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1260.954904] Call Trace: [ 1260.957521] dump_stack+0x13e/0x194 [ 1260.961216] should_fail.cold+0x10a/0x14b [ 1260.965403] __alloc_pages_nodemask+0x1bf/0x700 [ 1260.970100] ? __lock_is_held+0xad/0x140 [ 1260.974182] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1260.979216] ? __kmalloc_node+0x38/0x70 [ 1260.983294] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1260.988434] ? kmem_cache_alloc_node_trace+0x38c/0x7b0 [ 1260.993736] alloc_pages_current+0xe7/0x1e0 [ 1260.999745] push_pipe+0x3bf/0x730 [ 1261.003312] iov_iter_get_pages_alloc+0x4da/0xe90 [ 1261.008181] ? iov_iter_revert+0x980/0x980 [ 1261.012458] ? iov_iter_pipe+0x93/0x2b0 [ 1261.016455] default_file_splice_read+0x17c/0x870 [ 1261.021311] ? save_stack+0x32/0xa0 [ 1261.025078] ? kasan_kmalloc+0xbf/0xe0 [ 1261.028994] ? __kmalloc+0x15b/0x7c0 [ 1261.032726] ? alloc_pipe_info+0x156/0x380 [ 1261.037002] ? do_sendfile+0x469/0xaf0 [ 1261.040913] ? SyS_sendfile64+0xff/0x110 [ 1261.045001] ? do_syscall_64+0x1d5/0x640 [ 1261.049091] ? page_cache_pipe_buf_release+0x210/0x210 [ 1261.054399] ? check_preemption_disabled+0x35/0x240 [ 1261.059444] ? perf_trace_lock+0x109/0x4b0 [ 1261.065883] ? fsnotify+0x897/0x1110 [ 1261.069638] ? __fsnotify_update_child_dentry_flags.part.0+0x2e0/0x2e0 [ 1261.076332] ? fsnotify+0x1110/0x1110 [ 1261.080157] ? __inode_security_revalidate+0xcf/0x120 [ 1261.085378] ? avc_policy_seqno+0x5/0x10 [ 1261.089463] ? selinux_file_permission+0x7a/0x440 [ 1261.094332] ? security_file_permission+0x82/0x1e0 [ 1261.099272] ? rw_verify_area+0xe1/0x2a0 [ 1261.103461] ? page_cache_pipe_buf_release+0x210/0x210 [ 1261.108812] do_splice_to+0xfb/0x150 [ 1261.112521] ? alloc_pipe_info+0x2dc/0x380 [ 1261.116752] splice_direct_to_actor+0x20a/0x730 [ 1261.121715] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1261.126565] ? do_splice_to+0x150/0x150 [ 1261.130653] ? rw_verify_area+0xe1/0x2a0 [ 1261.134710] do_splice_direct+0x164/0x210 [ 1261.140649] ? splice_direct_to_actor+0x730/0x730 [ 1261.145505] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1261.150528] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 1261.155284] do_sendfile+0x469/0xaf0 [ 1261.159563] ? do_compat_pwritev64+0x140/0x140 [ 1261.164174] SyS_sendfile64+0xff/0x110 [ 1261.168079] ? SyS_sendfile+0x130/0x130 [ 1261.172082] ? do_syscall_64+0x4c/0x640 [ 1261.176069] ? SyS_sendfile+0x130/0x130 [ 1261.180055] do_syscall_64+0x1d5/0x640 [ 1261.183960] entry_SYSCALL_64_after_hwframe+0x42/0xb7 07:34:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$KVM_GET_REG_LIST(r3, 0xc008aeb0, &(0x7f0000000380)={0x9, [0xb9, 0x8, 0x1, 0xb, 0x8, 0x401, 0x4, 0x5f0, 0x9]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, 0x0}, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x7, 0x0, 0x3, 0x84, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_config_ext={0x0, 0x9}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000002f000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, 0x0}], 0x1, 0x8, 0x0, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000280)=""/112, 0x70}, {&(0x7f0000000440)=""/129, 0x81}], 0x2}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:34:54 executing program 5: r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000003c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) socket$inet6_tcp(0xa, 0x1, 0x0) setuid(0x0) syncfs(0xffffffffffffffff) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) syz_open_procfs(0x0, &(0x7f00000003c0)='net/ptype\x00') r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0xfff, 0x400}) syz_open_pts(r2, 0x4000000000000002) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$rtc(0xffffffffffffff9c, 0x0, 0x800, 0x0) ioctl$RTC_PIE_ON(r3, 0x7005) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)={&(0x7f00000004c0)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES32, @ANYRESDEC=r0, @ANYRESOCT=0x0, @ANYBLOB="79eeb034bcd78e25c7a10337302c8902f2bc75db52bb966a9e7f092e44e20b81c3fa5f1417cde0b576c79b0a899aeb4d964373e15cbf7571738c44743ce98e7fbab9b371c7709ef2b198c4dd318872"]], 0x3}}, 0x8000) io_setup(0x5, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x10401, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0xb) 07:34:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100020000) 07:34:54 executing program 0: connect$bt_sco(0xffffffffffffffff, &(0x7f0000000040)={0x1f, @fixed={[], 0x11}}, 0x8) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000340)='./bus\x00', 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000640)='/dev/zero\x00', 0x3, 0x0) r3 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000800)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_ACCEPT(r2, &(0x7f0000000880)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000840)={&(0x7f0000000900)={0xf8, r3, 0x1, 0x70bd29, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @broadcast}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'vlan1\x00'}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:utempter_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:vmware_device_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x2a, 0x7, 'system_u:object_r:dmidecode_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_to_bridge\x00'}]}, 0xf8}}, 0x20008010) sendmsg$NLBL_UNLABEL_C_LIST(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40080200}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x7c, r3, 0x300, 0x70bd27, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth0_to_bridge\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @mcast1}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x7c}, 0x1, 0x0, 0x0, 0x2000c800}, 0x4) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x88, r3, 0x10, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast2}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_to_hsr\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast2}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @rand_addr="e57f320eebbd3e94d1dc21d402149a75"}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @rand_addr="d4eaed531a84d7aac4a117870ea2513a"}]}, 0x88}, 0x1, 0x0, 0x0, 0x40c0040}, 0x8081) [ 1261.189154] RIP: 0033:0x45c479 [ 1261.192343] RSP: 002b:00007f590557dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1261.200102] RAX: ffffffffffffffda RBX: 00007f590557e6d4 RCX: 000000000045c479 [ 1261.207380] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 1261.214659] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1261.222112] R10: 0000000100020000 R11: 0000000000000246 R12: 0000000000000005 [ 1261.229826] R13: 00000000000008d1 R14: 00000000004cb364 R15: 0000000000000006 07:34:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100020000) 07:34:54 executing program 1 (fault-call:5 fault-nth:7): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:54 executing program 0: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) fallocate(r1, 0x40, 0x0, 0x8002) getpid() connect$bt_sco(r0, &(0x7f0000000080), 0xd8026aef6282bc4c) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x7fff) connect$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x2710, @host}, 0x10) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffe58) accept$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14) [ 1261.463949] FAULT_INJECTION: forcing a failure. [ 1261.463949] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1261.481793] CPU: 1 PID: 12885 Comm: syz-executor.1 Not tainted 4.14.172-syzkaller #0 [ 1261.489732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1261.499197] Call Trace: [ 1261.501794] dump_stack+0x13e/0x194 [ 1261.505430] should_fail.cold+0x10a/0x14b [ 1261.509578] __alloc_pages_nodemask+0x1bf/0x700 [ 1261.514270] ? __lock_is_held+0xad/0x140 [ 1261.518350] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1261.523447] ? __kmalloc_node+0x38/0x70 [ 1261.527450] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1261.532464] ? kmem_cache_alloc_node_trace+0x38c/0x7b0 [ 1261.537875] alloc_pages_current+0xe7/0x1e0 [ 1261.542206] push_pipe+0x3bf/0x730 [ 1261.545735] iov_iter_get_pages_alloc+0x4da/0xe90 [ 1261.550723] ? iov_iter_revert+0x980/0x980 [ 1261.554955] ? iov_iter_pipe+0x93/0x2b0 [ 1261.558949] default_file_splice_read+0x17c/0x870 [ 1261.563805] ? save_stack+0x32/0xa0 [ 1261.567436] ? kasan_kmalloc+0xbf/0xe0 [ 1261.571312] ? __kmalloc+0x15b/0x7c0 [ 1261.575014] ? alloc_pipe_info+0x156/0x380 [ 1261.579261] ? do_sendfile+0x469/0xaf0 [ 1261.583250] ? SyS_sendfile64+0xff/0x110 [ 1261.587309] ? do_syscall_64+0x1d5/0x640 [ 1261.591378] ? page_cache_pipe_buf_release+0x210/0x210 [ 1261.596669] ? check_preemption_disabled+0x35/0x240 [ 1261.601711] ? perf_trace_lock+0x109/0x4b0 [ 1261.605973] ? fsnotify+0x897/0x1110 [ 1261.609696] ? __fsnotify_update_child_dentry_flags.part.0+0x2e0/0x2e0 [ 1261.616386] ? fsnotify+0x1110/0x1110 [ 1261.620201] ? __inode_security_revalidate+0xcf/0x120 [ 1261.625504] ? avc_policy_seqno+0x5/0x10 [ 1261.629550] ? selinux_file_permission+0x7a/0x440 [ 1261.634387] ? security_file_permission+0x82/0x1e0 [ 1261.639316] ? rw_verify_area+0xe1/0x2a0 [ 1261.643426] ? page_cache_pipe_buf_release+0x210/0x210 [ 1261.648728] do_splice_to+0xfb/0x150 [ 1261.652444] ? alloc_pipe_info+0x2dc/0x380 [ 1261.656672] splice_direct_to_actor+0x20a/0x730 [ 1261.661356] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1261.666196] ? do_splice_to+0x150/0x150 [ 1261.670175] ? rw_verify_area+0xe1/0x2a0 [ 1261.674236] do_splice_direct+0x164/0x210 [ 1261.678419] ? splice_direct_to_actor+0x730/0x730 [ 1261.683274] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1261.688375] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 1261.693142] do_sendfile+0x469/0xaf0 [ 1261.696907] ? do_compat_pwritev64+0x140/0x140 [ 1261.701507] SyS_sendfile64+0xff/0x110 [ 1261.705408] ? SyS_sendfile+0x130/0x130 [ 1261.709396] ? do_syscall_64+0x4c/0x640 [ 1261.713381] ? SyS_sendfile+0x130/0x130 [ 1261.717350] do_syscall_64+0x1d5/0x640 [ 1261.721327] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1261.726514] RIP: 0033:0x45c479 [ 1261.729715] RSP: 002b:00007f590557dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1261.737441] RAX: ffffffffffffffda RBX: 00007f590557e6d4 RCX: 000000000045c479 [ 1261.744713] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 1261.751993] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 07:34:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100020000) [ 1261.759271] R10: 0000000100020000 R11: 0000000000000246 R12: 0000000000000005 [ 1261.766737] R13: 00000000000008d1 R14: 00000000004cb364 R15: 0000000000000007 07:34:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100020000) 07:34:55 executing program 5: r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000003c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) socket$inet6_tcp(0xa, 0x1, 0x0) setuid(0x0) syncfs(0xffffffffffffffff) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) syz_open_procfs(0x0, &(0x7f00000003c0)='net/ptype\x00') r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0xfff, 0x400}) syz_open_pts(r2, 0x4000000000000002) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$rtc(0xffffffffffffff9c, 0x0, 0x800, 0x0) ioctl$RTC_PIE_ON(r3, 0x7005) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)={&(0x7f00000004c0)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES32, @ANYRESDEC=r0, @ANYRESOCT=0x0, @ANYBLOB="79eeb034bcd78e25c7a10337302c8902f2bc75db52bb966a9e7f092e44e20b81c3fa5f1417cde0b576c79b0a899aeb4d964373e15cbf7571738c44743ce98e7fbab9b371c7709ef2b198c4dd318872"]], 0x3}}, 0x8000) io_setup(0x5, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x10401, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0xb) 07:34:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x21b2901ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffe58) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@getroute={0x14, 0x1a, 0x200, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x20004014) tkill(r0, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x12, &(0x7f0000000200)={&(0x7f0000000700)=ANY=[@ANYBLOB="9000000010001fff00015e432000d00300000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe8000000000000000000000000000aa0800080001000000080014002000000014000300ff02000000000000000000000000000108000100", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="56d5a3faf4ceefd48b701a2b6db4fb5e8c27a1c4d7075dc9e6d30db21dbb84e16579d36010d794832fa89c39d6005cc41be50b53ce821aeea7bd857b44793dca6f22a997ba1662c7bbbcfdfbf013a9599c9287b40cb05ae9f612a6996ccb8296061b8e37048e174dcf28a350d61ce725cb104f59fb5334d4db0000000000000000000042db784a3d2bbfd252ad67e4a7e63045ec20f87c12cd15474471457a79b1b7d31bbd1ce2a8bb25ddf0ad607f514a71a24c48217ed42e862b2cb07b597eed12188721b08b074bd44ee1895951b87e9ef4bf1de706976b9c8d12091ecd55e87d5924a80e774e603e0d17b8ebac0fc64a13853d0cc6e370a6073735a8177ffe59ac446261dfe86b0c70f032902458234d92e36b6f2b304907104495d93c88b14681f23250de80f4af1c83e4326696548e88c870b0bf36e606a1e58e554798040ec0572c6958ba32c3a1f155c5e3c5440ef74b05e68b64d34798fb3c07c07b8a29241d2056d1eb43ab8091a759babdb65097cbe6d34dd4cd7cd936b0ad5e5b8c9a"], 0x90}}, 0x0) 07:34:57 executing program 1 (fault-call:5 fault-nth:8): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100020000) 07:34:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x7fff) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={&(0x7f0000000240), &(0x7f0000000280)=""/227, &(0x7f00000007c0)="8756f1211c1ea668ee3c492685ee79db512a489c3bbfaa22f2be0043220836a430e913fb930b9c5a096b8eb48bff55bbc66c941417d4ac8018c783ef7acc6584281134ecf37876fd30c45dc33dcd5c41e115c26d3594bc9755a689ffacbb1870973fab9cc32160b8605239d85ad077feda4ea169030ab75d904ca6d4f5fc191298e21ca684", &(0x7f0000000880)="b882167bf9bde6295d956406936c841ad25639d736797a2447f6457385a848dd6fc50f0ea26e347d7434d9d85fe44d8ee19b803d02ef72f7f805b0b8bcded22af42476c4f2dd5c80848fe68ad67cd6a5b46a0b54c8ac051267c7a9386f7b1967b4490c85a6807c6f79255ce518ed21725b56affeca0411074cd990bbf7deb0730fe9927b8131803115024739b47333", 0x3, r3, 0x4}, 0x38) fallocate(r2, 0x0, 0x0, 0x7fff) ioctl$TIOCL_SELLOADLUT(r2, 0x541c, &(0x7f00000001c0)={0x5, 0x5, 0x0, 0x1, 0x2}) r4 = socket(0x11, 0x800000003, 0x0) bind$packet(r4, &(0x7f00000000c0)={0x11, 0x17, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) r5 = socket$packet(0x11, 0x3, 0x300) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x345080, 0x0) write$ppp(r6, &(0x7f0000000140)="172c5459a7a6", 0x6) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) ioctl$sock_bt_bnep_BNEPCONNADD(r4, 0x400442c8, &(0x7f0000000200)={r7, 0x7, 0x6, "8ada34d58048506b4cd19071c2c382493aac91f5af9da61405b795a6ed"}) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 07:34:57 executing program 0: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x7fff) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000040)={'macvlan1\x00', {0x2, 0x4e21, @empty}}) accept4$unix(r0, 0x0, &(0x7f0000000000), 0x0) 07:34:57 executing program 4: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f00000003c0)=0xb5e, 0x4) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, 0x3, {0x4}}, 0x18) listen(r0, 0x100000001) r1 = accept4(r0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) r3 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dsp1\x00', 0x604102, 0x0) fdatasync(r3) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef}, 0xb) recvmmsg(r1, &(0x7f0000004300), 0x3a4, 0x0, 0x0) 07:34:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100020000) [ 1263.879661] FAULT_INJECTION: forcing a failure. [ 1263.879661] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1263.909193] bridge0: port 1(bridge_slave_0) entered disabled state [ 1263.935762] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1263.947175] CPU: 0 PID: 12925 Comm: syz-executor.1 Not tainted 4.14.172-syzkaller #0 [ 1263.955157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1263.964532] Call Trace: [ 1263.967177] dump_stack+0x13e/0x194 [ 1263.970834] should_fail.cold+0x10a/0x14b [ 1263.975108] __alloc_pages_nodemask+0x1bf/0x700 [ 1263.979807] ? __lock_is_held+0xad/0x140 [ 1263.983931] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1263.988973] ? __kmalloc_node+0x38/0x70 [ 1263.989694] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1263.993070] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1263.993081] ? kmem_cache_alloc_node_trace+0x38c/0x7b0 [ 1263.993094] alloc_pages_current+0xe7/0x1e0 [ 1263.993112] push_pipe+0x3bf/0x730 [ 1263.993128] iov_iter_get_pages_alloc+0x4da/0xe90 [ 1263.993148] ? iov_iter_revert+0x980/0x980 [ 1263.993162] ? iov_iter_pipe+0x93/0x2b0 [ 1264.021275] bridge0: port 1(bridge_slave_0) entered blocking state [ 1264.023789] default_file_splice_read+0x17c/0x870 [ 1264.023801] ? save_stack+0x32/0xa0 [ 1264.023807] ? kasan_kmalloc+0xbf/0xe0 [ 1264.023816] ? __kmalloc+0x15b/0x7c0 [ 1264.023825] ? alloc_pipe_info+0x156/0x380 [ 1264.023836] ? do_sendfile+0x469/0xaf0 [ 1264.023844] ? SyS_sendfile64+0xff/0x110 [ 1264.023854] ? do_syscall_64+0x1d5/0x640 [ 1264.023866] ? page_cache_pipe_buf_release+0x210/0x210 [ 1264.028181] bridge0: port 1(bridge_slave_0) entered forwarding state 07:34:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x0) [ 1264.032294] ? check_preemption_disabled+0x35/0x240 [ 1264.032309] ? perf_trace_lock+0x109/0x4b0 [ 1264.032325] ? fsnotify+0x897/0x1110 [ 1264.032344] ? __fsnotify_update_child_dentry_flags.part.0+0x2e0/0x2e0 [ 1264.104451] ? fsnotify+0x1110/0x1110 [ 1264.108284] ? __inode_security_revalidate+0xcf/0x120 [ 1264.113496] ? avc_policy_seqno+0x5/0x10 [ 1264.117594] ? selinux_file_permission+0x7a/0x440 [ 1264.122462] ? security_file_permission+0x82/0x1e0 [ 1264.127436] ? rw_verify_area+0xe1/0x2a0 [ 1264.131511] ? page_cache_pipe_buf_release+0x210/0x210 07:34:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {0x3}, [@IFLA_IFNAME={0x14}, @IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}]}, 0x48}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) recvfrom$unix(r1, &(0x7f0000000140)=""/224, 0xe0, 0x40000022, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000100)) [ 1264.136832] do_splice_to+0xfb/0x150 [ 1264.140552] ? alloc_pipe_info+0x2dc/0x380 [ 1264.144814] splice_direct_to_actor+0x20a/0x730 [ 1264.149514] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1264.154387] ? do_splice_to+0x150/0x150 [ 1264.158384] ? rw_verify_area+0xe1/0x2a0 [ 1264.162595] do_splice_direct+0x164/0x210 [ 1264.166761] ? splice_direct_to_actor+0x730/0x730 [ 1264.171636] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1264.176681] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 1264.181464] do_sendfile+0x469/0xaf0 [ 1264.185220] ? do_compat_pwritev64+0x140/0x140 [ 1264.189824] SyS_sendfile64+0xff/0x110 [ 1264.193730] ? SyS_sendfile+0x130/0x130 [ 1264.197723] ? do_syscall_64+0x4c/0x640 [ 1264.201811] ? SyS_sendfile+0x130/0x130 [ 1264.205803] do_syscall_64+0x1d5/0x640 [ 1264.209710] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1264.215023] RIP: 0033:0x45c479 [ 1264.218216] RSP: 002b:00007f590557dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1264.225935] RAX: ffffffffffffffda RBX: 00007f590557e6d4 RCX: 000000000045c479 07:34:57 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="de4f43c896a9082a54c9ffd90300ddd96fdc41cfa6499f53dc346d9b00948d6b39791082c40c5672d3ffff7f000013"], 0x18) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) 07:34:57 executing program 0: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000019c0)={{{@in6=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000001ac0)=0xe8) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000001b00)={@rand_addr="a546af24d5e16d860cb01e3c6e5f781c", r0}, 0x14) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x10104, 0x0) ioctl$BLKGETSIZE(r2, 0x1260, &(0x7f0000000080)) connect$bt_sco(r1, &(0x7f0000000040), 0x8) [ 1264.233216] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 1264.240613] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1264.248008] R10: 0000000100020000 R11: 0000000000000246 R12: 0000000000000005 [ 1264.255280] R13: 00000000000008d1 R14: 00000000004cb364 R15: 0000000000000008 07:34:57 executing program 1 (fault-call:5 fault-nth:9): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) [ 1264.305754] bridge0: port 1(bridge_slave_0) entered disabled state [ 1264.326031] bridge0: port 1(bridge_slave_0) entered blocking state [ 1264.332665] bridge0: port 1(bridge_slave_0) entered forwarding state 07:34:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x7fff) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={&(0x7f0000000240), &(0x7f0000000280)=""/227, &(0x7f00000007c0)="8756f1211c1ea668ee3c492685ee79db512a489c3bbfaa22f2be0043220836a430e913fb930b9c5a096b8eb48bff55bbc66c941417d4ac8018c783ef7acc6584281134ecf37876fd30c45dc33dcd5c41e115c26d3594bc9755a689ffacbb1870973fab9cc32160b8605239d85ad077feda4ea169030ab75d904ca6d4f5fc191298e21ca684", &(0x7f0000000880)="b882167bf9bde6295d956406936c841ad25639d736797a2447f6457385a848dd6fc50f0ea26e347d7434d9d85fe44d8ee19b803d02ef72f7f805b0b8bcded22af42476c4f2dd5c80848fe68ad67cd6a5b46a0b54c8ac051267c7a9386f7b1967b4490c85a6807c6f79255ce518ed21725b56affeca0411074cd990bbf7deb0730fe9927b8131803115024739b47333", 0x3, r3, 0x4}, 0x38) fallocate(r2, 0x0, 0x0, 0x7fff) ioctl$TIOCL_SELLOADLUT(r2, 0x541c, &(0x7f00000001c0)={0x5, 0x5, 0x0, 0x1, 0x2}) r4 = socket(0x11, 0x800000003, 0x0) bind$packet(r4, &(0x7f00000000c0)={0x11, 0x17, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) r5 = socket$packet(0x11, 0x3, 0x300) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x345080, 0x0) write$ppp(r6, &(0x7f0000000140)="172c5459a7a6", 0x6) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) ioctl$sock_bt_bnep_BNEPCONNADD(r4, 0x400442c8, &(0x7f0000000200)={r7, 0x7, 0x6, "8ada34d58048506b4cd19071c2c382493aac91f5af9da61405b795a6ed"}) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 07:34:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x0) [ 1264.458587] FAULT_INJECTION: forcing a failure. [ 1264.458587] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1264.481724] CPU: 1 PID: 12956 Comm: syz-executor.1 Not tainted 4.14.172-syzkaller #0 [ 1264.489667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1264.499036] Call Trace: [ 1264.501664] dump_stack+0x13e/0x194 [ 1264.505325] should_fail.cold+0x10a/0x14b [ 1264.509537] __alloc_pages_nodemask+0x1bf/0x700 [ 1264.514235] ? __lock_is_held+0xad/0x140 [ 1264.518336] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1264.523491] ? __kmalloc_node+0x38/0x70 [ 1264.527480] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1264.532509] ? kmem_cache_alloc_node_trace+0x38c/0x7b0 [ 1264.537812] alloc_pages_current+0xe7/0x1e0 [ 1264.542160] push_pipe+0x3bf/0x730 [ 1264.545759] iov_iter_get_pages_alloc+0x4da/0xe90 [ 1264.550634] ? iov_iter_revert+0x980/0x980 [ 1264.554897] ? iov_iter_pipe+0x93/0x2b0 07:34:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x0) 07:34:57 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000000)={0x1f, @none}, 0x8) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x240380, 0x0) ioctl$PPPIOCSNPMODE(r1, 0x4008744b, &(0x7f0000000080)={0x283}) ioctl$MON_IOCT_RING_SIZE(0xffffffffffffffff, 0x9204, 0x10aa51) [ 1264.558893] default_file_splice_read+0x17c/0x870 [ 1264.563749] ? save_stack+0x32/0xa0 [ 1264.567390] ? kasan_kmalloc+0xbf/0xe0 [ 1264.571293] ? __kmalloc+0x15b/0x7c0 [ 1264.575035] ? alloc_pipe_info+0x156/0x380 [ 1264.579286] ? do_sendfile+0x469/0xaf0 [ 1264.583189] ? SyS_sendfile64+0xff/0x110 [ 1264.587264] ? do_syscall_64+0x1d5/0x640 [ 1264.591359] ? page_cache_pipe_buf_release+0x210/0x210 [ 1264.596708] ? check_preemption_disabled+0x35/0x240 [ 1264.601742] ? perf_trace_lock+0x109/0x4b0 [ 1264.606000] ? fsnotify+0x897/0x1110 [ 1264.609805] ? __fsnotify_update_child_dentry_flags.part.0+0x2e0/0x2e0 [ 1264.616504] ? fsnotify+0x1110/0x1110 [ 1264.620328] ? __inode_security_revalidate+0xcf/0x120 [ 1264.625539] ? avc_policy_seqno+0x5/0x10 [ 1264.629615] ? selinux_file_permission+0x7a/0x440 [ 1264.634489] ? security_file_permission+0x82/0x1e0 [ 1264.639439] ? rw_verify_area+0xe1/0x2a0 [ 1264.643542] ? page_cache_pipe_buf_release+0x210/0x210 [ 1264.648834] do_splice_to+0xfb/0x150 [ 1264.652713] ? alloc_pipe_info+0x2dc/0x380 07:34:57 executing program 0: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x7) recvmmsg(r1, &(0x7f0000001c40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000240)=""/85, 0x55}], 0x1, 0x0) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x3, 0x10000}}, 0x0, 0x3ffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f00000004c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000000)='blacklist\x00', 0x0, 0x0, 0x0, 0x0) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="0c417e6ce7838595cfa349d6fb4f77c6ca7f78aa5505ade07fee577d8bf3eb2f198a7c6868e0601454944d10e0a4baf162ca81a9182b2e35019cbd87f35e384db4a2595b88ecf168b9259d077bed41c092a0d772b65a832606bc03b9e8b9", 0x5e, 0xfffffffffffffff8) r6 = add_key(&(0x7f00000006c0)='ceph\x00', &(0x7f0000000700)={'syz', 0x2}, &(0x7f0000000740)="454daa21a4b5f6de00fbf3c6b0574c5289e3511c0ef9ec1b6843e15af74c60c7592446bfca8dbe4556ba2d3d67abbe33c60faf6f9cc6e3e146466ad6", 0x3c, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000780)={r4, r5, r6}, 0x0, 0x0, &(0x7f0000000a00)={&(0x7f00000008c0)={'sha3-224-ce\x00'}, &(0x7f0000000900)}) add_key(&(0x7f0000000580)='pkcs7_test\x00', 0x0, &(0x7f0000000800)="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", 0x129, r4) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x1) r8 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="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", 0xfdea, r8) add_key(0x0, &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000380)="07349a96dd680069eba7fc2d6f732d26f6dbc4eb791b2f36a34c37e9b4f642690a2590694a293b1b218273b8ee30c578af42d73e4a987cb1b6d675e777a431fe2d41c5faed77e36f318885467a67a8d72146a232789eeb30ed286ab670f74a966d18ef84aac37fa25cdd", 0x6a, r8) ioctl$SNDCTL_DSP_SETFMT(r7, 0xc0045005, &(0x7f0000000000)=0x10) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000300)='./file0\x00'}, 0x10) r10 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) close(r10) getsockopt$inet_sctp_SCTP_MAX_BURST(r10, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={r11, 0xed18}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r9, 0x84, 0x17, &(0x7f0000000400)={r11, 0x2, 0xa5, "084b2c14c1a6e5edd6de47d1eaf9d1eeea8bff74fbb344ae7a3092ee1d7ded8f95ba87bbd5f8627951a5facd363acb4f0d72250b637e50053907628b01c534c5a7e9aed0aafa0665965756f096db9356c1f113992b6c9e59c49774cb52033bc9e1cc23530980e8ee79617164d95920d89aa3f81cf3db5e2847b7b92762b30553a7a0c5925137cbb7783e8e8ccd93e66a3307818c37bbb710f6879a600f03f4a91c5a945178"}, 0xad) [ 1264.656968] splice_direct_to_actor+0x20a/0x730 [ 1264.661674] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1264.666534] ? do_splice_to+0x150/0x150 [ 1264.670553] ? rw_verify_area+0xe1/0x2a0 [ 1264.674629] do_splice_direct+0x164/0x210 [ 1264.678911] ? splice_direct_to_actor+0x730/0x730 [ 1264.683771] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1264.688814] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 1264.693582] do_sendfile+0x469/0xaf0 [ 1264.697475] ? do_compat_pwritev64+0x140/0x140 [ 1264.702079] SyS_sendfile64+0xff/0x110 [ 1264.705991] ? SyS_sendfile+0x130/0x130 [ 1264.709986] ? do_syscall_64+0x4c/0x640 [ 1264.713976] ? SyS_sendfile+0x130/0x130 [ 1264.717971] do_syscall_64+0x1d5/0x640 [ 1264.721890] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1264.727092] RIP: 0033:0x45c479 [ 1264.730284] RSP: 002b:00007f590557dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1264.737996] RAX: ffffffffffffffda RBX: 00007f590557e6d4 RCX: 000000000045c479 [ 1264.745279] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 1264.752656] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 07:34:58 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x4205d, 0x0) 07:34:58 executing program 1 (fault-call:5 fault-nth:10): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) [ 1264.759931] R10: 0000000100020000 R11: 0000000000000246 R12: 0000000000000005 [ 1264.767209] R13: 00000000000008d1 R14: 00000000004cb364 R15: 0000000000000009 [ 1264.779576] bridge0: port 1(bridge_slave_0) entered disabled state [ 1264.801856] bridge0: port 1(bridge_slave_0) entered blocking state [ 1264.808369] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1264.920384] could not allocate digest TFM handle sha3-224-ce [ 1264.995991] FAULT_INJECTION: forcing a failure. [ 1264.995991] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1265.028276] CPU: 1 PID: 12987 Comm: syz-executor.1 Not tainted 4.14.172-syzkaller #0 [ 1265.036223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 07:34:58 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newtaction={0x2c, 0x30, 0x100, 0x0, 0x0, {}, [{0x18, 0x1, [@m_bpf={0x14, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x4}, {0x4}}}]}]}, 0x2c}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$netlink(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 1265.045591] Call Trace: [ 1265.048206] dump_stack+0x13e/0x194 [ 1265.051867] should_fail.cold+0x10a/0x14b [ 1265.056029] __alloc_pages_nodemask+0x1bf/0x700 [ 1265.060700] ? __lock_is_held+0xad/0x140 [ 1265.064758] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1265.069778] ? __kmalloc_node+0x38/0x70 [ 1265.073763] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1265.078788] ? kmem_cache_alloc_node_trace+0x38c/0x7b0 [ 1265.084136] alloc_pages_current+0xe7/0x1e0 [ 1265.088574] push_pipe+0x3bf/0x730 [ 1265.092135] iov_iter_get_pages_alloc+0x4da/0xe90 [ 1265.097069] ? iov_iter_revert+0x980/0x980 [ 1265.101312] ? iov_iter_pipe+0x93/0x2b0 [ 1265.105348] default_file_splice_read+0x17c/0x870 [ 1265.110195] ? save_stack+0x32/0xa0 [ 1265.113864] ? kasan_kmalloc+0xbf/0xe0 [ 1265.117746] ? __kmalloc+0x15b/0x7c0 [ 1265.121458] ? alloc_pipe_info+0x156/0x380 [ 1265.125696] ? do_sendfile+0x469/0xaf0 [ 1265.129672] ? SyS_sendfile64+0xff/0x110 [ 1265.133765] ? do_syscall_64+0x1d5/0x640 [ 1265.137832] ? page_cache_pipe_buf_release+0x210/0x210 [ 1265.143110] ? check_preemption_disabled+0x35/0x240 [ 1265.148146] ? perf_trace_lock+0x109/0x4b0 [ 1265.152388] ? fsnotify+0x897/0x1110 [ 1265.156116] ? __fsnotify_update_child_dentry_flags.part.0+0x2e0/0x2e0 [ 1265.162795] ? fsnotify+0x1110/0x1110 [ 1265.166601] ? __inode_security_revalidate+0xcf/0x120 [ 1265.171792] ? avc_policy_seqno+0x5/0x10 [ 1265.175840] ? selinux_file_permission+0x7a/0x440 [ 1265.180898] ? security_file_permission+0x82/0x1e0 [ 1265.185821] ? rw_verify_area+0xe1/0x2a0 [ 1265.189884] ? page_cache_pipe_buf_release+0x210/0x210 [ 1265.195332] do_splice_to+0xfb/0x150 [ 1265.199040] ? alloc_pipe_info+0x2dc/0x380 [ 1265.203289] splice_direct_to_actor+0x20a/0x730 [ 1265.207976] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1265.212814] ? do_splice_to+0x150/0x150 [ 1265.216803] ? rw_verify_area+0xe1/0x2a0 [ 1265.220863] do_splice_direct+0x164/0x210 [ 1265.225002] ? splice_direct_to_actor+0x730/0x730 [ 1265.229839] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1265.234851] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 1265.239727] do_sendfile+0x469/0xaf0 [ 1265.243453] ? do_compat_pwritev64+0x140/0x140 [ 1265.248037] SyS_sendfile64+0xff/0x110 [ 1265.251935] ? SyS_sendfile+0x130/0x130 [ 1265.255908] ? do_syscall_64+0x4c/0x640 [ 1265.259880] ? SyS_sendfile+0x130/0x130 [ 1265.263851] do_syscall_64+0x1d5/0x640 [ 1265.267735] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1265.272919] RIP: 0033:0x45c479 [ 1265.276097] RSP: 002b:00007f590557dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1265.283799] RAX: ffffffffffffffda RBX: 00007f590557e6d4 RCX: 000000000045c479 [ 1265.291133] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 1265.298392] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1265.306961] R10: 0000000100020000 R11: 0000000000000246 R12: 0000000000000005 [ 1265.314232] R13: 00000000000008d1 R14: 00000000004cb364 R15: 000000000000000a 07:34:58 executing program 1 (fault-call:5 fault-nth:11): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:58 executing program 2 (fault-call:5 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:58 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x111000, 0x0) write$P9_RREADDIR(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1a49000000290200ff7f00000001000000000000000000000001000000000054927b40b89e5866696ce4613f13000000010000000000000004000000000000000207002e2f66696c65"], 0x49) inotify_init1(0x80000) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) open(&(0x7f0000000000)='./file0\x00', 0x80000, 0x60) connect$bt_sco(r1, &(0x7f0000000040), 0x8) 07:34:58 executing program 5: ioctl$SNDRV_TIMER_IOCTL_GPARAMS(0xffffffffffffffff, 0x40485404, &(0x7f0000000180)={{0xffffffffffffffff, 0x3, 0x2, 0x0, 0x6}, 0x10000000000, 0x3}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000000000)={0x1, 0x3, 0x3, 0x6, 0x7, 0x3f}) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1410}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000000c0)={[0x8, 0x7f, 0xc65, 0x6, 0xed, 0x2, 0x5, 0x7, 0xf98, 0x4, 0x3, 0x2, 0x6ae0000, 0x100000000, 0x3ff, 0x1], 0x10000, 0x6000}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000001a40)={"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"}) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000080)=0x10000000002) ioctl$KVM_RUN(r3, 0xae80, 0x0) 07:34:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000000)='gtp\x00') r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffe58) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r3, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) setsockopt$inet_tcp_int(r3, 0x6, 0x19, &(0x7f00000000c0), 0x4) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000001c0)={0x0, @broadcast, @loopback}, &(0x7f0000000280)=0xc) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)={0x14, r2, 0x10, 0x70bd2c, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x50000, 0x0) getsockopt$inet6_tcp_int(r4, 0x6, 0x1e, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000440)={{0x63, 0x1}, 'port0\x00', 0x0, 0x40, 0x2, 0xffffffff, 0x1, 0x8, 0xfff, 0x0, 0x7, 0xca}) r5 = socket$nl_rdma(0x10, 0x3, 0x14) ioctl$sock_inet_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000100)={'ip6gretap0\x00', {0x2, 0x4e21, @local}}) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x5f, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_FLAGS={0x6}, @IFLA_IPTUN_ENCAP_TYPE={0x6}]}}}]}, 0x44}}, 0x0) [ 1265.511711] FAULT_INJECTION: forcing a failure. [ 1265.511711] name failslab, interval 1, probability 0, space 0, times 0 [ 1265.526520] FAULT_INJECTION: forcing a failure. [ 1265.526520] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1265.549714] CPU: 0 PID: 13008 Comm: syz-executor.2 Not tainted 4.14.172-syzkaller #0 [ 1265.557835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1265.567228] Call Trace: [ 1265.568797] selinux_nlmsg_perm: 6 callbacks suppressed [ 1265.568808] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13018 comm=syz-executor.3 [ 1265.569836] dump_stack+0x13e/0x194 [ 1265.569864] should_fail.cold+0x10a/0x14b [ 1265.587819] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13018 comm=syz-executor.3 [ 1265.591068] should_failslab+0xd6/0x130 [ 1265.591082] kmem_cache_alloc_trace+0x2db/0x7b0 [ 1265.591099] ? __lock_is_held+0xad/0x140 [ 1265.591113] alloc_pipe_info+0xaa/0x380 [ 1265.591130] splice_direct_to_actor+0x581/0x730 [ 1265.598885] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13018 comm=syz-executor.3 [ 1265.607482] ? avc_policy_seqno+0x5/0x10 [ 1265.607496] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1265.607509] ? do_splice_to+0x150/0x150 [ 1265.607521] ? rw_verify_area+0xe1/0x2a0 [ 1265.607536] do_splice_direct+0x164/0x210 [ 1265.607547] ? splice_direct_to_actor+0x730/0x730 [ 1265.607563] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1265.607573] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 1265.607585] do_sendfile+0x469/0xaf0 [ 1265.613559] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13018 comm=syz-executor.3 [ 1265.616518] ? do_compat_pwritev64+0x140/0x140 [ 1265.616539] SyS_sendfile64+0xff/0x110 [ 1265.616550] ? SyS_sendfile+0x130/0x130 [ 1265.621782] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13018 comm=syz-executor.3 [ 1265.624695] ? do_syscall_64+0x4c/0x640 [ 1265.624707] ? SyS_sendfile+0x130/0x130 [ 1265.624719] do_syscall_64+0x1d5/0x640 [ 1265.624737] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1265.624748] RIP: 0033:0x45c479 [ 1265.631153] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13018 comm=syz-executor.3 [ 1265.641483] RSP: 002b:00007f1dbe77fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1265.641501] RAX: ffffffffffffffda RBX: 00007f1dbe7806d4 RCX: 000000000045c479 [ 1265.641505] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 1265.641510] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1265.641515] R10: 0000000100020000 R11: 0000000000000246 R12: 0000000000000005 [ 1265.641520] R13: 00000000000008d1 R14: 00000000004cb364 R15: 0000000000000000 [ 1265.653671] CPU: 0 PID: 13011 Comm: syz-executor.1 Not tainted 4.14.172-syzkaller #0 [ 1265.722382] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13018 comm=syz-executor.3 [ 1265.722436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1265.736241] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13018 comm=syz-executor.3 [ 1265.738872] Call Trace: [ 1265.738898] dump_stack+0x13e/0x194 [ 1265.738917] should_fail.cold+0x10a/0x14b [ 1265.738935] __alloc_pages_nodemask+0x1bf/0x700 [ 1265.738951] ? __lock_is_held+0xad/0x140 [ 1265.738960] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1265.738975] ? __kmalloc_node+0x38/0x70 [ 1265.776204] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13018 comm=syz-executor.3 [ 1265.781314] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1265.781326] ? kmem_cache_alloc_node_trace+0x38c/0x7b0 [ 1265.781341] alloc_pages_current+0xe7/0x1e0 [ 1265.781359] push_pipe+0x3bf/0x730 [ 1265.781375] iov_iter_get_pages_alloc+0x4da/0xe90 [ 1265.781391] ? iov_iter_revert+0x980/0x980 [ 1265.781401] ? iov_iter_pipe+0x93/0x2b0 [ 1265.781421] default_file_splice_read+0x17c/0x870 [ 1265.781429] ? save_stack+0x32/0xa0 [ 1265.781435] ? kasan_kmalloc+0xbf/0xe0 [ 1265.781443] ? __kmalloc+0x15b/0x7c0 [ 1265.781450] ? alloc_pipe_info+0x156/0x380 [ 1265.781460] ? do_sendfile+0x469/0xaf0 [ 1265.781472] ? SyS_sendfile64+0xff/0x110 [ 1265.795575] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1265.796164] ? do_syscall_64+0x1d5/0x640 [ 1265.796187] ? page_cache_pipe_buf_release+0x210/0x210 [ 1265.796207] ? check_preemption_disabled+0x35/0x240 [ 1265.808567] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13018 comm=syz-executor.3 [ 1265.816312] ? perf_trace_lock+0x109/0x4b0 [ 1265.816329] ? fsnotify+0x897/0x1110 [ 1265.816351] ? __fsnotify_update_child_dentry_flags.part.0+0x2e0/0x2e0 [ 1265.816361] ? fsnotify+0x1110/0x1110 [ 1265.816379] ? __inode_security_revalidate+0xcf/0x120 [ 1265.816389] ? avc_policy_seqno+0x5/0x10 [ 1265.816398] ? selinux_file_permission+0x7a/0x440 [ 1265.816411] ? security_file_permission+0x82/0x1e0 [ 1265.816424] ? rw_verify_area+0xe1/0x2a0 [ 1265.816434] ? page_cache_pipe_buf_release+0x210/0x210 [ 1265.816446] do_splice_to+0xfb/0x150 [ 1265.816454] ? alloc_pipe_info+0x2dc/0x380 [ 1265.816467] splice_direct_to_actor+0x20a/0x730 [ 1266.035302] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1266.040183] ? do_splice_to+0x150/0x150 [ 1266.044201] ? rw_verify_area+0xe1/0x2a0 [ 1266.048573] do_splice_direct+0x164/0x210 [ 1266.052846] ? splice_direct_to_actor+0x730/0x730 [ 1266.058235] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1266.063270] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 1266.068309] do_sendfile+0x469/0xaf0 [ 1266.072064] ? do_compat_pwritev64+0x140/0x140 [ 1266.076669] SyS_sendfile64+0xff/0x110 [ 1266.080583] ? SyS_sendfile+0x130/0x130 [ 1266.084830] ? do_syscall_64+0x4c/0x640 [ 1266.088822] ? SyS_sendfile+0x130/0x130 [ 1266.092810] do_syscall_64+0x1d5/0x640 [ 1266.096713] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1266.101908] RIP: 0033:0x45c479 [ 1266.105106] RSP: 002b:00007f590557dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 07:34:58 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000040)={0x1f, @none}, 0x4) 07:34:58 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast1}, 0x14) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, 0x2, 0x3, 0x801, 0x0, 0x0, {}, [@NFQA_CFG_CMD={0x8, 0x1, {0x2}}]}, 0x1c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) fcntl$notify(r4, 0x402, 0x18) r5 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) ioctl$FS_IOC_FIEMAP(r6, 0xc020660b, &(0x7f00000002c0)={0x0, 0x2, 0x4, 0x5, 0x6, [{0x7, 0x4, 0x4, [], 0x806}, {0x8001, 0x4, 0xcf34, [], 0x8}, {0x4, 0x2, 0x8, [], 0x800}, {0x5, 0x0, 0xffff, [], 0x600}, {0x7ff, 0x5, 0x4}, {0x80000001, 0x6, 0x7, [], 0x84}]}) 07:34:59 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) connect$bt_sco(r0, &(0x7f0000000040)={0x1f, @none}, 0x8) 07:34:59 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000040), 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) ioctl$sock_netdev_private(r1, 0x89f7, &(0x7f0000000000)="fda5b59982a33b12fd581d7c28df2f1456c47727ad104649bb90b33728") 07:34:59 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x414040, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x7fff) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f0000000180)=0xb83) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0xd, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x4}, [@IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x24044056}, 0x4004) epoll_create1(0x80000) connect$bt_sco(r0, &(0x7f0000000040), 0x8) [ 1266.113066] RAX: ffffffffffffffda RBX: 00007f590557e6d4 RCX: 000000000045c479 [ 1266.120539] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 1266.127910] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1266.135368] R10: 0000000100020000 R11: 0000000000000246 R12: 0000000000000005 [ 1266.142651] R13: 00000000000008d1 R14: 00000000004cb364 R15: 000000000000000b 07:34:59 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000040), 0x8) pipe(&(0x7f0000000000)) 07:34:59 executing program 2 (fault-call:5 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:34:59 executing program 1 (fault-call:5 fault-nth:12): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) [ 1266.449719] FAULT_INJECTION: forcing a failure. [ 1266.449719] name failslab, interval 1, probability 0, space 0, times 0 [ 1266.492157] FAULT_INJECTION: forcing a failure. [ 1266.492157] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1266.493722] CPU: 1 PID: 13054 Comm: syz-executor.2 Not tainted 4.14.172-syzkaller #0 [ 1266.512051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1266.521421] Call Trace: [ 1266.524140] dump_stack+0x13e/0x194 [ 1266.527802] should_fail.cold+0x10a/0x14b [ 1266.531968] should_failslab+0xd6/0x130 [ 1266.535965] __kmalloc+0x2e9/0x7c0 [ 1266.539502] ? kmem_cache_alloc_trace+0x63e/0x7b0 [ 1266.544350] ? alloc_pipe_info+0x156/0x380 [ 1266.548607] ? __lock_is_held+0xad/0x140 [ 1266.552695] alloc_pipe_info+0x156/0x380 [ 1266.556769] splice_direct_to_actor+0x581/0x730 [ 1266.561456] ? avc_policy_seqno+0x5/0x10 [ 1266.565561] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1266.570762] ? do_splice_to+0x150/0x150 [ 1266.574751] ? rw_verify_area+0xe1/0x2a0 [ 1266.578816] do_splice_direct+0x164/0x210 [ 1266.582992] ? splice_direct_to_actor+0x730/0x730 [ 1266.587844] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1266.592870] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 1266.597631] do_sendfile+0x469/0xaf0 [ 1266.601366] ? do_compat_pwritev64+0x140/0x140 [ 1266.606088] SyS_sendfile64+0xff/0x110 [ 1266.610032] ? SyS_sendfile+0x130/0x130 [ 1266.614017] ? do_syscall_64+0x4c/0x640 [ 1266.618003] ? SyS_sendfile+0x130/0x130 [ 1266.622071] do_syscall_64+0x1d5/0x640 [ 1266.625973] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1266.631174] RIP: 0033:0x45c479 [ 1266.634368] RSP: 002b:00007f1dbe77fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1266.642089] RAX: ffffffffffffffda RBX: 00007f1dbe7806d4 RCX: 000000000045c479 [ 1266.649375] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 1266.656659] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1266.663932] R10: 0000000100020000 R11: 0000000000000246 R12: 0000000000000005 [ 1266.671278] R13: 00000000000008d1 R14: 00000000004cb364 R15: 0000000000000001 [ 1266.686875] CPU: 0 PID: 13058 Comm: syz-executor.1 Not tainted 4.14.172-syzkaller #0 [ 1266.694815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1266.704185] Call Trace: [ 1266.706804] dump_stack+0x13e/0x194 [ 1266.710588] should_fail.cold+0x10a/0x14b [ 1266.714761] __alloc_pages_nodemask+0x1bf/0x700 [ 1266.719453] ? __lock_is_held+0xad/0x140 [ 1266.723533] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1266.728583] ? __kmalloc_node+0x38/0x70 [ 1266.732637] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1266.737672] ? kmem_cache_alloc_node_trace+0x38c/0x7b0 [ 1266.743003] alloc_pages_current+0xe7/0x1e0 [ 1266.747372] push_pipe+0x3bf/0x730 [ 1266.750941] iov_iter_get_pages_alloc+0x4da/0xe90 [ 1266.755816] ? iov_iter_revert+0x980/0x980 [ 1266.760074] ? iov_iter_pipe+0x93/0x2b0 [ 1266.764071] default_file_splice_read+0x17c/0x870 [ 1266.768933] ? save_stack+0x32/0xa0 [ 1266.772571] ? kasan_kmalloc+0xbf/0xe0 [ 1266.776476] ? __kmalloc+0x15b/0x7c0 [ 1266.780296] ? alloc_pipe_info+0x156/0x380 [ 1266.784545] ? do_sendfile+0x469/0xaf0 [ 1266.788451] ? SyS_sendfile64+0xff/0x110 [ 1266.792523] ? do_syscall_64+0x1d5/0x640 [ 1266.796613] ? page_cache_pipe_buf_release+0x210/0x210 [ 1266.801908] ? check_preemption_disabled+0x35/0x240 [ 1266.806942] ? perf_trace_lock+0x109/0x4b0 [ 1266.811199] ? fsnotify+0x897/0x1110 [ 1266.814942] ? __fsnotify_update_child_dentry_flags.part.0+0x2e0/0x2e0 [ 1266.821639] ? fsnotify+0x1110/0x1110 [ 1266.825473] ? __inode_security_revalidate+0xcf/0x120 [ 1266.830694] ? avc_policy_seqno+0x5/0x10 [ 1266.834771] ? selinux_file_permission+0x7a/0x440 [ 1266.839638] ? security_file_permission+0x82/0x1e0 [ 1266.844592] ? rw_verify_area+0xe1/0x2a0 [ 1266.848673] ? page_cache_pipe_buf_release+0x210/0x210 [ 1266.853971] do_splice_to+0xfb/0x150 [ 1266.857696] ? alloc_pipe_info+0x2dc/0x380 [ 1266.861947] splice_direct_to_actor+0x20a/0x730 [ 1266.866653] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1266.871516] ? do_splice_to+0x150/0x150 [ 1266.875507] ? rw_verify_area+0xe1/0x2a0 [ 1266.879593] do_splice_direct+0x164/0x210 [ 1266.883884] ? splice_direct_to_actor+0x730/0x730 [ 1266.888767] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1266.893802] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 1266.898580] do_sendfile+0x469/0xaf0 [ 1266.902322] ? do_compat_pwritev64+0x140/0x140 [ 1266.906930] SyS_sendfile64+0xff/0x110 [ 1266.910836] ? SyS_sendfile+0x130/0x130 [ 1266.914825] ? do_syscall_64+0x4c/0x640 [ 1266.918812] ? SyS_sendfile+0x130/0x130 [ 1266.923013] do_syscall_64+0x1d5/0x640 [ 1266.926962] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1266.932280] RIP: 0033:0x45c479 [ 1266.935482] RSP: 002b:00007f590557dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 07:34:59 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000040), 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f0000000000), &(0x7f0000000080)=0x8) 07:35:00 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000240)='./file0\x00', 0x1ff, 0x3, &(0x7f0000001440)=[{&(0x7f0000000280)="7e1a993caa557925113b4cbe847c3464524b7d7d7ff778173a8ccde9c17e1861d1b73771c9dbd0d4d939b17ea9e961d61f89dac1f2700e639c0eae2cd27977a303f4c1d8a5fed07b292b594204c4a767ab18b86b88e55483d37858b47e52a80daf2d819f4713ee0ddf9092465429ec86a1a4eda0430a8ff1c98f25691d7d6f70cccea943cf9964141be08c4fb00f02592883b69f2e8210c3", 0x98, 0x8}, {&(0x7f0000000400)="0f54368aee74ce4b45452bb1f069f048eccc234e7361d160c5d152d9d5cfcb952b64b34b6526ab70f36c3596f8398af9d107cd13aaebe9b24d7861419f8b67f108a0d48d029e2d0ec1bee9711546af84ba69c16b71104e3c94d50108feb72f79e73aa584434b89e3bcfc4a3e621dab7a6aec83d51d94bb300824d77608ae0b14ccdc4e7a39a9ab58924c235742d67e3926614451e8bda90ca1917c8c4b0d3900c47d5718697da674b96d05cf55b256108807c333aaaee922d4c7e6c42128a1e3c8c2caea5cf7c65f38a0d29f1fe9a031ad7a38dc425a0085914ecd2645ade3417e71ca1b8ef2d0ffc8ca768f9dffa4b68ea14d5a5d27ceaa920d9824afedc18fb40eb7b521ff01dee828a11af40b10a95578ff6e3e8b726571cf2cb2f8f7c331f54df5c41985cd1d52c528bee1abe5d5ec73f84f5f8b171aca76d33b7805b7709b270209c2c2dad90ba8f9839f4cfd5b644a5daab3baf633c4934112eba3a587229f0cc9f0fda39c05c79563bdec0023eba483951efb1c23efc1399e4a7afe71351027860db325a43fb008cb39c0d0cbedc00dc12fb44144d0a9603a7e2d80b1c42a2abe5e66ae35058a8d7b282409b7d2297195fac993d1ffe41260dd84faee8ea2a100deff270e341014a5489d5d0636143f4769536fde9ac56dbb619e01010365b1aaa51e2ad45eca004ccf2e0fb960084c8c0dff01339bd779a362167647ba826225005cf84ad4bd67db297394283acdc7233e065484b16081569947b31e5983f99fb552797f440262720621e44ad39a3a96072315bee7e1eb92dc5e1a56a1ba1c3b1ff8ef2c35ab0322ec880711981edea13845d39ddf1ab1e4c55e5f0db09bd54c1e82063c78ef44317cdceb915446ed7f2ac25e696e57a06a3389812c889ff0e8bcca6b0f90255732d7d473d0790224d271f766721da1f2a757a0b2d96cc24d10605cc20303ba1a76812eb13a1b85969cceaca3430a07938c33589ef0f278adb4e084ac4fcd4923757e89ff64db1178bf94993030320b861c5354b22ae3848e79f015ab022abe1cb091dfd7286347b69a674f2acb66da574b59082fd336b720b50ab473bba1a1a7cf55b927fe4f7eb60dd4e97fcc12bb828804cb575dea05b7231a04668c248400a03f39796098915f3cf9b6d70ace1228a71fea6263bb9eb5c989d723de895d7188918115a9f8ee147962eea3823aced0b20fad17bb1f50d3ffa13923bbc58134a5efd608b585b00a13d891e7770ba5a23d29400de1df4a0a0705f8dfb02e96168215185e6e9f80ee5073d3e436866360d0378e440ef77b0ce6944bd0721b162491f454fc1623ca6c00cb5690869645cd061926b5d4da274f87997248a80a9f6a5078347c8a95750eccb0fca79c1007e76def7dfa347502988572ba3e6fe03ad7c0dd2420a0eaf145be2d325a7cac8bf89bdd11919c528e05140116843056f356807063bf02fca74d1a7e9e85729fb302845350a7b6a1f17f950dfbf7b3dc2661cb2661d28d712a4d21768ae30052923f613e413b7cc54a3b055a248a36d5ce5ef8d62ea3c36b072ac3c88a0bbfb50301d49f08c8d02c5b1414d65b38773fa1a9f926a4d65188e6731206f5bed51c46d7ceeca3f461387f4fbf6652112c7a6d17a95f0d8ae07c19e0122b1bb7c6921929f2e0306fff28bbbc0e49630019e289864d583e9fdd2dd51d452b67e8b08cccfaeaf05362adb2f8168b82d1920976db7649e305b80a1ac7a77a49f8dcb7ffab099ed9fa600429855dca961c0c38c26839bf41624d733799d4097cd92c5b11d3e22e618ffe8d623702a51bef355d36c70179c98f4cac22e92ad4c1a45a8e37e98089d80f54b27aaa5c2d9e2bed52bcc228800d53b583c71ab0142e3d2c29bf6343b51fd98bb51200a43e36228d0dbe6e42d14116699fc47ce5a25484f0f0102c19b8000601da7b8bbd35773b45ad605dd2568dc607184ee268e9fe55274a32c12aadc57e01c15740098e176d82e2591de7170865038df298bc49763e5ddf3ea2153793c271457e31e269ea4ef9402403a2ba73f6d967ee3d351ffcece53ae8b23c95fa70fabf2d01d5be7f4f22ae32c172eac0f808e85dbc0cef1d6a499dae1818a089f1e7975425cfac7228a80a4e162d1fb63868008518d6d09d7b52929c2238704d867145ee438069544d4c48713564d6835da62157cf38cdfcab76cca303ce1ba07f6326d37170c4470a4d642ea23af8be5599ea2788770d2946c8fe5aa33017fe08872b865fa023ce6dad0d64962321d9407a75a658bed170919f3999b70a20e2d2b2bb2dca90e7b9d9b546e467ac891cc008fe82c8a63cd3fcade56062e126a7357ca909ce7775e5f5080370938d500f970b72eba4628018fa6dd475987e265844e2c9d72d9d176d007433ad9c9aec653785dc4da9f5aaf3f60daf4325d841c33cc606c203520b7a346425db91ac623ad1c283a6a113dbb43d243ff50a905e8db4594167ac7c73412f96c30bc6c277ae13d163b13438fac729ef3a2477090e50253791bb41261f339e95341c226f91afed639e1b0c89acd03dfed8146c1f542ae50a591a6e5bbb9f8fb5eca7194db12159897dee7aebb9bc23c14c10384013f31e59c27084520e29357f8a679362717a4c7bbec55b691cfdfbc8bee046c584b1d7cddcada9fdd9c1a6efd5009b31d3af2f7ed4a5589f528c1368ec3064f08598707282a8def54567c14f69a889e3ef795db844c3bae2a6b3111fc767b348ac2a9b4c1d7390e299a3a6082c43b86ac03cc1e4a745bdd0f29c5ef1855fc7559bf2671100680bde6de639a36e0c167c6508ca5515e82aec5060a17e97e6053f71e03b9219c3b02f2a4937207e5cdc2198c491414bd924f6f2b19e0ed46620fd55391f595095949e2249c169143ec7317c052a8d26cef161220b19d87de758b76a02a9ad919ff0ca08fbf3ec309a8756e04d33cd6815275d7825e82d6405c0b9d6a208f1dea3bd275de2652e0f633e58f74b5b1edfda4655f0897bc81bada004b0f7eb916a0245c4bd6a494339f4451c49e257f924ace676fa84377292d9ceb6d15212565246151ce65cd978968f6a5daeda325a990b1feb1f8c30bfa90dd8a1e1f701883fa463ddb113611e835e8ad422eca410f3753161532a42dfa1e34dd94d92ef7d1171d6a48acb51a4d5ec0c50715bfa6693c80e47b26a931f04d0ee3c249b85735fe360a0d14569a5ef2b73564f08ecae7ebd25314824b60b9617db0379dda75a1979773b64f325d1bc71000c638dbefca7fa8b3f92185770ad3a1608f4b9cb304f2a21fddb57703eb30f93baf23cc42c5433b2cc7f462032e13a2ae6e394a6743515929a9fa7bcac382ac73767ea746ba212dbb8ef86d1a052866c4da81c83edda210065898e1eb0e43d1d31b39e5b89ac768bf194fb692258a5139a472fedb1139207a116893a241aac2680d72bdb9044cd31ced9091e2689cecf7e50cd34f4ca1e5e2d15550bba263d70491b2d72bf4d9a0e80dbaddc1fffc9240f85fab981be9d730a22f91918e03c1520887c11c4226a1028319e343dd53adc92e9e1ce7c0e72be54af73b9fdc78db4ddb58154ca3719c60754e365310ca3742081ea5509220ea0bed4ef2de34f4e819b403bc14ea0d64969d7c2e4aa3183c69cffcb9ebf64b2d9f825cbbcc57dc3b77c11bf0fe1197a16715e7dd50725b94e049b2eceddf00463dd15b6679e8ebe5cc3aa75d6f24e5a0b854b3eb6911259281d718743c50137b1fd01b0f0e6df19b8e952d2a9aabbcc822371a2679c973cf588335d4ced299d4194ed88e799bce0fcf3e77afc55c73af080c7ffb69e2ada65fd22df1cb93401f48fb13e382e89c726c6caacec13cf10744fb7911d2668c641204106bfddc2935ecbeb24f1151344e66df2ddf4de2da4136e8f5a6cacf2aff2e6739bd2630a3887f7850a17cacc3f978b6d1c3c68882e5edde0df33630a9f2e95d4b70a936f9af7781bb502e88f9778970d26fb497f5370f3e917cecec69c27ce2d30b9d3c0767bd4352867ba973ed438f7f931328773fa8b62b9eac0966b00db1796326ec5791be8b7c723c53299109e0d87dd4d9b1635ab02ccc2fdb56ac1d6a052cfef6cc5956f78700f730213668caa3083ebbf8c77431658219e20f522aca31e03f9d4ddc95d7ae1e01aab2af7e7c4f889a021dc6ac0da0dbac9d4e6c6e0888eee326a59d48f2883abeec8f112cde7964bbfcc0fb9e31683df8ab4f515cfe34e99c734d076fdded641026385f8f4bf9d906c534e85f3c7544649bb27de2d9cdf8f0871354629f7c97f8658182fca124f2c16303c076001a430a0999cbde859a2110787e65c7332ec995aa07ae94ac34777572d7d1ad225f7d401b2b3a7fe91c7a7b9e6f35e93ec0330af0bdcbdb04b3ff4db3dd19fad7269663cf473d1be1ac67640a446c7a9ff1cb7b24e4a48b65d6c6169878b816fcc1cf93069a6b991886391ff5c3bd50a9b2faf114c3705021161a170c6b52e6d325c1b41f6c9af655749efe79e98849c0ed31e9e62d772336cb2ff1c73eb4f28db50e805d4fa2f921593d57aa484b9807641ac498730a970555e803c8c76de20cdde14be48f10f83552b5c4df67d0dbb940769bea46ddf67a28df85593b7f3e79f4572d93e590d2c510b8bba0994e2727bafee0229b81bc6a79935564361b50d28ad68a960be1651aa2e09601825ccb89f39d2ba68c062889446b6e018fb36130450120221e29b2b51822439ea8b4906f7160de846982199dc86a5d55efa61eded58af225efec3314b1ea2ff14c4c825b78934337b8cff3fda562efe6f0223a888337fc2517de01d6d67ffd0047f039c24ce0589c8e13dc7b784ac1052cc2ebe2269fd76ae74053332ca3461e7428a64959916b280cb01a75e897b775b9824e756f994b40962b38aca9e20c4968ed406f0fe161b9ee4983c19f3e17190da30bb4c383f62b349064ac3254eec0122e65791dd5117d1ae7dbab3d8161bd96dc12414b6a58ab4c71a8285a586cd325d156ec880601d043640d224dbacac967455bd803578c2e9ef98a35496cb9fb018f1dd91d49c309b728cfde8f6edd570d209e23b7ec487b07d8f46d62d0debb18ef814e9465376871ad65bc9e1ee7887707f105a3d60c91025c6bd796b8e160aa42458b76ddf073b8dc8d5807834d33c1b25c9cae82acecf397459e1eb5db5e5cb765694228d203d3bc8a364e4be2c4d1f512893f9d0b73c6fdfcf8e5f3e9304b05f1bc1521909526c24507227a6723287effccefcd50b2651891b6dd5c91fbd234124040dace2ff521810f62b08a84f17fda023e92e7fc2587621a0aaf23dac65e5cbebfc4a8b99b94c18ab649515a2308f18b4ac1f48e08114d403a3c0b4b45e0ad0f73254086226fb863484c2fab98185f0bfb186341733c85666fa5551304ff4ccff2d7ffff39360ee02d5d258168f38bfbca692e522aaf6e1284443e4537d8d9de9a43d69f48fe532d3cf82a1a2a47598595c1f92cf95462867559cf80d6ae2fabf48408a812beb6e56aec2d178c0b14d061f163fc551df730389d84df808d3c4029ca3938f32c1089f97cc75b01bdf7aa7a624af02d8671926891da9b89625493fa1e116505d09bc5534359c8e659e4d7470757707159d706e1527ba36faaca78603305197269063729cd33922e1cbca5784d0fd60df6f8578f5fb0c2753b3226f2872f660ff1f2ea54dbb4409db230735e972f8ff9eec7ee3e0c67c572d9525b1ca5f9f13e228735e7e1b1c4cd84661c98be75e6a15b0c62454495889", 0x1000, 0x6}, {&(0x7f0000001400)="19af70e149476be62b600b40053e8f3349fadd241350c2d47bfce6c99c0ebd64949f64aa", 0x24, 0x6}], 0xa0428, &(0x7f00000014c0)='bond_slave_0\x00') r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xff3b, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904044865160b005b0010000000000004140e000a0002000000dc2976d153b4", 0x235}], 0x1}, 0x0) setreuid(0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setreuid(0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000180)={'macvlan0\x00', 0x4}) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGARP(r3, 0x8954, &(0x7f00000001c0)={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x306, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x8, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 'bond_slave_0\x00'}) setreuid(0x0, 0x0) [ 1266.943207] RAX: ffffffffffffffda RBX: 00007f590557e6d4 RCX: 000000000045c479 [ 1266.950510] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 1266.957814] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1266.965186] R10: 0000000100020000 R11: 0000000000000246 R12: 0000000000000005 [ 1266.972838] R13: 00000000000008d1 R14: 00000000004cb364 R15: 000000000000000c 07:35:00 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) 07:35:00 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000040)={0x1f, @fixed={[], 0x10}}, 0x8) 07:35:00 executing program 2 (fault-call:5 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:35:00 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000000)={0x1, 0x9, 0x4, 0x80000, 0x80, {0x0, 0x2710}, {0x2, 0x18, 0x0, 0x2, 0x3f, 0x5, "decc1486"}, 0x270, 0x4, @offset=0x3f, 0x8001, 0x0, r4}) ioctl$DRM_IOCTL_MODE_SETCRTC(r5, 0xc06864a2, &(0x7f00000000c0)={&(0x7f0000000080)=[0xffff, 0x5, 0x1, 0x7, 0x81], 0x5, 0x3, 0xffffffff, 0x6, 0x1000, 0x1, 0xb20f, {0x4, 0x2d, 0x81, 0x400, 0x5, 0x5, 0xfff9, 0x1, 0xffff, 0x2, 0x92, 0x0, 0x5, 0x6, "53bec023990c9f97613ee3ce9b456ac046c02f0e0395e40242cafeded7ce3723"}}) write$binfmt_elf64(r3, &(0x7f0000000180)={{0x1b, 0x5b, 0x7, 0x3b, 0x0, 0x32, 0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x106d, 0x40}, [{}], "", [[], [], [], [], [], []]}, 0x678) [ 1267.357290] FAULT_INJECTION: forcing a failure. [ 1267.357290] name failslab, interval 1, probability 0, space 0, times 0 07:35:00 executing program 2 (fault-call:5 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) [ 1267.419573] CPU: 0 PID: 13077 Comm: syz-executor.2 Not tainted 4.14.172-syzkaller #0 07:35:00 executing program 0: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socket$inet6(0xa, 0x800, 0x3) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffe58) connect$bt_sco(r0, &(0x7f0000000000)={0x1f, @fixed={[], 0x12}}, 0x8) [ 1267.419584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1267.419589] Call Trace: [ 1267.419614] dump_stack+0x13e/0x194 [ 1267.419635] should_fail.cold+0x10a/0x14b 07:35:00 executing program 2 (fault-call:5 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) [ 1267.419654] should_failslab+0xd6/0x130 [ 1267.419668] kmem_cache_alloc_node_trace+0x292/0x7b0 [ 1267.419685] ? lock_acquire+0x170/0x3f0 [ 1267.419696] ? lock_downgrade+0x6e0/0x6e0 [ 1267.419709] __kmalloc_node+0x38/0x70 [ 1267.419722] kvmalloc_node+0x46/0xd0 [ 1267.419734] iov_iter_get_pages_alloc+0x48c/0xe90 [ 1267.419750] ? iov_iter_revert+0x980/0x980 07:35:01 executing program 2 (fault-call:5 fault-nth:5): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) [ 1267.419760] ? iov_iter_pipe+0x93/0x2b0 [ 1267.419774] default_file_splice_read+0x17c/0x870 [ 1267.419783] ? save_stack+0x32/0xa0 [ 1267.419791] ? kasan_kmalloc+0xbf/0xe0 [ 1267.419800] ? __kmalloc+0x15b/0x7c0 [ 1267.419809] ? alloc_pipe_info+0x156/0x380 [ 1267.419820] ? do_sendfile+0x469/0xaf0 [ 1267.419828] ? SyS_sendfile64+0xff/0x110 [ 1267.419839] ? do_syscall_64+0x1d5/0x640 [ 1267.419863] ? page_cache_pipe_buf_release+0x210/0x210 [ 1267.419877] ? check_preemption_disabled+0x35/0x240 [ 1267.419892] ? perf_trace_lock+0x109/0x4b0 [ 1267.419908] ? fsnotify+0x897/0x1110 [ 1267.419928] ? __fsnotify_update_child_dentry_flags.part.0+0x2e0/0x2e0 [ 1267.419939] ? fsnotify+0x1110/0x1110 [ 1267.419956] ? __inode_security_revalidate+0xcf/0x120 [ 1267.419967] ? avc_policy_seqno+0x5/0x10 [ 1267.419977] ? selinux_file_permission+0x7a/0x440 [ 1267.419991] ? security_file_permission+0x82/0x1e0 [ 1267.420009] ? rw_verify_area+0xe1/0x2a0 [ 1267.420018] ? page_cache_pipe_buf_release+0x210/0x210 [ 1267.420028] do_splice_to+0xfb/0x150 [ 1267.420035] ? alloc_pipe_info+0x2dc/0x380 [ 1267.420046] splice_direct_to_actor+0x20a/0x730 [ 1267.420058] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1267.420067] ? do_splice_to+0x150/0x150 [ 1267.420076] ? rw_verify_area+0xe1/0x2a0 [ 1267.420086] do_splice_direct+0x164/0x210 [ 1267.420095] ? splice_direct_to_actor+0x730/0x730 [ 1267.420108] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1267.420117] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 1267.420127] do_sendfile+0x469/0xaf0 [ 1267.420142] ? do_compat_pwritev64+0x140/0x140 [ 1267.420156] SyS_sendfile64+0xff/0x110 [ 1267.420164] ? SyS_sendfile+0x130/0x130 [ 1267.420172] ? do_syscall_64+0x4c/0x640 [ 1267.420178] ? SyS_sendfile+0x130/0x130 [ 1267.420187] do_syscall_64+0x1d5/0x640 [ 1267.420201] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1267.420209] RIP: 0033:0x45c479 [ 1267.420214] RSP: 002b:00007f1dbe77fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1267.420224] RAX: ffffffffffffffda RBX: 00007f1dbe7806d4 RCX: 000000000045c479 [ 1267.420230] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 1267.420235] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1267.420241] R10: 0000000100020000 R11: 0000000000000246 R12: 0000000000000005 [ 1267.420246] R13: 00000000000008d1 R14: 00000000004cb364 R15: 0000000000000002 [ 1267.607290] FAULT_INJECTION: forcing a failure. [ 1267.607290] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1267.607305] CPU: 1 PID: 13087 Comm: syz-executor.2 Not tainted 4.14.172-syzkaller #0 [ 1267.607313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1267.607317] Call Trace: [ 1267.607344] dump_stack+0x13e/0x194 [ 1267.607364] should_fail.cold+0x10a/0x14b [ 1267.607381] __alloc_pages_nodemask+0x1bf/0x700 [ 1267.607397] ? __lock_is_held+0xad/0x140 [ 1267.607406] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1267.607422] ? __kmalloc_node+0x38/0x70 [ 1267.607435] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1267.607445] ? kmem_cache_alloc_node_trace+0x38c/0x7b0 [ 1267.607458] alloc_pages_current+0xe7/0x1e0 [ 1267.607474] push_pipe+0x3bf/0x730 [ 1267.607491] iov_iter_get_pages_alloc+0x4da/0xe90 [ 1267.607507] ? iov_iter_revert+0x980/0x980 [ 1267.607517] ? iov_iter_pipe+0x93/0x2b0 [ 1267.607531] default_file_splice_read+0x17c/0x870 [ 1267.607540] ? save_stack+0x32/0xa0 [ 1267.607548] ? kasan_kmalloc+0xbf/0xe0 [ 1267.607558] ? __kmalloc+0x15b/0x7c0 [ 1267.607567] ? alloc_pipe_info+0x156/0x380 [ 1267.607578] ? do_sendfile+0x469/0xaf0 [ 1267.607587] ? SyS_sendfile64+0xff/0x110 [ 1267.607597] ? do_syscall_64+0x1d5/0x640 [ 1267.607612] ? page_cache_pipe_buf_release+0x210/0x210 [ 1267.607624] ? check_preemption_disabled+0x35/0x240 [ 1267.607638] ? perf_trace_lock+0x109/0x4b0 [ 1267.607653] ? fsnotify+0x897/0x1110 [ 1267.607674] ? __fsnotify_update_child_dentry_flags.part.0+0x2e0/0x2e0 [ 1267.607685] ? fsnotify+0x1110/0x1110 [ 1267.607703] ? __inode_security_revalidate+0xcf/0x120 [ 1267.607718] ? avc_policy_seqno+0x5/0x10 [ 1267.607728] ? selinux_file_permission+0x7a/0x440 [ 1267.607742] ? security_file_permission+0x82/0x1e0 [ 1267.607755] ? rw_verify_area+0xe1/0x2a0 [ 1267.607765] ? page_cache_pipe_buf_release+0x210/0x210 [ 1267.607776] do_splice_to+0xfb/0x150 [ 1267.607785] ? alloc_pipe_info+0x2dc/0x380 [ 1267.607798] splice_direct_to_actor+0x20a/0x730 [ 1267.607812] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1267.607825] ? do_splice_to+0x150/0x150 07:35:01 executing program 1: r0 = accept(0xffffffffffffffff, &(0x7f00000002c0)=@ax25={{0x3, @null}, [@remote, @remote, @netrom, @netrom, @default, @null, @netrom]}, &(0x7f0000000080)=0x80) getpeername$netrom(r0, &(0x7f0000000400)={{0x3, @netrom}, [@remote, @null, @null, @netrom, @rose, @rose, @default, @bcast]}, &(0x7f0000000480)=0x48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x1, &(0x7f0000000140)=[{&(0x7f0000000200)="c173728dc2e8ba1a99e63c2e9237d94cdf5e3c6a78775d29378c5e04ae42c5e7df93ffe84704a248a9804db6d208871d0510ffb82ae6e55eaae477ead88f279d95cd852cd9da00648502286a4a7e4239ce1e035ee1baa74a08f991d6da6840fb3bff60d3658db9933d43e7175ddb0a415850cdb7520999b4ecf4013b59f745030d5ae99e46be", 0x86, 0x7}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="75737271756f74612c75737271756f74612c756d61736b3d3078666666666666666666666666663735352c6572726f72733d636f6e74696e75652c726573697a653d3078f8c62c273030303030303030303063312c657569643e", @ANYRESDEC=r1, @ANYBLOB=',appraise_type=imasig,\x00']) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_int(r2, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r3, r3, 0x0, 0x100020000) [ 1267.607837] ? rw_verify_area+0xe1/0x2a0 [ 1267.607849] do_splice_direct+0x164/0x210 [ 1267.607861] ? splice_direct_to_actor+0x730/0x730 [ 1267.607877] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1267.607888] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 1267.607903] do_sendfile+0x469/0xaf0 [ 1267.607923] ? do_compat_pwritev64+0x140/0x140 [ 1267.607940] SyS_sendfile64+0xff/0x110 [ 1267.607949] ? SyS_sendfile+0x130/0x130 [ 1267.607959] ? do_syscall_64+0x4c/0x640 [ 1267.607968] ? SyS_sendfile+0x130/0x130 [ 1267.607980] do_syscall_64+0x1d5/0x640 [ 1267.607999] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1267.608009] RIP: 0033:0x45c479 [ 1267.608015] RSP: 002b:00007f1dbe77fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1267.608028] RAX: ffffffffffffffda RBX: 00007f1dbe7806d4 RCX: 000000000045c479 [ 1267.608034] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 1267.608042] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 07:35:01 executing program 5: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETRULE(r0, &(0x7f0000000bc0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0x998, 0x7, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, [@NFTA_RULE_EXPRESSIONS={0x694, 0x4, 0x0, 0x1, [{0xc0, 0x1, 0x0, 0x1, [@tunnel={{0xb, 0x1, 'tunnel\x00'}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_TUNNEL_MODE={0x8, 0x3, 0x1, 0x0, 0x1}]}}, @meta={{0x9, 0x1, 'meta\x00'}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_META_DREG={0x8, 0x1, 0x1, 0x0, 0x14}]}}, @numgen={{0xb, 0x1, 'numgen\x00'}, @void}, @tproxy={{0xb, 0x1, 'tproxy\x00'}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_TPROXY_REG_PORT={0x8, 0x3, 0x1, 0x0, 0x11}, @NFTA_TPROXY_FAMILY={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_TPROXY_REG_PORT={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_TPROXY_REG_PORT={0x8, 0x3, 0x1, 0x0, 0x16}, @NFTA_TPROXY_REG_ADDR={0x8, 0x2, 0x1, 0x0, 0xb}]}}, @counter={{0xc, 0x1, 'counter\x00'}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x5}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x8}]}}, @reject={{0xb, 0x1, 'reject\x00'}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_REJECT_TYPE={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_REJECT_TYPE={0x8, 0x1, 0x1, 0x0, 0x1}]}}]}, {0xe0, 0x1, 0x0, 0x1, [@dynset={{0xb, 0x1, 'dynset\x00'}, @void}, @queue={{0xa, 0x1, 'queue\x00'}, @val={0x4c, 0x2, 0x0, 0x1, [@NFTA_QUEUE_SREG_QNUM={0x8, 0x4, 0x1, 0x0, 0x8}, @NFTA_QUEUE_FLAGS={0x6, 0x3, 0x1, 0x0, 0x2}, @NFTA_QUEUE_TOTAL={0x6, 0x2, 0x1, 0x0, 0x6}, @NFTA_QUEUE_TOTAL={0x6, 0x2, 0x1, 0x0, 0x1}, @NFTA_QUEUE_TOTAL={0x6, 0x2, 0x1, 0x0, 0x309a}, @NFTA_QUEUE_SREG_QNUM={0x8, 0x4, 0x1, 0x0, 0x12}, @NFTA_QUEUE_FLAGS={0x6}, @NFTA_QUEUE_NUM={0x6, 0x1, 0x1, 0x0, 0x8001}, @NFTA_QUEUE_SREG_QNUM={0x8, 0x4, 0x1, 0x0, 0x15}]}}, @rt={{0x7, 0x1, 'rt\x00'}, @void}, @dup={{0x8, 0x1, 'dup\x00'}, @val={0x4c, 0x2, 0x0, 0x1, [@NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0x17}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0x14}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0xb}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0xe}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0xc}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0xa}, @NFTA_DUP_SREG_DEV={0x8}, @NFTA_DUP_SREG_DEV={0x8}]}}, @connlimit={{0xe, 0x1, 'connlimit\x00'}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_FLAGS={0x8}]}}]}, {0x34, 0x1, 0x0, 0x1, [@immediate={{0xe, 0x1, 'immediate\x00'}, @void}, @queue={{0xa, 0x1, 'queue\x00'}, @void}, @fwd={{0x8, 0x1, 'fwd\x00'}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_FWD_SREG_ADDR={0x8, 0x2, 0x1, 0x0, 0x13}]}}]}, {0x474, 0x1, 0x0, 0x1, [@lookup={{0xb, 0x1, 'lookup\x00'}, @val={0x30, 0x2, 0x0, 0x1, [@NFTA_LOOKUP_SREG={0x8, 0x2, 0x1, 0x0, 0x13}, @NFTA_LOOKUP_DREG={0x8, 0x3, 0x1, 0x0, 0x3}, @NFTA_LOOKUP_SET={0x9, 0x1, 'syz2\x00'}, @NFTA_LOOKUP_SET_ID={0x8}, @NFTA_LOOKUP_DREG={0x8, 0x3, 0x1, 0x0, 0x16}]}}, @ct={{0x7, 0x1, 'ct\x00'}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0xa}, @NFTA_CT_DREG={0x8, 0x1, 0x1, 0x0, 0x10}]}}, @quota={{0xa, 0x1, 'quota\x00'}, @val={0x48, 0x2, 0x0, 0x1, [@NFTA_QUOTA_BYTES={0xc, 0x1, 0x1, 0x0, 0x8}, @NFTA_QUOTA_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_QUOTA_BYTES={0xc, 0x1, 0x1, 0x0, 0x200}, @NFTA_QUOTA_CONSUMED={0xc, 0x4, 0x1, 0x0, 0x8000}, @NFTA_QUOTA_CONSUMED={0xc, 0x4, 0x1, 0x0, 0x200}, @NFTA_QUOTA_FLAGS={0x8}]}}, @masq={{0x9, 0x1, 'masq\x00'}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_MASQ_FLAGS={0x8, 0x1, 0x1, 0x0, 0x28}, @NFTA_MASQ_FLAGS={0x8, 0x1, 0x1, 0x0, 0x941cc635e1778d7a}, @NFTA_MASQ_REG_PROTO_MAX={0x8, 0x3, 0x1, 0x0, 0xd}, @NFTA_MASQ_REG_PROTO_MIN={0x8, 0x2, 0x1, 0x0, 0x12}]}}, @tunnel={{0xb, 0x1, 'tunnel\x00'}, @void}, @socket={{0xb, 0x1, 'socket\x00'}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_SOCKET_DREG={0x8, 0x2, 0x1, 0x0, 0x11}, @NFTA_SOCKET_KEY={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SOCKET_DREG={0x8, 0x2, 0x1, 0x0, 0x16}, @NFTA_SOCKET_DREG={0x8, 0x2, 0x1, 0x0, 0x1}]}}, @bitwise={{0xc, 0x1, 'bitwise\x00'}, @void}, @tproxy={{0xb, 0x1, 'tproxy\x00'}, @void}, @range={{0xa, 0x1, 'range\x00'}, @val={0x334, 0x2, 0x0, 0x1, [@NFTA_RANGE_TO_DATA={0x58, 0x4, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x4}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}]}, @NFTA_RANGE_OP={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_RANGE_TO_DATA={0x2c8, 0x4, 0x0, 0x1, [@NFTA_DATA_VALUE={0xaf, 0x1, "239d8a634faf835c75d35c49e6790c62d2d52f708386a04a9be4f183e0acbdafc2584c567407f0fa079e0ad9ce61c05dc6a15b94a8d4f643caf5f2ed0228b9b6189db1d6b4faec7d257cd2324bd25415749000b4ff5103877059fa3ef1e3a468fb566c33ae7ca9a5369deb6398b5a02222e9a5e7a8adf811de1f221180bd2fa9321f55fe580003a177d7301706432affb0c7f622644c5d9c965f840629cef50fa27fa161d81c7ecf4346da"}, @NFTA_DATA_VERDICT={0x64, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VERDICT={0x40, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x7e, 0x1, "64183d3863dd4f26537cf72345716e07e59ad18cdbee2b8e722be379c4e614952cf961d374271ad83f8ae83d8ee2f16a1deda9dd54932a2afff87f283de79715131aa07621f230e64f6323be61322e3b2d3de0c55da6952cfced5ae1276aeee7e641e142511c6d64a4a32951d98a268795870d77f4ab26354452"}, @NFTA_DATA_VALUE={0xed, 0x1, "a5d3ac8c09faf83cf541dc828bad4dcc1d70f693860363ffafee8623754faa627b82e36298a3ce79aecf22e16c6d8196637cccb05cc5babf8d93c2c3eb65d90e6d37a4d3fae401cdd023b0f6da5892f595624e50b296937d6a919931db285e9f3aee79bebab2e928648907cde745b1d34017ae63c863004a40f4cc22d4c3053b339f16a9e4a25fd21bd55c4c0c830fa0172f767764a7ddef59a7e00f066c81f411f0f9d75f0ef8bec8aca0aa3f66939344f7429820204bb862a3da98c0ea58c4c667d323eab666005a707c06c888837c0797fa4c33d1b58932a6d82bae5b3acd45070b4185bb6c3687"}]}, @NFTA_RANGE_SREG={0x8, 0x1, 0x1, 0x0, 0x10}]}}]}, {0x10, 0x1, 0x0, 0x1, [@exthdr={{0xb, 0x1, 'exthdr\x00'}, @void}]}, {0xc, 0x1, 0x0, 0x1, [@osf={{0x8, 0x1, 'osf\x00'}, @void}]}, {0x2c, 0x1, 0x0, 0x1, [@masq={{0x9, 0x1, 'masq\x00'}, @void}, @exthdr={{0xb, 0x1, 'exthdr\x00'}, @void}, @dup_ipv6={{0x8, 0x1, 'dup\x00'}, @void}, @ct={{0x7, 0x1, 'ct\x00'}, @void}]}]}, @NFTA_RULE_EXPRESSIONS={0x29c, 0x4, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@numgen={{0xb, 0x1, 'numgen\x00'}, @void}, @fib={{0x8, 0x1, 'fib\x00'}, @void}, @target={{0xb, 0x1, 'target\x00'}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_TARGET_NAME={0x5, 0x1, '\x00'}]}}]}, {0x110, 0x1, 0x0, 0x1, [@rt={{0x7, 0x1, 'rt\x00'}, @val={0x4}}, @socket={{0xb, 0x1, 'socket\x00'}, @val={0x3c, 0x2, 0x0, 0x1, [@NFTA_SOCKET_KEY={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SOCKET_KEY={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SOCKET_DREG={0x8, 0x2, 0x1, 0x0, 0x11}, @NFTA_SOCKET_DREG={0x8, 0x2, 0x1, 0x0, 0x15}, @NFTA_SOCKET_KEY={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SOCKET_DREG={0x8, 0x2, 0x1, 0x0, 0xc}, @NFTA_SOCKET_KEY={0x8, 0x1, 0x1, 0x0, 0x1}]}}, @osf={{0x8, 0x1, 'osf\x00'}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_OSF_TTL={0x5, 0x2, 0x5}, @NFTA_OSF_FLAGS={0x8}, @NFTA_OSF_TTL={0x5, 0x2, 0x7f}]}}, @tproxy={{0xb, 0x1, 'tproxy\x00'}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_TPROXY_REG_ADDR={0x8, 0x2, 0x1, 0x0, 0x8}, @NFTA_TPROXY_REG_ADDR={0x8}, @NFTA_TPROXY_FAMILY={0x8}, @NFTA_TPROXY_FAMILY={0x8, 0x1, 0x1, 0x0, 0x2}]}}, @connlimit={{0xe, 0x1, 'connlimit\x00'}, @val={0x54, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0x504}, @NFTA_CONNLIMIT_FLAGS={0x8}, @NFTA_CONNLIMIT_FLAGS={0x8}, @NFTA_CONNLIMIT_FLAGS={0x8}, @NFTA_CONNLIMIT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_CONNLIMIT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0xe1bf}, @NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0xffffffff}, @NFTA_CONNLIMIT_COUNT={0x8}, @NFTA_CONNLIMIT_FLAGS={0x8}]}}]}, {0x78, 0x1, 0x0, 0x1, [@tproxy={{0xb, 0x1, 'tproxy\x00'}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_TPROXY_REG_PORT={0x8, 0x3, 0x1, 0x0, 0x11}, @NFTA_TPROXY_REG_ADDR={0x8, 0x2, 0x1, 0x0, 0xc}, @NFTA_TPROXY_REG_PORT={0x8, 0x3, 0x1, 0x0, 0x9}, @NFTA_TPROXY_REG_ADDR={0x8, 0x2, 0x1, 0x0, 0x16}, @NFTA_TPROXY_FAMILY={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_TPROXY_REG_PORT={0x8}]}}, @fib={{0x8, 0x1, 'fib\x00'}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_FIB_DREG={0x8, 0x1, 0x1, 0x0, 0x1e}, @NFTA_FIB_DREG={0x8, 0x1, 0x1, 0x0, 0x17}, @NFTA_FIB_DREG={0x8, 0x1, 0x1, 0x0, 0x13}, @NFTA_FIB_RESULT={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_FIB_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}]}}]}, {0x7c, 0x1, 0x0, 0x1, [@tproxy={{0xb, 0x1, 'tproxy\x00'}, @val={0x4c, 0x2, 0x0, 0x1, [@NFTA_TPROXY_REG_PORT={0x8, 0x3, 0x1, 0x0, 0xe}, @NFTA_TPROXY_REG_ADDR={0x8, 0x2, 0x1, 0x0, 0x12}, @NFTA_TPROXY_REG_PORT={0x8, 0x3, 0x1, 0x0, 0x10}, @NFTA_TPROXY_REG_ADDR={0x8, 0x2, 0x1, 0x0, 0x14}, @NFTA_TPROXY_REG_ADDR={0x8, 0x2, 0x1, 0x0, 0x17}, @NFTA_TPROXY_FAMILY={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_TPROXY_REG_PORT={0x8, 0x3, 0x1, 0x0, 0x3}, @NFTA_TPROXY_REG_PORT={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_TPROXY_FAMILY={0x8, 0x1, 0x1, 0x0, 0xa}]}}, @synproxy={{0xd, 0x1, 'synproxy\x00'}, @void}, @synproxy={{0xd, 0x1, 'synproxy\x00'}, @void}]}, {0x64, 0x1, 0x0, 0x1, [@immediate={{0xe, 0x1, 'immediate\x00'}, @void}, @osf={{0x8, 0x1, 'osf\x00'}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_OSF_TTL={0x5}, @NFTA_OSF_FLAGS={0x8}, @NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_OSF_TTL={0x5, 0x2, 0x1f}, @NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0x16}, @NFTA_OSF_TTL={0x5, 0x2, 0x3e}]}}, @osf={{0x8, 0x1, 'osf\x00'}, @void}, @tunnel={{0xb, 0x1, 'tunnel\x00'}, @void}]}]}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x4}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x3}, @NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x3}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x3}, @NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_ID={0x8}]}, 0x998}, 0x1, 0x0, 0x0, 0x80}, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000080), 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffe58) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x3f) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffe58) ioctl$SNDRV_PCM_IOCTL_DELAY(r2, 0x80084121, &(0x7f0000000000)) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local, 0x0, 0x3c}, 0x0, @in=@empty, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r1, &(0x7f0000000480), 0x0, 0x4840) [ 1267.608048] R10: 0000000100020000 R11: 0000000000000246 R12: 0000000000000005 [ 1267.608055] R13: 00000000000008d1 R14: 00000000004cb364 R15: 0000000000000003 [ 1267.824995] FAULT_INJECTION: forcing a failure. [ 1267.824995] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1267.825011] CPU: 1 PID: 13096 Comm: syz-executor.2 Not tainted 4.14.172-syzkaller #0 [ 1267.825018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1267.825022] Call Trace: [ 1267.825041] dump_stack+0x13e/0x194 [ 1267.825061] should_fail.cold+0x10a/0x14b [ 1267.825078] __alloc_pages_nodemask+0x1bf/0x700 [ 1267.825094] ? __lock_is_held+0xad/0x140 [ 1267.825104] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1267.825120] ? __kmalloc_node+0x38/0x70 [ 1267.825131] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1267.825139] ? kmem_cache_alloc_node_trace+0x38c/0x7b0 [ 1267.825152] alloc_pages_current+0xe7/0x1e0 [ 1267.825167] push_pipe+0x3bf/0x730 [ 1267.825183] iov_iter_get_pages_alloc+0x4da/0xe90 [ 1267.825198] ? iov_iter_revert+0x980/0x980 [ 1267.825208] ? iov_iter_pipe+0x93/0x2b0 07:35:01 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000040), 0x8) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000580)) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x4041, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/btrfs-control\x00', 0xaa180, 0x0) ioctl$SG_GET_COMMAND_Q(r3, 0x2270, &(0x7f0000000600)) sendmsg$inet(r2, &(0x7f0000000540)={&(0x7f0000000080)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2b}}, 0x10, &(0x7f00000004c0)=[{&(0x7f00000000c0)="654d52a4107cd3783a5baceb438af1253d008b80c132d893bc4e978be04607ab6b1514c1d9ccac2654895e41621cd260f923da9564206efcea247868f5d7b7c380ef0194e24f363ca182e76fcd5d35888c0e59f9b2ec7c798ff3e58142e3c2b24abaf6bd8f31f20a57cbbf15c5dfe32c599a31874506706fde781810e375ae1940a770df43bfcc75137b17799e3c2fbb13ed34983f1cee2d7591eab051a6f7ccf0c25a7eddba0eeb65d4042b75144489709c54c0212b5b9515488b9491c3a60461296ad2bdac17a3aed0", 0xca}, {&(0x7f00000001c0)="995a71be02cc06097e9b793887be0ac4ffdf77cae812828e19ac821125f1b7c9b036f0e9d2aff0996820fc46cd859ec710553295add674c0aa81d0b8797e7129bb042aea3e1878d7cafa54f0151566f21868a5ad1e814957eb0bf1c3ba8a13efcd07d56aef4b5fada7136735a5e4d5926915e53234aa5d832b41ddd6fd52830fc3e57db60a9c75111fe2ab100b89dd1d199ccfa46bc7146ef5581107e5ad4a51cf5b7d68ad1cb132de23945fc994f6f450", 0xb1}, {&(0x7f0000000280)="10dab0e79b275198a2b06d10d2e9b0c0892f62875ad28c89faa195c5fa276a513a87249a67f4bd7001f67424aa6bcee1df96c3a794113b94256ccf381199bffe4468e302fc259937b2562450d96f21e5bb066dec0f5cb3a77b4d8b4b156400abf6675bbe1c51", 0x66}, {&(0x7f0000000300)="4383d46c78ba6dece08dde3ba7b055ba73f21fdaabaf252c6094c5d7ff065d9da99c0b24a3be3e40bccd750487683e768bdc0148ae05fae188dabdeb6637c0686b58e79126e620a913934878c643a18674e70cde082f96ecec74d966632972105f527be4e106544e853dda40", 0x6c}, {&(0x7f0000000380)="6d8b9cb6278e4aca09aeadf2e5971d06bcf7cc670e3fdacf30ec88464789145f9e718d91587bc7937c6ef67dde04781ebd0af612c6b05c6341a63ed056971175100aa645c7956aa0c21d11b2bd96730f71696ef3fa82b378ab343a1117e084b155823958e75cb689d79d25f4999e6906533b31af1b3df25a30cbaee9726c03114fc23a99fef3afc9569b4a2cb985702ebef5ecc77ad178eee08ea677ad4ac6cc631c952acb39697dc86abd48ed260c855ae6e90764641c4b79ec81c0216d144fe8313a5fb12905e8a9137a798da73639f8773c765b", 0xd5}, {&(0x7f0000000480)="c6e8915859649fbe", 0x8}], 0x6}, 0x1) [ 1267.825222] default_file_splice_read+0x17c/0x870 [ 1267.825230] ? save_stack+0x32/0xa0 [ 1267.825238] ? kasan_kmalloc+0xbf/0xe0 [ 1267.825247] ? __kmalloc+0x15b/0x7c0 [ 1267.825255] ? alloc_pipe_info+0x156/0x380 [ 1267.825266] ? do_sendfile+0x469/0xaf0 [ 1267.825274] ? SyS_sendfile64+0xff/0x110 [ 1267.825284] ? do_syscall_64+0x1d5/0x640 [ 1267.825298] ? page_cache_pipe_buf_release+0x210/0x210 [ 1267.825455] ? check_preemption_disabled+0x35/0x240 [ 1267.825474] ? perf_trace_lock+0x109/0x4b0 [ 1267.825490] ? fsnotify+0x897/0x1110 [ 1267.825510] ? __fsnotify_update_child_dentry_flags.part.0+0x2e0/0x2e0 [ 1267.825520] ? fsnotify+0x1110/0x1110 [ 1267.825536] ? __inode_security_revalidate+0xcf/0x120 [ 1267.825545] ? avc_policy_seqno+0x5/0x10 [ 1267.825554] ? selinux_file_permission+0x7a/0x440 [ 1267.825566] ? security_file_permission+0x82/0x1e0 [ 1267.825579] ? rw_verify_area+0xe1/0x2a0 [ 1267.825588] ? page_cache_pipe_buf_release+0x210/0x210 [ 1267.825599] do_splice_to+0xfb/0x150 [ 1267.825608] ? alloc_pipe_info+0x2dc/0x380 [ 1267.825622] splice_direct_to_actor+0x20a/0x730 [ 1267.825637] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1267.825651] ? do_splice_to+0x150/0x150 [ 1267.825664] ? rw_verify_area+0xe1/0x2a0 [ 1267.825677] do_splice_direct+0x164/0x210 [ 1267.825690] ? splice_direct_to_actor+0x730/0x730 [ 1267.825708] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1267.825720] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 1267.825733] do_sendfile+0x469/0xaf0 [ 1267.825748] ? do_compat_pwritev64+0x140/0x140 [ 1267.825764] SyS_sendfile64+0xff/0x110 [ 1267.825772] ? SyS_sendfile+0x130/0x130 [ 1267.825782] ? do_syscall_64+0x4c/0x640 [ 1267.825793] ? SyS_sendfile+0x130/0x130 [ 1267.825806] do_syscall_64+0x1d5/0x640 [ 1267.825827] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1267.825835] RIP: 0033:0x45c479 [ 1267.825840] RSP: 002b:00007f1dbe77fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1267.825852] RAX: ffffffffffffffda RBX: 00007f1dbe7806d4 RCX: 000000000045c479 [ 1267.825858] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 1267.825864] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1267.825869] R10: 0000000100020000 R11: 0000000000000246 R12: 0000000000000005 [ 1267.825874] R13: 00000000000008d1 R14: 00000000004cb364 R15: 0000000000000004 [ 1268.011708] FAULT_INJECTION: forcing a failure. [ 1268.011708] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1268.858226] CPU: 0 PID: 13102 Comm: syz-executor.2 Not tainted 4.14.172-syzkaller #0 [ 1268.866184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1268.875566] Call Trace: [ 1268.878186] dump_stack+0x13e/0x194 [ 1268.881844] should_fail.cold+0x10a/0x14b [ 1268.886011] __alloc_pages_nodemask+0x1bf/0x700 [ 1268.890703] ? __lock_is_held+0xad/0x140 [ 1268.894789] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1268.899836] ? __kmalloc_node+0x38/0x70 [ 1268.903838] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1268.908872] ? kmem_cache_alloc_node_trace+0x38c/0x7b0 [ 1268.914460] alloc_pages_current+0xe7/0x1e0 [ 1268.918812] push_pipe+0x3bf/0x730 [ 1268.922670] iov_iter_get_pages_alloc+0x4da/0xe90 [ 1268.927541] ? iov_iter_revert+0x980/0x980 [ 1268.931798] ? iov_iter_pipe+0x93/0x2b0 [ 1268.935804] default_file_splice_read+0x17c/0x870 [ 1268.940663] ? save_stack+0x32/0xa0 [ 1268.944305] ? kasan_kmalloc+0xbf/0xe0 [ 1268.948268] ? __kmalloc+0x15b/0x7c0 [ 1268.952003] ? alloc_pipe_info+0x156/0x380 [ 1268.956263] ? do_sendfile+0x469/0xaf0 [ 1268.960168] ? SyS_sendfile64+0xff/0x110 [ 1268.964305] ? do_syscall_64+0x1d5/0x640 [ 1268.968506] ? page_cache_pipe_buf_release+0x210/0x210 [ 1268.973921] ? check_preemption_disabled+0x35/0x240 [ 1268.978959] ? perf_trace_lock+0x109/0x4b0 [ 1268.983870] ? fsnotify+0x897/0x1110 [ 1268.987752] ? __fsnotify_update_child_dentry_flags.part.0+0x2e0/0x2e0 [ 1268.994443] ? fsnotify+0x1110/0x1110 [ 1268.998268] ? __inode_security_revalidate+0xcf/0x120 [ 1269.003484] ? avc_policy_seqno+0x5/0x10 [ 1269.007565] ? selinux_file_permission+0x7a/0x440 [ 1269.012438] ? security_file_permission+0x82/0x1e0 [ 1269.017393] ? rw_verify_area+0xe1/0x2a0 [ 1269.021498] ? page_cache_pipe_buf_release+0x210/0x210 [ 1269.026940] do_splice_to+0xfb/0x150 [ 1269.030755] ? alloc_pipe_info+0x2dc/0x380 [ 1269.035024] splice_direct_to_actor+0x20a/0x730 [ 1269.039737] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1269.044609] ? do_splice_to+0x150/0x150 [ 1269.048604] ? rw_verify_area+0xe1/0x2a0 [ 1269.052687] do_splice_direct+0x164/0x210 [ 1269.057300] ? splice_direct_to_actor+0x730/0x730 [ 1269.062181] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1269.067228] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 1269.072019] do_sendfile+0x469/0xaf0 [ 1269.075889] ? do_compat_pwritev64+0x140/0x140 [ 1269.080504] SyS_sendfile64+0xff/0x110 [ 1269.084410] ? SyS_sendfile+0x130/0x130 [ 1269.088406] ? do_syscall_64+0x4c/0x640 [ 1269.092589] ? SyS_sendfile+0x130/0x130 [ 1269.096590] do_syscall_64+0x1d5/0x640 [ 1269.100592] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1269.105794] RIP: 0033:0x45c479 [ 1269.108999] RSP: 002b:00007f1dbe77fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1269.116727] RAX: ffffffffffffffda RBX: 00007f1dbe7806d4 RCX: 000000000045c479 [ 1269.124365] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 1269.131651] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1269.138939] R10: 0000000100020000 R11: 0000000000000246 R12: 0000000000000005 [ 1269.146229] R13: 00000000000008d1 R14: 00000000004cb364 R15: 0000000000000005 07:35:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r2, &(0x7f0000000200)="5c76ef4cec181b405adddb1566405726fee0ee90753bcd816e52f718c90cfadb953e0482d287b192b1dc32255b0934205cc361055cdfbe44cffda8bfd919b2e681482e71d41d6efca67586079d152732da66580b3825e477b03838d30d499a1600d621ba7728e61610477dff697b553f182c7f67f44226a5cab383cf1ae678e9426ea92cc7cbafa32c46623505b07bf420", &(0x7f0000000080)="0811e1a510abd02561f2dba335fbf17b2fe09f83a528590c7b6544d18298fc4952c8f66a68ccd128220fbc99c85e", 0x4}, 0x20) 07:35:02 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() write$dsp(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000380)) connect$bt_sco(r0, &(0x7f0000000040), 0x8) 07:35:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r8 = socket$pppl2tp(0x18, 0x1, 0x1) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r9, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r10 = syz_open_dev$mouse(&(0x7f0000000440)='/dev/input/mouse#\x00', 0x0, 0x10000) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r11, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r12 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r12, 0x0, 0x0, 0x7fff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0xffffffffffffffff, r12, 0x0, 0x1, &(0x7f0000000480)='\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000004c0)='./bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r15, 0x0) r16 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r16, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r17 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r17, &(0x7f0000000080)='threaded\x00', 0xfffffe58) ioctl$TIOCGPGRP(r17, 0x540f, &(0x7f00000005c0)=0x0) r19 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r19, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r20) r21 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r21) statx(r21, &(0x7f0000000600)='./file0\x00', 0x6000, 0x84, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r23 = openat$md(0xffffffffffffff9c, &(0x7f0000000740)='/dev/md0\x00', 0x231000, 0x0) r24 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000780)='/dev/hwrng\x00', 0x40800, 0x0) r25 = openat$fuse(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/fuse\x00', 0x2, 0x0) r26 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r26, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r27 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r27, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r28 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r28, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000a00)=0x0) r30 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r30, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r31) stat(&(0x7f00000004c0)='./bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r32, 0x0) r33 = creat(0x0, 0x0) r34 = fcntl$getown(r33, 0x9) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x120000000000000, 0x1}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xe2e6}, r34, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r35 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r35) statx(r35, &(0x7f0000000a40)='./file0\x00', 0x400, 0x8, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r38 = accept$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000c40)) r39 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r39, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r39, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r39, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r39, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r39, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) setsockopt$inet_tcp_int(r39, 0x6, 0x19, &(0x7f00000000c0), 0x4) getsockopt$inet_IP_IPSEC_POLICY(r39, 0x0, 0x10, &(0x7f0000000c80)={{{@in6, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@empty}}, &(0x7f0000000d80)=0xe8) fstat(r2, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r42 = creat(0x0, 0x0) r43 = fcntl$getown(r42, 0x9) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x120000000000000, 0x1}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xe2e6}, r43, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r44 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r44, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r44, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r44, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r44, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r44, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) setsockopt$inet_tcp_int(r44, 0x6, 0x19, &(0x7f00000000c0), 0x4) getsockopt$inet_IP_XFRM_POLICY(r44, 0x0, 0x11, &(0x7f0000001140)={{{@in=@initdev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4}}, &(0x7f0000001240)=0xe8) r46 = getgid() r47 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r47, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r48 = fcntl$getown(r47, 0x9) r49 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r49, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r50) stat(&(0x7f00000004c0)='./bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r51, 0x0) r52 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r52, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r53 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001280)='/dev/autofs\x00', 0x101000, 0x0) r54 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r54, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r55 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r55, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r56 = creat(0x0, 0x0) r57 = fcntl$getown(r56, 0x9) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x120000000000000, 0x1}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xe2e6}, r57, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) statx(0xffffffffffffff9c, &(0x7f00000012c0)='./file0\x00', 0x0, 0x8, &(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000001400)='./file0\x00', &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r60 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r60, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r61 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r61, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r62 = openat$ion(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ion\x00', 0x1438c0, 0x0) r63 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000001500)='/selinux/policy\x00', 0x0, 0x0) r64 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r64, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r65 = perf_event_open(&(0x7f0000001580)={0x5, 0x70, 0x1, 0x1f, 0x0, 0x1, 0x0, 0x800, 0xc010, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000001540), 0x8}, 0xc010, 0x4, 0x92, 0x1, 0x1, 0x7cd5, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) r66 = getpid() r67 = getuid() stat(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r69 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r69, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r70 = eventfd2(0x81, 0x80800) stat(&(0x7f00000004c0)='./bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r71, 0x0) stat(&(0x7f00000004c0)='./bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r72, 0x0) getgroups(0x3, &(0x7f00000016c0)=[r71, 0xee00, r72]) r74 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r74, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r75 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r75, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r76 = openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f00000019c0)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0x2, 0x0) pipe2(&(0x7f0000001a00)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r78 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r78, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r79 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r79, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) sendmmsg$unix(r1, &(0x7f0000001ac0)=[{&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000180)=[{&(0x7f0000000200)="15fb585887b9365d57c62e8235079877383dff4c9f70ff1fccd3f787f40ed1704157cbe615662d953d2de3ccbf40077e0577a7aed4490773d62cb043e3e024cc9611ef19a1d63af0b465ce22b804ec815114300e0d45478d9e274ef696c75088eda46478595ea731e7996fb625c5eb8408267aa294440fe3b8b0ae1e558eff01a416e337280b07f5b7c939a12b317433a3b7581b52eeb99a03bfc7d62d1c9c44a8c45520f16635dbed184e176e4129f31a26caeb2945dbf20ceaeedc4e9f98cdbf77d258b2cef0c22fa14063d6cd16ee22cc6001515100d730d7858b6bb5d680327080626338da5f1983f3848b3c251f6ce0b8", 0xf3}, {&(0x7f0000000340)="c0ccb1613dd50937f5a4e5b142bd18c39e5046714918becf6bbff6c28d1e272eca62cf056d900a803e2b9193e5c3ea533debcf9e90c642448d9a29d00c8000721892295e84b955c8ac0b439ab510288123c6e7b04d92625a94f00daa3a80921770707e02a0361fa64eac75ed794b05708a724fd520bf824b77519bcb1080614063a8a560fefc64d3e3c4c315d6c4f7b4b313a0e6e5a5f67dbc74e9f16511735939868eb44393cc1344427208dc03006ad0645e2383645573d087e0a65ba2568e017958ce11c3a35d07b8bdb8026ce9e78e962693b0666501cbf81a52e144584e8a", 0xe1}], 0x2, &(0x7f0000000800)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r3, r4]}}, @rights={{0x38, 0x1, 0x1, [r5, r0, r6, 0xffffffffffffffff, r7, r8, r9, r10, r2, r11]}}, @cred={{0x1c, 0x1, 0x2, {r13, r14, r15}}}, @rights={{0x18, 0x1, 0x1, [r16, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r18, r20, r22}}}, @rights={{0x28, 0x1, 0x1, [r23, r24, r2, 0xffffffffffffffff, r25, r2]}}], 0xd8, 0x84}, {&(0x7f0000000900)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000009c0)=[{&(0x7f0000000980)="4940882b33e8523758f4331f42e1f7adbc95d8e666588729e3f9e7b723", 0x1d}], 0x1, &(0x7f0000000e40)=[@rights={{0x24, 0x1, 0x1, [r26, r2, r27, r28, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r29, r31, r32}}}, @cred={{0x1c, 0x1, 0x2, {r34, r36, r37}}}, @rights={{0x18, 0x1, 0x1, [r0, r38]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r40, r41}}}], 0xa0, 0x44080}, {&(0x7f0000000f00)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000001100)=[{&(0x7f0000000f80)="8e692eb91b66352f2f5e591d9b10d57f979387ee31296df32268e181a70d185b00e1fe4012e1b9224a24aeb728109b7c926bc74a97e7846343633e4115180f52e86499adebd781ac1363c179ef3a392f8433ef537babaf64cf01a3947481e1ff246b6116365cd318", 0x68}, {&(0x7f0000001000)="a1a8aa3835e57d82d051cfef1760315e4074abe26ba286aab8b8a026029407d5066bf104ef4c7fd1", 0x28}, {&(0x7f0000001040)="f2b0d4fb99bcfb943fcd53fd09d279a17b068ee13caa2da91655df8166f497840ac58557b8f3e6845fc374edae9c1da16b3d29e69b6eccbb23890896800f03a74dfcbc0a3a2e0d015c9f8f4040a0564feecd5011a6879a0ba151e05b3ac2dd6a573e72902c6095d7104b1e03b47e31dde67a1b494371bf0008c99d00bbfa5b900228a69071d73ad69e02b82405b720dc61afa1061a7ecdb1d2c088a3528c3d75c3d83f", 0xa3}], 0x3, &(0x7f0000001700)=[@cred={{0x1c, 0x1, 0x2, {r43, r45, r46}}}, @cred={{0x1c, 0x1, 0x2, {r48, r50, r51}}}, @rights={{0x28, 0x1, 0x1, [r52, r53, 0xffffffffffffffff, r0, r54, r55]}}, @cred={{0x1c, 0x1, 0x2, {r57, r58, r59}}}, @rights={{0x24, 0x1, 0x1, [r60, r0, r61, r62, r63]}}, @rights={{0x18, 0x1, 0x1, [r64, r2]}}, @rights={{0x14, 0x1, 0x1, [r65]}}, @cred={{0x1c, 0x1, 0x2, {r66, r67, r68}}}, @rights={{0x20, 0x1, 0x1, [r69, r1, r2, r70]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, r73}}}], 0x140, 0x14}, {&(0x7f0000001840)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001980)=[{&(0x7f00000018c0)="94bfcfa972c3f83c077d09b78d87ed0ef17a800450aa7efccc90ff2bee7f02524816d097db777967eea21d7ba4050795f4a7947c4d55a57a373c177822e3cbe2f21e6806db09789a3f13bc17815e96b8a1a61966bb7dfa1451d08c0ee9978263425c539dfadde802d57ee617f223f978036a73efb40eb2bcbe7dff43d01a230202c7729c2f54f2f470c7d8d36fc79c9b0363959cb6fb5cb4e528bfeae9c07ea12233f4b511b3ae25aacd88e76129dd648868f989b5188e7b001322445d0601", 0xbf}], 0x1, &(0x7f0000001a40)=[@rights={{0x1c, 0x1, 0x1, [r74, r75, r76]}}, @rights={{0x14, 0x1, 0x1, [r77]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r78, r79]}}], 0x58}], 0x4, 0x81) io_setup(0x3, &(0x7f0000000080)=0x0) io_submit(r80, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0xff31}]) r81 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r81, 0x0, 0x0, 0x7fff) write$FUSE_NOTIFY_INVAL_INODE(r81, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x5, 0x35, 0x5}}, 0x28) 07:35:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x100, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f0000000140)=0xbd7d) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r2, 0x54a1) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r4) ioctl$SIOCRSACCEPT(r4, 0x89e3) sendfile(r3, r3, 0x0, 0x100020000) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffe58) timerfd_gettime(r5, &(0x7f0000000240)) 07:35:02 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) write$P9_RSYMLINK(r1, &(0x7f0000000000)={0x14, 0x11, 0x2, {0x4, 0x4, 0x2}}, 0x14) connect$bt_sco(r0, &(0x7f0000000040), 0x8) 07:35:02 executing program 4: setrlimit(0x40000000000008, &(0x7f0000000000)={0x4847, 0xfffffffffffff001}) mlock(&(0x7f0000003000/0x3000)=nil, 0x3000) capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) mlock(&(0x7f0000000000/0x4000)=nil, 0x4000) socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x400400, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f0000001980)=@raw={'raw\x00', 0x3c1, 0x3, 0x348, 0x0, 0x0, 0x0, 0x0, 0x190, 0x278, 0x278, 0x278, 0x278, 0x278, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x190, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e22], [0x1]}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x3f, 0x2, "0bbf94c2fa802ca196e92b353f13da3a4357f049687e6f08cfa46ba0d62b"}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3a8) vmsplice(r4, &(0x7f0000000240)=[{&(0x7f0000000500)}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x3, 0x2a, 0x0, 0x3, 0x0, 0x0, 0x0, 0xff, 0x1000}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xffffffff}, 0x1214, 0xd, 0x1, 0x0, 0xbe2d, 0x0, 0x7fe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r7, 0xc004743e, &(0x7f0000000140)=""/246) ioctl$PPPIOCSMAXCID(r7, 0x40047451, 0x0) r8 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vcs\x00', 0x14800, 0x0) io_submit(0x0, 0x3, &(0x7f0000000540)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000007c0)="e603009fbaa51da4e3cee4160a0e2b407000b46c5c6899627a3580313351dc2aff61a8f57d06228ebdeeb3db1a9a58347e8a4bf970ed59f8328e9c98e3b7f7606dc73ff412f47ceb29b0d7f495e7636bb8d7b258201e91c9bb296cf8edf5406291c7c4a0337a47b1eb499c5d7d20bd96adb46120dc52d1e2fbef8490b81be3ced80a67a3708368561ee689711f3f", 0x8e, 0x1000, 0x0, 0x1}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x7, 0x0, r7, &(0x7f0000000440)="bcf462d51d2c5679e6f04a9d6f90ab21c03fee44b27c1a1382368e819ea7f626a6a86247d26419d11f3bfb65a64d5829193a54cbf74ad85067a009ac577bfd702e01ff75295e88", 0x47, 0x20000000000005, 0x0, 0x0, r9}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x8, 0x5, r8, &(0x7f0000000980)="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", 0xff5, 0x8, 0x0, 0x0, r2}]) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) r10 = perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1ff, 0xfffffffffffffffc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r10, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) 07:35:03 executing program 0: ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000100)={0x2, 0xa, 0x4, 0x20, 0x6, {0x0, 0x2710}, {0x1, 0x2, 0x8, 0x3, 0xd8, 0x7f, "c6539126"}, 0x8e, 0x3, @userptr=0x3, 0x8000, 0x0, 0xffffffffffffffff}) ioctl$RTC_AIE_OFF(r0, 0x7002) ioctl$RTC_VL_CLR(r0, 0x7014) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f00000001c0)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000240)={r1, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r3 = request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)=':\x00', 0xfffffffffffffffa) keyctl$set_timeout(0xf, r3, 0x8) connect$bt_sco(r2, &(0x7f0000000040), 0x8) 07:35:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x10) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x101400, 0x0) sendfile(r2, r1, 0x0, 0x100020000) syz_genetlink_get_family_id$smc(&(0x7f0000000300)='SMC_PNETID\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r7 = syz_open_dev$amidi(&(0x7f0000000280)='/dev/amidi#\x00', 0x3, 0x111080) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000080)='threaded\x00', 0xfffffe58) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x3f, 0x0, 0x1, r8}) ppoll(&(0x7f0000000180)=[{r3, 0x40}, {r4, 0x7030}, {r7}, {r6, 0x400}, {r9, 0x5090}, {r2, 0x4000}], 0x6, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240)={[0x3ef]}, 0x8) 07:35:03 executing program 0: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(0xffffffffffffffff, &(0x7f0000000000)={0x1f, @fixed={[], 0x12}}, 0x8) 07:35:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x86) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$rxrpc(0x21, 0x2, 0xa) fcntl$F_SET_RW_HINT(r3, 0x40c, &(0x7f00000001c0)=0x1) r4 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.memory_spread_page\x00', 0x2, 0x0) sendfile(r5, r5, 0x0, 0x100020000) 07:35:03 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) ioctl$TIOCL_SCROLLCONSOLE(r1, 0x541c, &(0x7f0000000000)={0xd, 0x4}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)=0x2) read(r2, 0x0, 0x6c00) dup2(r0, r2) dup3(r2, r1, 0x0) socket(0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(0xffffffffffffffff, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 07:35:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f00000000c0)={0x0, 0xa}) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x100020000) 07:35:03 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xfffffffffffffffc, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x7fffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000), 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000001001000001000000ec80000000a025a5906782ace162e1469a4000000000"], 0x18}}], 0x1, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x2) socket$kcm(0x10, 0x2, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='veth1\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) shutdown(r3, 0x1) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000000c0)='veth1\x00', 0x10) shutdown(r4, 0x1) shutdown(r4, 0x1) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r4, 0x8982, &(0x7f0000000240)={0x0, 'batadv0\x00', {0x2}, 0x8}) shutdown(r4, 0x0) fcntl$setpipe(r3, 0x407, 0x0) r5 = openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000002480), 0x4) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[]}}, 0x40001) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f00000004c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="083c1fe90000f05a396ed3bd18c9492a0c091a1e9a2f372094e79bdce9e68e9b0be2ea0506424d2ba1eb296e5c42bd5192d7776d938ae4bf20eac92fe4f990131072da3abd12fd2840d86ff90437e06a348a355c1b769d8f64f7eaa0dc4f02322de5c448080000007c5f643815212c82bfaa990d694a08f9f1a9a989dba1e83278d4fa0d063d8c25fbc3a75c7939b5cf2abed486f11ca99af422be3dd5bc00000000000000", @ANYRES16=r2, @ANYBLOB="04002dbd7000fbdb27d0189dbcedb2ec3fca26df250100000020ea"], 0x3}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) mmap(&(0x7f000015b000/0x3000)=nil, 0x3000, 0x200000e, 0x10, 0xffffffffffffffff, 0x9004b000) mkdir(&(0x7f0000000100)='./file0\x00', 0x59) r7 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r7, 0x48, 0x10, 0x7fff) openat$nvram(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nvram\x00', 0x187000, 0x0) openat$cgroup_ro(r6, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400801) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x420000, 0x0) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000540)) r8 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000180)=0xe8) setuid(r9) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) socket$can_bcm(0x1d, 0x2, 0x2) r11 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r11, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r11, 0x8933, &(0x7f0000000940)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000940)={'vxcan1\x00'}) socket$can_bcm(0x1d, 0x2, 0x2) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000a00)=ANY=[@ANYPTR64, @ANYRESHEX=r10, @ANYRES16=0x0, @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69649dc0330d3774e2041157fa2ca3b63d5241435aed6d957f3dfb948488f4c036a4141d29e1ae38ed7a036bf9580900d6673abc98add29648afeea85abd27237660163962585fd6f0e9c30b9791e588a5e7f0e647a23f3af97c09b3efb7f318b33e460984d8af5f3ea4b1f6614d344c98f9a4c1b2a44f9aef59e3afba10b8bcc89814182c0448d6406cdb70c93e92dd90398f451a7288d7dc1b085605090e9edd496afe70db3d269d6ac60931ae0ff2707500fab96f690066ca2875d39f9bc115dd985e04d564b19723b67e47", @ANYRESDEC, @ANYBLOB="7c2e3d90fc9269a0aa58e61f0d1d780f2b00ef13eaa9aa60e7bad635a8073e7310902a18aa9c0f528cbc9b909fba4cc94a14818a8261b247b763d0b635b85784ab81616200044558392f4c39306f5ef00f79995077c19cad09b7c718f320d7f55f0db3f9b79a10ac8959e9a5d88ea0344da122729e1b08dccb0f29af15245a985dbc6154a3"]) r12 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="00643de8762f72573d89bcfbe10de5ed35dd405cbf3336615af644641329bf6da8821bb90f25b15a5df60e2487f4c4cd4d5a0f2f97d5696b", @ANYRESHEX=r12, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 1270.125135] serio: Serial port pts5 07:35:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0xa0200, 0x0) setsockopt$PNPIPE_ENCAP(r3, 0x113, 0x1, &(0x7f0000000300)=0x1, 0x4) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0xa3) fchdir(r5) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="000200000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380008002400070500000040077b4242f881d88f", @ANYRES32=r6, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) r7 = epoll_create(0x6) r8 = userfaultfd(0x0) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r8, &(0x7f0000000000)) epoll_wait(r7, &(0x7f0000000000)=[{}], 0x1, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@deltclass={0x48, 0x29, 0x10, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r6, {0xc, 0xa}, {0xb, 0xffe0}, {0xc, 0x10}}, [@TCA_RATE={0x6, 0x5, {0x6, 0x1}}, @tclass_kind_options=@c_tbf={0x0, 0x1, 'tbf\x00'}, @TCA_RATE={0x6, 0x5, {0x2, 0x20}}, @tclass_kind_options=@c_cake={0x9, 0x1, 'cake\x00'}]}, 0x48}}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = add_key(&(0x7f0000000000)='blacklist\x00', 0x0, 0x0, 0x0, 0x0) r11 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="0c417e6ce7838595cfa349d6fb4f77c6ca7f78aa5505ade07fee577d8bf3eb2f198a7c6868e0601454944d10e0a4baf162ca81a9182b2e35019cbd87f35e384db4a2595b88ecf168b9259d077bed41c092a0d772b65a832606bc03b9e8b9", 0x5e, 0xfffffffffffffff8) r12 = add_key(&(0x7f00000006c0)='ceph\x00', &(0x7f0000000700)={'syz', 0x2}, &(0x7f0000000740)="454daa21a4b5f6de00fbf3c6b0574c5289e3511c0ef9ec1b6843e15af74c60c7592446bfca8dbe4556ba2d3d67abbe33c60faf6f9cc6e3e146466ad6", 0x3c, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000780)={r10, r11, r12}, 0x0, 0x0, &(0x7f0000000a00)={&(0x7f00000008c0)={'sha3-224-ce\x00'}, &(0x7f0000000900)}) keyctl$set_timeout(0xf, r10, 0x9fe) getsockname$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3000000011000700ee00"/20, @ANYRES32=r13, @ANYBLOB="00000000000000000000f1ff0c0001d8510870d00acfa5779754007533320007000000d0455083cf"], 0x30}}, 0x0) [ 1270.236751] serio: Serial port pts5 07:35:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000100)='\\vmnet0?\'`@{,vmnet1em0user\x00', 0x0) socket(0x0, 0x80000, 0x8) ioctl$SIOCRSGL2CALL(0xffffffffffffffff, 0x89e5, 0x0) ftruncate(r1, 0x1000000) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r2) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000000)=0x8, 0x4) write$binfmt_elf32(r2, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x8d, 0x3, 0x1, 0xff, 0x7, 0x3, 0x0, 0x6, 0x12d, 0x38, 0x1d4, 0x9, 0x5, 0x20, 0x1, 0xe2ad, 0x6371, 0x8c5}, [{0x70000000, 0xffff, 0x71c08fcc, 0x7ff, 0x0, 0x1, 0x5, 0x1}, {0x1, 0xcc, 0x3ff, 0x9, 0x8001, 0x1e4954e4, 0x9}], "c223148fcb010f08138fd607bb916821508da58b3369a45c392852baebcb930428937f36a0abd14ef611cfa0214781cf83f7d3772e156ffe7b86aec86dad972cfa283040c3cdebaae0a753d396d9e562bc019ed31d1e9993b95bc130949bfdff3d49a67b3abf1eb88e8ba23c22bbecd85bb495fee504adc0a9a36ffef74a3379a36551b3d70e58f259eac42f2384df26a7ab1d7e2299b874aeed5a38acbcf2e179ed0a595a077233a95d6dc10b391b85b8299296f9400ad6f898fee837416435c146c19f150befe7ad4201d404907708f42ee5caa595a544bd997f5abb34", [[], [], []]}, 0x456) sendfile(r0, r1, &(0x7f00000000c0)=0x7, 0xeefffdf0) [ 1270.394697] kauditd_printk_skb: 1 callbacks suppressed [ 1270.394706] audit: type=1804 audit(1583220903.639:11548): pid=13193 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir375459426/syzkaller.oq4UMx/1010/file0/file0" dev="sda1" ino=16856 res=1 [ 1270.472539] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1270.481368] could not allocate digest TFM handle sha3-224-ce [ 1270.555666] audit: type=1800 audit(1583220903.639:11549): pid=13193 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed" comm="syz-executor.2" name="file0" dev="sda1" ino=16856 res=0 [ 1270.585413] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1270.601819] could not allocate digest TFM handle sha3-224-ce [ 1270.665364] audit: type=1804 audit(1583220903.679:11550): pid=13194 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir375459426/syzkaller.oq4UMx/1010/file0/file0" dev="sda1" ino=16856 res=1 07:35:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) write$binfmt_elf64(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0xca, 0x4, 0x0, 0x2, 0x2, 0x3e, 0x7, 0x19e, 0x40, 0x11, 0x40, 0x5, 0x38, 0x1, 0x2, 0x5, 0x200}, [{0x2, 0x101, 0xf5c, 0x877e, 0x7f, 0x3, 0x2727, 0x8001}], "47036cf95a075aa7ca623fffe1f038c432db72b2906af3aa2d036a394ff076d7ce2e6cd707179f7d0f027539342cd52b9f5c60abeb7e08245a697c39d7cd801e281210656cb6fe267dc589cb7fb3cfd3eca86ff16c1595e2a545bb47fd8699e414fcbff471428bf82aaa0a1a3daecfeb947df5ad091d", [[], [], [], [], [], [], [], []]}, 0x8ee) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x100020000) 07:35:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:35:04 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffb2, 0x4cb, 0x0, 0x1f]}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00'], 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r3, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x9, 0x1d6200) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1270.743482] audit: type=1804 audit(1583220903.989:11551): pid=13202 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir375459426/syzkaller.oq4UMx/1010/file0/file0" dev="sda1" ino=16856 res=1 07:35:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) mount$overlay(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x28040, &(0x7f0000000200)=ANY=[@ANYBLOB='xino=off,default_permissions,upperdir=./file0,xino=auto,default_permissions,lowerdir=./file0,rootcontext=staff_u,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c1a29c675", @ANYRESDEC=r1, @ANYBLOB="ac00"]) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_int(r2, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r3, r3, 0x0, 0x100020000) 07:35:04 executing program 5: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffe58) write$P9_RXATTRCREATE(r0, &(0x7f0000000000)={0x7, 0x21, 0x1}, 0x7) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x6008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) ptrace$setsig(0x4203, r4, 0x6, &(0x7f0000000100)={0x2, 0xffff, 0x9}) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xf17) connect$l2tp6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x8, @mcast2}, 0x20) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) 07:35:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:35:04 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000000)={0x1f, @fixed={[], 0x12}}, 0x8) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x1, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) getresuid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)=0x0) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r6) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r7, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r7, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r7, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r7, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r7, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) setsockopt$inet_tcp_int(r7, 0x6, 0x19, &(0x7f00000000c0), 0x4) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@local, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@empty}}, &(0x7f00000002c0)=0xe8) stat(&(0x7f00000004c0)='./bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r9, 0x0) stat(&(0x7f00000004c0)='./bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r10, 0x0) stat(&(0x7f00000004c0)='./bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r11, 0x0) stat(&(0x7f00000004c0)='./bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r12, 0x0) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r13, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) fstat(r13, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) getresgid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)=0x0) stat(&(0x7f00000004c0)='./bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r17, 0x0) fsetxattr$system_posix_acl(r1, &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="02000000010004000000000002000000", @ANYRES32=r3, @ANYBLOB="02000e00", @ANYRES32=r4, @ANYBLOB="02000600", @ANYRES32=r6, @ANYBLOB="02000500", @ANYRES32=r8, @ANYBLOB="040007000000008d06000000", @ANYRES32=r9, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r10, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=r11, @ANYBLOB="08000200", @ANYRES32=r12, @ANYBLOB="08000100", @ANYRES32=r14, @ANYBLOB="08000100", @ANYRES32=r15, @ANYBLOB="08000400", @ANYRES32=r16, @ANYBLOB="08000400", @ANYRES32=r17, @ANYBLOB="10000100000000002000040000000000"], 0x8c, 0x2) r18 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r18, 0x8983, &(0x7f0000000040)={0x2, 'ip6gretap0\x00', {0x400}, 0xffff}) 07:35:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0xde) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:35:04 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000000)={0x1f, @none}, 0x8) 07:35:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x40}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000080)) 07:35:05 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x84800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x200}, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x400080, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f000000c000/0x3000)=nil, 0x3000, 0x0, 0x31, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000001c0)={'vlan0\x00', {0x2, 0x0, @empty}}) sendmmsg(r1, &(0x7f0000001940)=[{{0x0, 0x0, &(0x7f0000000340)}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20004bc0) perf_event_open(0x0, 0xffffffffffffffff, 0x4, r0, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x8018, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) r3 = open(0x0, 0x400800, 0x8) mknodat(r3, 0x0, 0x1000, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000280)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000100)='net/ip_vs\x00') preadv(r5, &(0x7f00000017c0), 0x315, 0x3000000) syz_genetlink_get_family_id$team(0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2000802c}, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/dev\x00') socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r6 = dup(0xffffffffffffffff) getpeername$packet(r6, 0x0, &(0x7f0000000040)) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000140)={0x0, 0x11000000, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3000000010000108000000000000000000000000b029b174ae19c40ab5c42c5d1663dfaab0f931ae613a358267b267bc7f850480caf9cd41092db86d2e8cf4ef9c1c35ba019be91954e649e31619bc6cdbadd4b4582eb68d17a75a", @ANYRES32=0x0, @ANYBLOB="000000000000000008000400", @ANYRES32=r9, @ANYBLOB="08001b0000000000"], 0x30}}, 0x0) 07:35:05 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000080)={0x1ff, 0x2, 0x4, 0x10, 0x5, {0x77359400}, {0x2, 0x2, 0x3f, 0xb2, 0x2, 0x5, "d4908a3f"}, 0x20, 0x4, @offset=0xfff, 0xac9, 0x0, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000a}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r2, 0x0, 0x70bd27, 0x25dfdbfe, {{}, {}, {0x14, 0x18, {0x8f, @bearer=@udp='udp:syz0\x00'}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x4040800}, 0x20008804) connect$bt_sco(r0, &(0x7f0000000040), 0x8) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) 07:35:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffe58) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffe58) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x25}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000140)={r2, 0x20, 0x4}, 0x8) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="0100000077250759ffff045a06f4ea1bb978fb59bf7f", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000040)={r6}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000180)={r6, 0xfffffffc}, &(0x7f0000000200)=0x8) sendfile(r4, r4, 0x0, 0x100020000) 07:35:05 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x7fff) recvfrom$rose(r0, &(0x7f00000002c0)=""/224, 0xe0, 0x1, &(0x7f0000000000)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @default}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r4) mmap$binder(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x1, 0x11, r4, 0xc99) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3b72, 0x0, 0x0, 0x0, 0x0) 07:35:05 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, &(0x7f0000000000), 0x4) connect$bt_sco(r0, &(0x7f0000000040), 0x8) [ 1272.559731] audit: type=1804 audit(1583220905.799:11552): pid=13286 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir757629939/syzkaller.rieSjx/1175/file0" dev="sda1" ino=17458 res=1 07:35:05 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000040)={0x1f, @fixed={[], 0x11}}, 0x8) [ 1272.607765] REISERFS warning (device loop4): sh-2006 read_super_block: bread failed (dev loop4, block 16, size 4096) [ 1272.646668] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 07:35:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/ip_vs_stats\x00') mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) unshare(0x20000) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x400, 0x0) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) sendfile(r3, r2, 0x0, 0x800000080004103) creat(&(0x7f0000000040)='./file0\x00', 0x0) [ 1272.648581] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 07:35:06 executing program 0: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x7fff) connect$bt_sco(r0, &(0x7f0000000040), 0x8) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x7fff) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000000)=0x10, 0x1) 07:35:06 executing program 3: socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000080)) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="0040000000000000140012800b0001006d61637365630000040002800a000500140000000000000008000a00", @ANYRES32=r3, @ANYBLOB="1f3c67ba34bfcda88e9d521eced16bc23d2ede3f482ea829db06a95e8be5b9469f2a28fa879fe02afa388619e3ec2b85d613bf2f2e32ff47a4621cb254231cc4595d7171d2715a93d7b645b2046c29b8e9107ab200100000e0b277414c8bd88bf175771b2c0910935a59a7aa9a278f8417c69ae2bb3dd257f2b2d4a4586e9c21bde16a7e0dd0ab20417253e172d2b017cba0e89ec62271041bf9098293cc0798a5c56c389040bbf80fd9f7c702ecdc7901cfa3ddff0dd13400"/194], 0x48}, 0x1, 0x0, 0x0, 0xc0}, 0x0) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x7fff) r6 = openat$cgroup_ro(r5, &(0x7f00000000c0)='cgroup.stat\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(r6, 0x80247008, &(0x7f0000000100)) [ 1272.792516] audit: type=1804 audit(1583220906.039:11553): pid=13307 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir757629939/syzkaller.rieSjx/1175/file0" dev="sda1" ino=17458 res=1 07:35:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/ip_vs_stats\x00') mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) unshare(0x20000) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x400, 0x0) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) sendfile(r3, r2, 0x0, 0x800000080004103) creat(&(0x7f0000000040)='./file0\x00', 0x0) 07:35:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000580)="f509461ee86cb935b1f7e6ea67a02c532f3986d0a43cf2cd6f7a0df63b4da8d7dab70d20dee7941eb52200f0858efe1db881c994f477b0879a4986d8981a89dbd0df939599bba919869c4f2f34894c3f8693e1e1b95866cb7c1944fb48eca1337f101f3a58e259293d4f1385ef3cae90d05df4f3e7fd2812181eee0c1883c5bb688cefc657d1d13ca3f5568193389a986d5525ebe54e3c649595f28b380aa9a2f8fc18d58f81fc93e315bc830c7f56311bcf", 0xb2, 0xfffffffffffffffb) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x80002, 0x0) close(r2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'batadv0\x00'}) sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="200000000000fbdbdf25120000000a000900000000000000000005002d0000000000080039002808f700"], 0x30}, 0x1, 0x0, 0x0, 0x4000080}, 0x4000000) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6", 0x6) r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="340100001000010800"/20, @ANYRES32=0x0, @ANYBLOB="200000000000000008000400", @ANYRES32=r7, @ANYBLOB="1400030076657468315f746f5f62726964676500050021000300000024002b8008000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="080003000000000008000100", @ANYRES32, @ANYBLOB="08001b0003000000240024006512da13406fe15c29f5d228c5792f40ff6af4c62ffe60880a2390cdc33e80ff1400030076657468315f6d6163767461700000007c003480140035007465616d5f736c6176655f31000000001400350076747468315f746f5f68737200000000140035007663616e3000000000000000000000001400350076657468305f766972745f77696669001400350073697430000000000000000000000000140035007767320000000000000000000000000008002e00080000000500100084000000"], 0x134}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'vlan0\x00', r7}) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r3, r0}, &(0x7f00000000c0)=""/83, 0xffffffffffffffc9, 0x0) 07:35:06 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(0xffffffffffffffff, &(0x7f0000000040)={0x1f, @none}, 0x8) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000000)) 07:35:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/ip_vs_stats\x00') mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) unshare(0x20000) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x400, 0x0) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) sendfile(r3, r2, 0x0, 0x800000080004103) creat(&(0x7f0000000040)='./file0\x00', 0x0) [ 1273.156345] A link change request failed with some changes committed already. Interface veth1_macvtap may have been left with an inconsistent configuration, please check. 07:35:06 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='veth1_to_bridge\x00', 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x3) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) [ 1273.302129] A link change request failed with some changes committed already. Interface veth1_macvtap may have been left with an inconsistent configuration, please check. 07:35:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:35:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/ip_vs_stats\x00') mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) unshare(0x20000) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x400, 0x0) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) sendfile(r3, r2, 0x0, 0x800000080004103) creat(&(0x7f0000000040)='./file0\x00', 0x0) 07:35:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') sendfile(r1, r2, 0x0, 0x1000007ffff000) r3 = socket$pppl2tp(0x18, 0x1, 0x1) sendmsg$sock(r3, &(0x7f0000000340)={&(0x7f00000001c0)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x80, &(0x7f0000000140)}, 0x8040) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002d80)={@multicast2, @local}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r5, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r7, 0x407, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000180)='./file0\x00', 0x0, 0x10}, 0x10) write(r7, &(0x7f0000000340), 0x41395527) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x12, &(0x7f0000000140), 0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000640)='./bus\x00', &(0x7f0000000440)) stat(0x0, &(0x7f00000005c0)) setresgid(0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='map_files\x00') getdents64(r8, &(0x7f0000002080)=""/4082, 0xff2) getdents64(r8, 0x0, 0x0) r9 = dup2(r7, r8) setsockopt$inet_group_source_req(r9, 0x0, 0x2e, &(0x7f0000000680)={0xd2e, {{0x2, 0x4e21}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x25}}}}, 0x108) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r10, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f7570a2a2643d6e911e5f693729becd1b3f0c97362b364b94a1c691a5c249fb64774fe7751c5a54b2de", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 07:35:06 executing program 3: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x20100, 0x0) ioctl$SOUND_MIXER_READ_DEVMASK(r1, 0x80044dfe, &(0x7f0000000080)) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3e) ptrace$cont(0x18, r2, 0x91, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xd, 0xfa}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r4) ioctl$VT_GETMODE(r4, 0x5601, &(0x7f0000000000)) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:35:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$l2tp6(0xa, 0x2, 0x73) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffe58) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f0000000940)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c1030000030000007003000000000000000000000000000000000000b8010000a0020000a0020000a0020000a0020000a002000003000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cd0000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000005001b80100000000000000000000000000000000000000000000000050006d756c7469706f72740000000000000000000000000000000000000000010400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005800686173686c696d69740000000000000000000000000000000000000000016261746164765f736c6176655f30000000000000000000000000000000000000000000000000000000000000000000000000000000000000680043540000000000000000000000000000000000000000000000000000000100000000000000000000000073797a3000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800e80000000000000000000000000000000000000000000000000040005443504f505453545249500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000000009b737104dc3d872a558a14ad66ca75d01b01b7b6f1a7720c11cdd2f8c4710e26cd1e6266db6bfaf794d"], 0x3d0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) ioctl$sock_SIOCGPGRP(r8, 0x8904, &(0x7f0000000740)=0x0) lstat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000004c0)='./bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r11, 0x0) sendmsg$unix(r4, &(0x7f0000000900)={&(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000006c0)=[{&(0x7f00000001c0)="25db482bce116cf8e9a6435824fd84ee0bdc54cd8cf5b57493c8c77c5bc5ac06e94539bb5748b8129077f5a67532f1aa1f8ffd17be6d7e3fb3", 0x39}, {&(0x7f0000000200)="1bfcfaf6b1dac1cc166d214aa607d6cad2fb731d147cde5b9bd847563254c68a88e158528ff3ff0d68", 0x29}, {&(0x7f0000000240)="c6148df7e90ffec7f174f85f2948fa00fa7e9a606f4ce788540159f18cfd58deb9bf432f1256755ecd7022d92bce332789ed77d1c9ace2e2dd42cae43ce51a41f9b718f1c0bbf3555044260fe12704b29173cf860533b9aa33fb1b12c8e80077edebe42642801788518dbd35367b652cbc9e0cc417fdb60345f9cd4d86995e6d3d6b38dc18cf49ef16135593884d2e92292def5ba946a560a2d1427f9b0ea38c970fd13520f557d7b194686a9ea479ea11c81f83d34c156e57c1908271a9ee0b838c49ce493b5077819c7393bbdc9af007380abb7faf8c3feec04e56507c0182cb", 0xe1}, {&(0x7f0000000340)="a783d776899a9254645272e83473365b5b9ab43cbebda78c4c4afde92950f95692ffb59dcd5092e5e67c13ae24363f71ae92ed156d4ca48626ee354bfa05d7c08dfabf8e86d50f4bee8c13b5c904fc51e597efd79e15b8d7a9adef696c24ceb8490bd36697fdc9ef30970a293b53cd1b6388f01913e332a5bda8049150d57fd1ca9d95190ffafde18ae703baf9c8bbcadde6dd496bd9482a37b6faac8b94bb99108ab54ae2693e3b3eb9", 0xaa}, {&(0x7f0000000400)="053f149b114b5106eb4aefb0849236c73e710c0287a577a6e1de30a64116d2d42f115918344bfaedac8f6f5ad34d5fb8ce60cb7d05920e08b60528ba66bf10bcd6b0e0ee5b901ead17b3e78817ff2eae446ddc1fc417ca8bb0d3b2f68c013686ce7d1f420fbcfc51d2c56065d14a5c8f77cb5b59df88bf19128a338102bf91b2f0cd551c3f059ee3060cea2e9f8fa42519ddb4a39f3c0ca56b6363f4a42de9b3452ff2bd88f0706948a125b810d7b9bc9fcfcf4d58b504537d7054b0f10421be33af569aa15e625a970a31089d78d03dc94bb72a614fe28d0c435bedb8a9fe10ea36ee1eb226e91b69eb8adfe2c5bc793cf7ce205345aaba8db273f86bdd83", 0xff}, {&(0x7f0000000500)="8445f36c938dad4d7a2158fa458a18f7ffd08e669b952dfb2b16b53624aa97c57640bb32d873c2f3a718a6b904bdb85654da2fbc9c88abe2c5ebbfff09fec59378c83308d707d5048cc219d4fc7cf5b2c9b0374ba63203aa3b34b6a9285c9da01623c424ba", 0x65}, {&(0x7f0000000580)="6ec09a18994557049e159ae66e91b93d6404dfbc5b24aefb9fa86f4de081aa94fcdc700d431efcbe16906cb6873b56", 0x2f}, {&(0x7f00000005c0)="c89096dc2fd55c632fdf2bcdf3c2b4dff627f86badefd77694fe7a0bfb9c06772bf80b2cf2fb2a69029573c1fb0abd9faedb2d72b88a41564f3f2bb3ed7df1ae1c4b9d077c3bf9491877bd2e3292694a2304a404e7abc4e9dd40adbf2ab4da17f2978fc1758edc66102ae4bf73655c21e8d54aa868bbaf90195a0491569d7e112b81369857335a87c0a8797fc7d3b8d41b4686f929689014d5d542d271a37e8e1c60b2cc7982333bb7792775d1d5197ce56c8a9eb95ea3027e7eea40451042460eecd302bb09", 0xc6}], 0x8, &(0x7f0000000880)=[@rights={{0x30, 0x1, 0x1, [r1, r5, r2, r6, r7, r0, 0xffffffffffffffff, r0]}}, @cred={{0x1c, 0x1, 0x2, {r9, r10, r11}}}, @rights={{0x10}}], 0x60}, 0x1) r12 = socket$rds(0x15, 0x5, 0x0) bind$rds(r12, &(0x7f0000000840)={0x2, 0x0, @remote}, 0x10) dup2(r3, r12) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r13 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r13) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_LOG_FD(r13, 0x4004af07, &(0x7f0000000080)=r14) r15 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r15) connect$bt_sco(r15, &(0x7f0000000000)={0x1f, @fixed={[], 0x12}}, 0x8) 07:35:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/ip_vs_stats\x00') mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) unshare(0x20000) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x400, 0x0) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) sendfile(r3, r2, 0x0, 0x800000080004103) 07:35:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x40) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, &(0x7f0000000140)=0x1c, 0x800) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000180), &(0x7f0000000200)=0x4) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x1d6b8c4fca3e6776, 0x3) r2 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) sendfile(r2, r4, 0x0, 0x104020000) open$dir(&(0x7f0000000080)='./file0\x00', 0x240000, 0x20) 07:35:07 executing program 3: ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) readv(r1, &(0x7f0000000600)=[{&(0x7f0000000100)=""/83, 0x53}, {&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/246, 0xf6}, {&(0x7f0000000200)=""/94, 0x5e}, {&(0x7f0000000500)=""/241, 0xf1}, {&(0x7f0000000700)=""/238, 0xee}], 0x6) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_create1(0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280)='/dev/media#\x00', 0x0, 0x777770c5fbbf9de8) getpid() sched_setscheduler(0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffe58) ioctl$VIDIOC_QBUF(r4, 0xc058560f, &(0x7f0000000000)={0x800, 0x6, 0x4, 0x10000, 0x3, {}, {0x2, 0x2, 0x5, 0x1, 0x8, 0x3f, "ea49c0c4"}, 0x1, 0x3, @fd, 0x6, 0x0, r3}) syz_kvm_setup_cpu$x86(r2, r5, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x20, 0x0, 0x0) openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x5e, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) umount2(&(0x7f0000000300)='./file0\x00', 0xb8eb6cddad06f074) 07:35:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') sendfile(r1, r2, 0x0, 0x1000007ffff000) r3 = socket$pppl2tp(0x18, 0x1, 0x1) sendmsg$sock(r3, &(0x7f0000000340)={&(0x7f00000001c0)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x80, &(0x7f0000000140)}, 0x8040) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002d80)={@multicast2, @local}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r5, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r7, 0x407, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000180)='./file0\x00', 0x0, 0x10}, 0x10) write(r7, &(0x7f0000000340), 0x41395527) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x12, &(0x7f0000000140), 0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000640)='./bus\x00', &(0x7f0000000440)) stat(0x0, &(0x7f00000005c0)) setresgid(0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='map_files\x00') getdents64(r8, &(0x7f0000002080)=""/4082, 0xff2) getdents64(r8, 0x0, 0x0) r9 = dup2(r7, r8) setsockopt$inet_group_source_req(r9, 0x0, 0x2e, &(0x7f0000000680)={0xd2e, {{0x2, 0x4e21}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x25}}}}, 0x108) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r10, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f7570a2a2643d6e911e5f693729becd1b3f0c97362b364b94a1c691a5c249fb64774fe7751c5a54b2de", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 1273.834050] RDS: rds_bind could not find a transport for 172.20.20.187, load rds_tcp or rds_rdma? 07:35:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/ip_vs_stats\x00') mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) unshare(0x20000) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x400, 0x0) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) 07:35:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:35:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/ip_vs_stats\x00') mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) unshare(0x20000) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x400, 0x0) 07:35:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x14000, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f00000000c0)={0x3, 0x1, 0x2, 0x4, 0x7, "fa03ed8c3331d78f45c639b24475427cc51b04"}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x100020000) 07:35:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') sendfile(r1, r2, 0x0, 0x1000007ffff000) r3 = socket$pppl2tp(0x18, 0x1, 0x1) sendmsg$sock(r3, &(0x7f0000000340)={&(0x7f00000001c0)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x80, &(0x7f0000000140)}, 0x8040) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002d80)={@multicast2, @local}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r5, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r7, 0x407, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000180)='./file0\x00', 0x0, 0x10}, 0x10) write(r7, &(0x7f0000000340), 0x41395527) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x12, &(0x7f0000000140), 0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000640)='./bus\x00', &(0x7f0000000440)) stat(0x0, &(0x7f00000005c0)) setresgid(0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='map_files\x00') getdents64(r8, &(0x7f0000002080)=""/4082, 0xff2) getdents64(r8, 0x0, 0x0) r9 = dup2(r7, r8) setsockopt$inet_group_source_req(r9, 0x0, 0x2e, &(0x7f0000000680)={0xd2e, {{0x2, 0x4e21}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x25}}}}, 0x108) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r10, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f7570a2a2643d6e911e5f693729becd1b3f0c97362b364b94a1c691a5c249fb64774fe7751c5a54b2de", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 07:35:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/ip_vs_stats\x00') mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) unshare(0x20000) [ 1274.497695] RDS: rds_bind could not find a transport for 172.20.20.187, load rds_tcp or rds_rdma? [ 1274.562510] audit: type=1804 audit(1583220907.809:11554): pid=13374 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir877835599/syzkaller.pzADnu/1378/file0" dev="sda1" ino=17473 res=1 07:35:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x7fff) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x7fff) r4 = syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x24, r4, 0x0, 0x70bd28, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x3ff}}, [""]}, 0x24}}, 0x4000000) sendmsg$TIPC_CMD_SET_NODE_ADDR(r3, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r4, 0x100, 0x70bd2a, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x1c7c730}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4040004}, 0x404c804) sendmsg$NFNL_MSG_ACCT_DEL(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0xac, 0x3, 0x7, 0x101, 0x0, 0x0, {0x1, 0x0, 0x6}, [@NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x5}, @NFACCT_FILTER={0x34, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x100}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0xab}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x8}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x8}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x6}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x6}]}, @NFACCT_FILTER={0xc, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x7fff}]}, @NFACCT_FILTER={0x2c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x7f}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x800}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x9}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0xec8}]}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x6}, @NFACCT_FLAGS={0x8}]}, 0xac}, 0x1, 0x0, 0x0, 0x20000880}, 0xc5) [ 1274.688714] audit: type=1800 audit(1583220907.809:11555): pid=13374 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed" comm="syz-executor.0" name="file0" dev="sda1" ino=17473 res=0 07:35:08 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000040), 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) bind(0xffffffffffffffff, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e24, @loopback}, 0x3, 0x4, 0x4, 0x1}}, 0x80) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000080)=""/134) 07:35:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/ip_vs_stats\x00') mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) [ 1274.983823] audit: type=1804 audit(1583220907.809:11556): pid=13388 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir877835599/syzkaller.pzADnu/1378/file0" dev="sda1" ino=17473 res=1 07:35:08 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}, 0x48) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) sched_setscheduler(r1, 0x2, &(0x7f0000000140)=0x4) listen(r0, 0x0) unshare(0x40000000) r2 = accept(r0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x2000) write$binfmt_elf64(r2, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2a9, 0x0, 0xfff7, 0x38, 0x1, 0x0, 0x81}, [{0x60000000, 0x0, 0x0, 0x0, 0x0, 0x100000001}], "", [[], [], []]}, 0x378) getuid() r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r4, 0x6, 0x21, &(0x7f0000000180)="e0e9ca9d793d13e886d5238c63d5b2a9", 0x10) timerfd_create(0x0, 0x0) [ 1275.195511] audit: type=1800 audit(1583220907.809:11557): pid=13388 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed" comm="syz-executor.0" name="file0" dev="sda1" ino=17473 res=0 07:35:08 executing program 3: ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) readv(r1, &(0x7f0000000600)=[{&(0x7f0000000100)=""/83, 0x53}, {&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/246, 0xf6}, {&(0x7f0000000200)=""/94, 0x5e}, {&(0x7f0000000500)=""/241, 0xf1}, {&(0x7f0000000700)=""/238, 0xee}], 0x6) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_create1(0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280)='/dev/media#\x00', 0x0, 0x777770c5fbbf9de8) getpid() sched_setscheduler(0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffe58) ioctl$VIDIOC_QBUF(r4, 0xc058560f, &(0x7f0000000000)={0x800, 0x6, 0x4, 0x10000, 0x3, {}, {0x2, 0x2, 0x5, 0x1, 0x8, 0x3f, "ea49c0c4"}, 0x1, 0x3, @fd, 0x6, 0x0, r3}) syz_kvm_setup_cpu$x86(r2, r5, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x20, 0x0, 0x0) openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x5e, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) umount2(&(0x7f0000000300)='./file0\x00', 0xb8eb6cddad06f074) 07:35:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000340)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000db7a7ed00000000000000000000005a0400000100000001800000000000ff070000000000000008000000000000000100000001000000000000000000000000000000000000000000000000000000ff7f0000040000010000000000000000ffffffff0000000022de4c4300000000b80b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a974ae7f5d7459bcb187e100"/259]) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) socket$inet_udp(0x2, 0x2, 0x0) 07:35:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/ip_vs_stats\x00') mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 07:35:08 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000040), 0x8) ioctl$USBDEVFS_RESET(r0, 0x5514) 07:35:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/ip_vs_stats\x00') mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 1275.802491] IPVS: ftp: loaded support on port[0] = 21 07:35:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/ip_vs_stats\x00') mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 07:35:09 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000140)={0x1f, @fixed={[], 0x12}}, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x234c43) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r2, 0xc040564b, &(0x7f0000000100)={0x4, 0x0, 0x2016, 0x7ff, 0x8, {0x10000, 0x6ef}, 0x1}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r3}) sendmsg$AUDIT_SET_FEATURE(r4, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x20, 0x3fa, 0x0, 0x70bd2c, 0x25dfdbfc, {0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x40010) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0xc0406618, &(0x7f0000000000)={{0x6, 0x0, @descriptor="4b79122a365edb73"}}) 07:35:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/ip_vs_stats\x00') mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 07:35:09 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000000), 0x8) 07:35:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/ip_vs_stats\x00') mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 07:35:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) geteuid() r0 = open(&(0x7f0000000100)='./file0\x00', 0x402, 0x1da) r1 = semget$private(0x0, 0x2000000010a, 0x0) semop(r1, &(0x7f0000000200)=[{0x0, 0xfffffffffffefffc}], 0x1) semop(r1, &(0x7f0000000000)=[{0x2}, {0x0, 0xffffffff}], 0x2) semtimedop(r1, &(0x7f00000001c0)=[{0x0, 0x9}], 0x1, 0x0) semctl$IPC_INFO(r1, 0x0, 0x3, &(0x7f0000000080)=""/95) r2 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x8) 07:35:10 executing program 4: prlimit64(0x0, 0x6, &(0x7f0000000280)={0x5, 0x2000000000000080}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280), 0x2a7) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty, 0x20000}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r3 = syz_open_dev$sndtimer(&(0x7f00000012c0)='/dev/snd/timer\x00', 0x0, 0x179000) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r2, &(0x7f0000001300)={0xffffffffffffffff, r3}) fcntl$setpipe(r1, 0x407, 0x0) accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) r4 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r4) ioctl$RTC_WKALM_SET(r4, 0x4028700f, &(0x7f0000000000)={0x7d, 0x1, {0x7, 0x1f, 0x11, 0x12, 0x8, 0x3, 0x5, 0x11d, 0xffffffffffffffff}}) r5 = socket(0x10, 0x2, 0x0) sendto(r5, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) recvmmsg(r5, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r5, 0x0, 0x41, 0x0, 0x0) r6 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x7fff) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={&(0x7f0000001340)="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", &(0x7f00000000c0)=""/91, &(0x7f00000002c0)="e174e905cda51ea567271ee82f93c03e2127acc90d133717a785ee9b9de0cbe160f350d0a0b0004b1969c81015793e6ccee07293ba29871e5c9628ffc948e123d5094bdedaab9dd6cfdd1e1189ae2a70c1a37df97f2af6d6dde575f8ed5ff17c91127ce26dc3844a20d064430e8983f2db59ecf872acbf6d7ad8daab48890f25103c62e0", &(0x7f0000000380)="d02b80f6e622a839b45da1dbe1a872d941b01c2588bbd661dd3ddd3134321544366887672d650a7619291a56597deca8246d352b639939ff1a44346b76d6c109dac3d9ee518988dc6a681ddfabe68085e96c9927e500934002838a999981010db8c8f47e43211d1127b71140a01ca7c9e56d9340b05d2f3eb16393d15a1ed89c6ececb9e86", 0x5, r6}, 0x38) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x80082, 0x0) 07:35:10 executing program 3: ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) readv(r1, &(0x7f0000000600)=[{&(0x7f0000000100)=""/83, 0x53}, {&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/246, 0xf6}, {&(0x7f0000000200)=""/94, 0x5e}, {&(0x7f0000000500)=""/241, 0xf1}, {&(0x7f0000000700)=""/238, 0xee}], 0x6) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_create1(0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280)='/dev/media#\x00', 0x0, 0x777770c5fbbf9de8) getpid() sched_setscheduler(0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffe58) ioctl$VIDIOC_QBUF(r4, 0xc058560f, &(0x7f0000000000)={0x800, 0x6, 0x4, 0x10000, 0x3, {}, {0x2, 0x2, 0x5, 0x1, 0x8, 0x3f, "ea49c0c4"}, 0x1, 0x3, @fd, 0x6, 0x0, r3}) syz_kvm_setup_cpu$x86(r2, r5, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x20, 0x0, 0x0) openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x5e, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) umount2(&(0x7f0000000300)='./file0\x00', 0xb8eb6cddad06f074) 07:35:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/ip_vs_stats\x00') mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 07:35:10 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000040), 0x8) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x7, &(0x7f0000000000)=[{0x8, 0x5, 0x1f, 0x5}, {0x8001, 0x80, 0x40, 0xb55}, {0x1, 0x8, 0x9, 0x100}, {0x3, 0x2, 0x0, 0xfffffff8}, {0x1, 0x3f, 0x20, 0x7dd}, {0x3, 0xec, 0x3f, 0x6}, {0x1, 0x81, 0xff, 0x6}]}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'team_slave_0\x00', 0x1}) 07:35:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f0000000240)=0x25) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SIOCRSGCAUSE(r0, 0x89e0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x2, 0x202c02) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000200)=[@timestamp, @timestamp, @mss={0x2, 0x401}, @timestamp, @timestamp], 0x5) pipe2$9p(&(0x7f0000000180), 0x4000) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r3 = socket$bt_bnep(0x1f, 0x3, 0x4) sendfile(0xffffffffffffffff, r3, 0x0, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x7) 07:35:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x7fff) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffe58) r3 = openat$cgroup_int(r2, &(0x7f0000000300)='cgroup.max.descendants\x00', 0x2, 0x0) connect$bt_sco(r0, &(0x7f0000000340)={0x1f, @none}, 0x8) r4 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r4) bind$x25(r4, &(0x7f0000000140)={0x9, @remote={[], 0x3}}, 0x12) sendfile(r3, r3, 0x0, 0x100020000) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000000, 0x4, 0x10) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r0, 0x3) lgetxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)=""/43, 0x2b) r5 = accept$phonet_pipe(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000180)=0x10) write$cgroup_int(r3, &(0x7f0000000200)=0x6, 0x12) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r5, 0x8983, &(0x7f00000001c0)={0x7, 'wg1\x00', {0x4c2}, 0xffff}) [ 1277.219936] QAT: Invalid ioctl [ 1277.243580] QAT: Invalid ioctl 07:35:10 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:35:10 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_NEW_KEY(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa4, r2, 0x2, 0x70bd2c, 0x25dfdbff, {}, [@NL80211_ATTR_MAC={0xa, 0x6, @local}, @NL80211_ATTR_KEY_TYPE={0x8}, @NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY={0x30, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x2c, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}]}, @NL80211_ATTR_KEY={0x2c, 0x50, 0x0, 0x1, [@NL80211_KEY_DATA_WEP40={0x9, 0x1, "a97c50e9ad"}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "4ea6bbd5737d09581bb60630bc"}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac01}]}, @NL80211_ATTR_KEY={0x14, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x8, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_KEY_IDX={0x5}]}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x1}]}, 0xa4}, 0x1, 0x0, 0x0, 0x80}, 0x48d4) connect$bt_sco(r0, &(0x7f0000000040), 0x8) 07:35:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/ip_vs_stats\x00') mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 07:35:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x7fff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x321400, 0x0) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000240)) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="2c0000002d0002002bbd7000fbdbdf2500000000", @ANYRES32=r1, @ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x40) ioctl$SOUND_MIXER_READ_RECSRC(r2, 0x80044dff, &(0x7f00000002c0)) mount$fuse(0x20000000, &(0x7f0000000280)='\x00', 0x0, 0x7a00, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r4, r4, 0x0, 0x100020000) [ 1277.653754] kauditd_printk_skb: 2 callbacks suppressed [ 1277.653765] audit: type=1804 audit(1583220910.899:11560): pid=13553 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir757629939/syzkaller.rieSjx/1181/file0" dev="sda1" ino=17873 res=1 07:35:11 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000100)=0x40) writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="ae88bff8246200005a90f57f07703a00f0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000c659ffff0000960000000000000020200000000000000000bfbbb18016410f67f8ed2fbda6599591076756fcb9ff7daf0bdd7cfa3d4ade61ccb14424af8c63ab6fd1845b0c90c78bf80596550000000000000000", 0x58}], 0x2) 07:35:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x400, 0x4) 07:35:11 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x20) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000180)={0x298, 0x5, 0x0, 'queue1\x00', 0x1ff}) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r3) ioctl$KVM_IRQ_LINE(r3, 0x4008ae61, &(0x7f0000000040)={0x8, 0x2}) dup2(r0, r1) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000100)={{0xa5}, {}, 0x0, 0x2, 0x3}) 07:35:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6000000030007b090000000000000000000000004c000100480001000800010062090000380002800600030002000000180002000000000000000000000000000000000000000000140004006000000000000000060000000000000004000600"], 0x60}}, 0x0) 07:35:11 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x8) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffe58) sendmsg$SMC_PNETID_DEL(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x4000001}, 0x4010) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) ioctl$FS_IOC_SETVERSION(r4, 0x40087602, &(0x7f0000000240)=0x7) connect$bt_sco(r3, &(0x7f0000000040), 0x8) personality(0x0) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1', "a30a6d8562c18d0bb64c9df4682428320250aec71c82b95249fa27f7a3fbb4864780d541fb644b0f62d922aeffcd9a5dda3a827188b38c707ceeeace4a4aa9aa601cc4e74d19a243a2eab2dae233a4368a44c220b5e1b0f9040e6bec8e7744d1ebba5e5f31df4c047cd5b7dd3db1576151524ad57f5328df58d8f8a05beb9bbac9e082b04dbfc022dafc48ba576f4f4b9246b902e4ee79affebcb0ffa822a224f432f7aea1103b12183384bbcf722b4e7089e39c595975cb1df3d4d34ec7a0f13f6d"}, 0xc6) 07:35:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0xc000, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x7fff) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) sendmsg$NFQNL_MSG_VERDICT(r2, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x18c, 0x1, 0x3, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x2}, @NFQA_CT={0x10c, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0xa4, 0xe, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @remote}, {0x14, 0x4, @ipv4={[], [], @broadcast}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @remote}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}]}, @CTA_NAT_SRC={0x58, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @empty}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @empty}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x15}}]}, @CTA_HELP={0xc, 0x5, 0x0, 0x1, {0x8, 0x1, 'RAS\x00'}}]}, @NFQA_VLAN={0x3c, 0x13, 0x0, 0x1, [@NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0xfff7}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x4}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x4}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x88a8}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x7}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x80}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_VLAN={0x14, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x9a8}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}]}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffb, 0x5}}]}, 0x18c}, 0x1, 0x0, 0x0, 0x1}, 0x48800) r3 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r4, 0x4004556e, 0x12) sendfile(r3, r3, 0x0, 0x100020000) 07:35:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000140)={&(0x7f0000000080)=[0x3, 0xffff55a2, 0x7fffffff, 0x82, 0x8, 0x549], 0x6, 0x1, 0x1000, 0x19, 0x0, 0x4, 0x2, {0x10001, 0xf58e, 0x80, 0x200, 0x1, 0x9, 0x9, 0x3, 0x8001, 0x4, 0x4, 0xa2, 0x6cd91b8c, 0xfffffc68, "530c27da39e0650e057e4bb59e468339bb1b11e8123e4398784d21056ed9d084"}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x100020000) 07:35:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/ip_vs_stats\x00') mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 1278.437486] audit: type=1804 audit(1583220911.679:11561): pid=13590 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir187981469/syzkaller.nzJe39/27/file0" dev="sda1" ino=17756 res=1 [ 1278.548892] audit: type=1804 audit(1583220911.789:11562): pid=13590 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir187981469/syzkaller.nzJe39/27/file0" dev="sda1" ino=17756 res=1 07:35:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x7fff) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file1\x00', r1}, 0x10) r2 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x100020000) 07:35:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = accept4(r0, &(0x7f0000000080)=@l2={0x1f, 0x0, @none}, &(0x7f0000000140)=0x80, 0x800) bind$pptp(r1, &(0x7f0000000180)={0x18, 0x2, {0x2, @local}}, 0x1e) r2 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x7fff) ioctl$SIOCGETNODEID(r3, 0x89e1, &(0x7f0000000200)={0x1}) sendfile(r2, r2, 0x0, 0x100020000) 07:35:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') r0 = creat(0x0, 0x0) io_setup(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) open$dir(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) r3 = accept(0xffffffffffffffff, &(0x7f0000000140)=@nl=@unspec, &(0x7f0000000080)=0x80) r4 = creat(0x0, 0x0) r5 = fcntl$getown(r4, 0x9) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x120000000000000, 0x1}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xe2e6}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) fcntl$getownex(r6, 0x10, &(0x7f0000000200)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000240)={0x0, 0x0}) sendmsg$nl_route(r3, &(0x7f0000000500)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f00000002c0)=@RTM_NEWNSID={0x4c, 0x58, 0x400, 0x70bd26, 0x25dfdbfb, {}, [@NETNSA_PID={0x8, 0x2, r5}, @NETNSA_NSID={0x8, 0x1, 0x4}, @NETNSA_PID={0x8, 0x2, r7}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r8}, @NETNSA_FD={0x8, 0x3, r0}, @NETNSA_NSID={0x8, 0x1, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4040840}, 0x8008000) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000340)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75713fef00243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d270fbe0372fe2db1e3cc38cc67743c3d10074bd381bc7fdf0451d9346a184948f232b38cc789c58b8a6e10d7b86e04e3827325dff77e6042300002b64df69ed89269c38e2150b4016b2b42c044d58ea29e61f693710e4b4f7e4b654d11ea2cc816ec26e0405b7d617b08baf248fcc57d0c317cfadb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e775882c"], 0x8) setsockopt$inet6_int(r2, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r9 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) fdatasync(0xffffffffffffffff) ftruncate(r9, 0x7fff) sendfile(r2, r9, 0x0, 0x8000fffffffe) [ 1278.973013] audit: type=1804 audit(1583220912.219:11563): pid=13581 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir877835599/syzkaller.pzADnu/1385/file0" dev="sda1" ino=17908 res=1 [ 1279.047099] audit: type=1800 audit(1583220912.219:11564): pid=13581 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed" comm="syz-executor.0" name="file0" dev="sda1" ino=17908 res=0 07:35:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/ip_vs_stats\x00') clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 1279.158309] audit: type=1804 audit(1583220912.249:11565): pid=13606 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir877835599/syzkaller.pzADnu/1385/file0" dev="sda1" ino=17908 res=1 07:35:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/ip_vs_stats\x00') clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 1279.346106] audit: type=1804 audit(1583220912.569:11566): pid=13583 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir877835599/syzkaller.pzADnu/1385/file0" dev="sda1" ino=17908 res=1 07:35:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/ip_vs_stats\x00') clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 07:35:12 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000040), 0x8) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x66600, 0x0) 07:35:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 07:35:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 07:35:13 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000040), 0x8) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x8000, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000000c0)={0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000080)) 07:35:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x4101, 0x115) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x84) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffe58) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getresuid(&(0x7f00000002c0), &(0x7f0000000300)=0x0, &(0x7f0000000340)) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x7fff) ioctl$DRM_IOCTL_GET_CLIENT(r5, 0xc0286405, &(0x7f0000000380)={0x9, 0x6, {0xffffffffffffffff}, {0xee01}, 0x7, 0x2132c3ee}) newfstatat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1f23ef1a4b7248fe) r8 = getgid() stat(&(0x7f00000004c0)='./bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r9, 0x0) getresgid(&(0x7f0000000880)=0x0, &(0x7f00000008c0), &(0x7f0000000900)) fsetxattr$system_posix_acl(r1, &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000940)={{}, {0x1, 0x7}, [{0x2, 0x8, r4}, {0x2, 0x2, r6}, {0x2, 0x5, r7}], {}, [{0x8, 0x3, r8}, {0x8, 0x4, r9}, {0x8, 0x2, 0xffffffffffffffff}, {0x8, 0x2, r10}], {0x10, 0x7}, {0x20, 0x2}}, 0x5c, 0x1) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f00000000c0)={0xa30000, 0xffffffe1, 0x0, r3, 0x0, &(0x7f0000000080)={0x99096c, 0x1, [], @value=0x2}}) syz_kvm_setup_cpu$x86(r11, r0, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000180)=[@text64={0x40, &(0x7f0000000100)="66baf80cb82c73e68eef66bafc0ced0f32c42279330947c6c57566440f38ded2f241a466ba400066ed260f01ca2e0f01cb460fc731", 0x35}], 0x1, 0x0, &(0x7f0000000280), 0x0) sendfile(r1, r1, 0x0, 0x100020000) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @null, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) 07:35:13 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x4001, 0x0) accept4$x25(r0, &(0x7f0000000300)={0x9, @remote}, &(0x7f0000000340)=0x12, 0x80800) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f0000000080)={0x2, 0x0, 0x2, 0x8a0, 'syz0\x00', 0x200}) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r2, &(0x7f0000000040), 0x8) 07:35:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 07:35:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 07:35:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x23) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:35:13 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x400000, 0x0) sync_file_range(r0, 0x0, 0xfffffffffffffff7, 0x2) connect$bt_sco(r0, &(0x7f0000000040), 0x8) 07:35:13 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="340100001000010800"/20, @ANYRES32=0x0, @ANYBLOB="200000000000000008000400", @ANYRES32=r3, @ANYBLOB="1400030076657468315f746f5f62726964676500050021000300000024002b8008000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYRESOCT=r1, @ANYRES32, @ANYBLOB="08001b0003000000240024006512da13406fe15c29f5d228c5792f40ff6af4c62ffe60880a2390cdc33e80ff1400030076657468315f6d6163767461700000007c003480140035007465616d5f736c6176655f31000000001400350076747468315f746f5f68737200000000140035007663616e3000000000000000000000001400350076657468305f766972745f77696669001400350073697430000000000000000000000000140035007767320000000000000000000000000008002e00080000000500100084000000"], 0xb}, 0x1, 0x0, 0x0, 0x800}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f00000000c0)=@flushsa={0x70, 0x1c, 0x300, 0x70bd26, 0x25dfdbff, {0x32}, [@policy_type={0xa}, @policy_type={0xa}, @lastused={0xc, 0xf, 0x2f}, @offload={0xc, 0x1c, {r3, 0x1}}, @user_kmaddress={0x2c, 0x13, {@in=@local, @in=@initdev={0xac, 0x1e, 0x1f, 0x0}, 0x0, 0xa}}]}, 0x70}}, 0x0) 07:35:13 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 07:35:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) 07:35:13 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 07:35:13 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000040), 0x8) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) pwrite64(r0, &(0x7f00000000c0)="64f79088918d257eb69631e6ee60622854b7336d0e60b0fadfe42b266c99c7e9601d91159c75c31d7a0e1c9f364888eb2a717afd9294db600e77abd3132bee2cf550ebc278aa0b7cd0a2383e75f52e4204b61e2b0585ecb74a0adb16a462419a042e27b72804b9f10ccb3b1d165a97efa1d74c50a8f5626a67f10d7a7d5ef4ed6c431a3d8b75a80b5aeb0b", 0x8b, 0x6) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000080)) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) ioctl$TIOCNXCL(r2, 0x540d) 07:35:13 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x4800) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@iocharset={'iocharset', 0x3d, 'utf8'}}]}) read$char_usb(r1, &(0x7f00000000c0)=""/108, 0x6c) 07:35:14 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 1280.776234] FAT-fs (loop3): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! 07:35:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x7fff) ioctl$SCSI_IOCTL_GET_PCI(r2, 0x5387, &(0x7f0000000080)) readv(r2, &(0x7f00000004c0)=[{&(0x7f00000000c0)=""/59, 0x3b}, {&(0x7f0000000200)=""/224, 0xe0}, {&(0x7f0000000140)=""/98, 0x62}, {&(0x7f0000000300)=""/138, 0x8a}, {&(0x7f00000003c0)=""/199, 0xc7}], 0x5) [ 1280.860679] FAT-fs (loop3): bogus number of reserved sectors [ 1280.902599] FAT-fs (loop3): Can't find a valid FAT filesystem 07:35:14 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 07:35:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sendmsg$NLBL_MGMT_C_REMOVE(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYRES16, @ANYBLOB='U'], 0x2}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0xa000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffe58) sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x74, 0x8, 0x6, 0x201, 0x0, 0x0, {0x5, 0x0, 0xa}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x74}, 0x1, 0x0, 0x0, 0x4c001}, 0x4000001) 07:35:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) connect$l2tp6(r0, &(0x7f0000000080)={0xa, 0x0, 0x9, @remote, 0x9, 0x2}, 0x20) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x100020000) 07:35:14 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 07:35:14 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000040), 0x8) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) ioprio_get$pid(0x3, r2) ptrace$getregs(0xe, r1, 0xfd, &(0x7f0000000080)=""/180) 07:35:14 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 07:35:14 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000040), 0x8) 07:35:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 07:35:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 07:35:15 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffe58) write$P9_RFLUSH(r0, &(0x7f0000000080)={0x7, 0x6d, 0x2}, 0x7) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x8f200, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffe58) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="cfd626bd7000ffdbdf2504000000180007800c000300610200000000000008000200000200003c0003800800010006000000080003000300000008dfbe00030007000000080002000500000008000300ff00000008000100ffffff7f0800030020000000713a1d2253306b71090e5bed20a99bea11ec64a727d262a26c632933a96ae71c796ae34d6eef9e48d7df0b59b9b8cbaaaecd72c03eeb32103cbf0c"], 0x68}, 0x1, 0x0, 0x0, 0x40090}, 0x1) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r4, r4, 0x0, 0x100020000) r5 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/nvme-fabrics\x00', 0x40000, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r5, 0x84, 0x21, &(0x7f0000000300)=0x40, 0x4) r6 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x7fff) ioctl$TCSETAF(r6, 0x5408, &(0x7f0000000340)={0x1, 0x9, 0x1, 0x9b4, 0xa, "bb2068062b02d751"}) 07:35:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 07:35:15 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000040), 0x8) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x7fff) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f00000000c0), 0x4) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) accept4$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14, 0x80000) [ 1282.092755] audit: type=1804 audit(1583220915.339:11567): pid=13762 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir877835599/syzkaller.pzADnu/1393/file0" dev="sda1" ino=16903 res=1 07:35:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 07:35:15 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000080), 0x8) [ 1282.284491] audit: type=1804 audit(1583220915.339:11568): pid=13766 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir877835599/syzkaller.pzADnu/1393/file0" dev="sda1" ino=16903 res=1 07:35:15 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x3411c0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000080)=0x8b, 0xffffffffffffffcd) connect$bt_sco(r0, &(0x7f0000000040), 0x8) 07:35:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 07:35:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 07:35:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000000c0)={0x18, 0x0, {0x3, @link_local, 'vlan0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) pipe(0x0) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x0, &(0x7f00000002c0), 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000380), 0xfffffffffffffffd) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) fcntl$getown(r3, 0x9) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r5) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000100)={0x3f, 0x2b88, {0xffffffffffffffff}, {r5}, 0x6, 0x2}) r7 = syz_open_procfs(r6, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r9 = syz_open_procfs(0x0, &(0x7f0000000080)='loginuid\x00') sendfile(r8, r9, 0x0, 0x1) ioctl$RTC_PIE_OFF(r8, 0x7006) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) preadv(r7, &(0x7f00000017c0), 0x199, 0x0) 07:35:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 1282.934533] audit: type=1804 audit(1583220916.179:11569): pid=13759 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir740188080/syzkaller.K0OyUu/1473/file0" dev="sda1" ino=17919 res=1 07:35:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 1283.033962] Dropped {multi|broad}cast of type= [86dd] [ 1283.099337] audit: type=1804 audit(1583220916.179:11570): pid=13764 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir740188080/syzkaller.K0OyUu/1473/file0" dev="sda1" ino=17919 res=1 07:35:16 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x7fff) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') sendmsg$NL80211_CMD_SET_KEY(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="08002dbd7000fbdbdf258008dc5893ba0700514329368c0000000500080001000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x20000000) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f00000000c0), 0x4) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x4e24, @local}, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e22, @broadcast}, 0x1a0, 0x0, 0x0, 0x0, 0x560a, &(0x7f0000000000)='vlan1\x00', 0x1, 0x3, 0xee}) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r3, &(0x7f0000000040), 0x8) 07:35:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r2, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) setsockopt$inet_tcp_int(r2, 0x6, 0x19, &(0x7f00000000c0), 0x4) getsockopt$inet_tcp_int(r2, 0x6, 0x5, &(0x7f0000000080), &(0x7f00000000c0)=0x4) sendfile(r1, r1, 0x0, 0x100020000) 07:35:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 1283.265217] audit: type=1804 audit(1583220916.179:11571): pid=13768 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir740188080/syzkaller.K0OyUu/1473/file0" dev="sda1" ino=17919 res=1 07:35:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x221) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:35:16 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, r1, 0x0, 0x15, &(0x7f0000000000)='systemtrustedlowlan1\x00'}, 0x30) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000080)={[], 0x3, 0x7, 0x9, 0x0, 0x8, r10}) socket$nl_xfrm(0x10, 0x3, 0x6) r11 = getpid() sched_setattr(r11, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = fcntl$dupfd(r12, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000a40)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xfffffffc}, 0x10, 0x0, r13}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x111, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r11, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000240)='syz0\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r10, r6, 0x0, 0xa, &(0x7f0000000280)='mime_type\x00', r14}, 0x30) capset(&(0x7f0000000300)={0x20071026, r15}, &(0x7f0000000340)={0x4, 0x0, 0x7, 0x4, 0x80000001, 0x400}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) r16 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r16, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r17 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r17, 0x29, 0x40, &(0x7f00000003c0)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c1030000030000007003000000000000000000000000000000000000b8010000a0020000a0020000a0020000a0020000a0020000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ea000000000000000000000000000000000000000000000000000600000000000000000000005001b80100000000000000000000000000000000000000000000000050006d756c0200000072740000000000000000000000000000000000000000010400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005800686173686c696d69740000000000000000000000000000000000000000016261746164765f736c6176655f30000000000000000000000000000000000000000000000000000000000000000000000000000000000000680043540000000000000000000000000000000000000000000000000000000100000000000000000000000073797a3000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800e80000000000000000000000000000000000000000000000000040005443504f50545354524950000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00"/976], 0x3d0) r18 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r18, 0x29, 0x40, &(0x7f00000003c0)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c1030000030000007003000000000000000000000000000000000000b8010000a0020000a0020000a0020000a0020000a002000003000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000005001b80100000000000000000000000000000000000000000000000050006d756c7469706f72740000000000000000000000000000000000000000010400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005800686173686c696d69740000000000000000000000000000000000000000016261746164765f736c6176655f30000000000000000000000000000000000000000000000000000000000000000000000001000000000000680043540000000000000000000000000000000000000000000000000000000100000000000000000000000073797a3000000000000000000000000073797a300000000000000000000000000000000000000000000000ed000000000000000000000000000000000000008aef88d08e3bf50e4a597ac87c00000000000000000000000000000000000000000000000000000000000000000000000057c47f20d8224aa6d3de6c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001300000000000000000000000000000000000000000000a800e8000000000000000000000000000000000000000000000040005443504f5054535452495000000000000000b983e0df20202d4caed2d9fd0000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280000000000"], 0x3d0) r19 = fcntl$dupfd(r18, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r19, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r19, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@empty, @in=@dev}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) r20 = socket$netlink(0x10, 0x3, 0x0) r21 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r21, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r21, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r20, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000b80)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4001, @multicast1}]}}}, @IFLA_MASTER={0x8, 0xa, r22}]}, 0x40}}, 0x0) 07:35:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 07:35:16 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000000)={0x0, 'macvlan0\x00', {0x4}, 0x6}) connect$bt_sco(r0, &(0x7f0000000040), 0x8) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/nf_conntrack\x00') getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$KVM_CHECK_EXTENSION(r2, 0xae03, 0x6) 07:35:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 07:35:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 07:35:17 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffe58) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f00000000c0)={0x9d0000, 0x2, 0x3, r0, 0x0, &(0x7f0000000080)={0x9b0961, 0x6, [], @value=0x8}}) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffe58) ioctl$SIOCPNDELRESOURCE(r1, 0x89ef, &(0x7f0000000040)=0x1) connect$bt_sco(r2, &(0x7f0000000000), 0xf) 07:35:17 executing program 3: pipe(0x0) gettid() perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x30802}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80f6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4120, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x804, 0x0, 0x0, 0x5, 0x1, 0x0, 0x800}, 0x0, 0xfffffffffffeffff, 0xffffffffffffffff, 0x8) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000006, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r3 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r0, r3, 0x0, 0x8000fffffffe) keyctl$describe(0x6, 0x0, &(0x7f0000000140)=""/16, 0x10) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSPTLCK(r5, 0x40045431, &(0x7f0000000100)=0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffe4) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'veth1_to_batadv\x00'}) 07:35:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(0x0, 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 07:35:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(0x0, 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 07:35:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(0x0, 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 07:35:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 07:35:17 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c002000000000000600100000000000060010000280200002802020000280200000400"/85, @ANYPTR=&(0x7f0000000380)=ANY=[], @ANYBLOB="ac1414aaac14142900000000000000006970766c616e31000000000000000000726f7365300000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000007300030200000000a000c8000000000000000000000000000000000000000000300061646472747970650000000000000000000000000000000000000000000004000101000000000000000000000000280052454a454354000000000000000000000000000000000000000000000000000000000000000000000002e000000281751f28000000007465616d5f736c6176655f310000000063616966300000000000000000000000ff000000000000000000000000000000000000000000000000000000000000000200010400000000700098000000000000000000000000000000000000000000280052454a454354000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000c800000000000000000000000000000000000000000030006164647274797065000000000000000000000000000000000000000000000e010600000000000100000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x3) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) 07:35:17 executing program 1: mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x6) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x7f, 0x280401) r1 = creat(0x0, 0x0) r2 = fcntl$getown(r1, 0x9) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x120000000000000, 0x1}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xe2e6}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000008c0)={r2, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000380)='TCPOPTSTRIP\x00'}, 0x30) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r5) stat(&(0x7f00000004c0)='./bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r6, 0x0) r7 = getpid() sched_setattr(r7, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000080)='threaded\x00', 0xfffffe58) statx(r8, &(0x7f0000000900)='./file0/file0\x00', 0x100, 0x1, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000004c0)='./bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r10, 0x0) r11 = getpid() sched_setattr(r11, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) stat(&(0x7f00000004c0)='./bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r12, 0x0) r13 = getpid() r14 = geteuid() stat(&(0x7f00000004c0)='./bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r15, 0x0) r16 = creat(0x0, 0x0) r17 = fcntl$getown(r16, 0x9) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x120000000000000, 0x1}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xe2e6}, r17, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r18 = geteuid() stat(&(0x7f00000004c0)='./bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r19, 0x0) sendmsg$unix(r0, &(0x7f0000000b00)={&(0x7f0000000200)=@abs={0x1, 0x0, 0x6}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000280)="0b18cb7eab72889d2599d4606ee1e20e37b78a36dec7520197705928f3fb7868a0154b6ce3fb36f538e4942923d351f8f8b72eb500a97665036f6ec23db6fa652aae87738ecf59edc36015bab365e2f6cba868a38f6b740ce6ad233a8663aa10f142305bca1f86a3c390ae5d5fd01566b2281dda04963a1cece5534848f9bd36a6eb69f48a36d8ab02dabe96567f268099508ece7ed81069b2d22957fbb1b1fafb7f09f6f18665e3dc8bb105af3ef277b889b0fe1ff4e8cc2263ea2ee933b329d7d245c28d2943c5376597", 0xcb}, {&(0x7f00000007c0)="f63b24b0cfe4103a69dff0cd3856a1aba3789535bb23d3a4d7371129624901a8e9c5e4ff436c323c739dcbaeec11640bf26e75bf95616b41935494de1abffcf81d1803c6ce77c2dd0496496de20e06440505beedf1e1a976b0c2693d376c12d105ed9f779d66baf3846a084699d339e7d38adcccb1b3", 0x76}, {&(0x7f0000000840)="867d502813f37db4f136eb6b4188686f377e917cadd07c0188528708e9077646b387608a5592b99ca34d27f4e032db11f1af766b0c2e10156fa66f2fa1444a1c18a86782b982a283e28f98993d", 0x4d}], 0x3, &(0x7f0000000a40)=[@cred={{0x1c, 0x1, 0x2, {r3, r5, r6}}}, @cred={{0x1c, 0x1, 0x2, {r7, r9, r10}}}, @cred={{0x1c, 0x1, 0x2, {r11, 0x0, r12}}}, @cred={{0x1c, 0x1, 0x2, {r13, r14, r15}}}, @cred={{0x1c, 0x1, 0x2, {r17, r18, r19}}}], 0xa0, 0x40001}, 0x800) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r20 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r21 = openat$cgroup_int(r20, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r21, r21, 0x0, 0x100020000) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r22 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r22, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) fallocate(r22, 0x0, 0x0, 0x7fff) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r20, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000180)=0x27) 07:35:18 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x101082, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000200)=0x4000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1800007, 0x11, r0, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ftruncate(r3, 0x208200) fcntl$setstatus(r2, 0x4, 0x6000) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000003c00)) io_setup(0x1ff, &(0x7f00000004c0)=0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f00000007c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x1, 0xe0b7}) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = eventfd2(0x0, 0x0) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r10, &(0x7f0000000080)='threaded\x00', 0xfffffe58) ioctl$IMDELTIMER(r10, 0x80044941, &(0x7f0000000100)) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) 07:35:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000200)={{0x5, 0xa6}, 'port1\x00', 0x3, 0x100008, 0x7, 0x5fbe, 0x2, 0x6, 0xffffffff, 0x0, 0x5, 0x8e}) sendfile(r1, r1, 0x0, 0x100020000) 07:35:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) fchmodat(r0, &(0x7f0000000080)='./file0\x00', 0x24) 07:35:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 07:35:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x101480, 0x0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffe58) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="41000000030000000000000000000000010000000000000100000000000000006370757365742e73636865645f72656c61785f646f6d61696e5f6c6576656c0000"], 0x41) sendfile(r1, r1, 0x0, 0x100020000) 07:35:18 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000040), 0x8) r1 = creat(&(0x7f0000000340)='./file0\x00', 0x83) fallocate(r1, 0x0, 0x0, 0x7fff) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000300)) ioctl$VIDIOC_CREATE_BUFS(r2, 0xc100565c, &(0x7f0000000200)={0x6f9cc893, 0x86, 0x4, {0xa, @sdr={0x31324d4e, 0xeec8}}, 0x3}) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x2, 0xffffffffffffffff, 0x1}) fgetxattr(r3, &(0x7f00000000c0)=@known='system.advise\x00', &(0x7f0000000100)=""/54, 0x36) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000140)=0x3ff) 07:35:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x258200, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r2, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) setsockopt$inet_tcp_int(r2, 0x6, 0x19, &(0x7f00000000c0), 0x4) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x228000, 0x0) sendmsg$NL80211_CMD_SET_BEACON(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000001340)={0xd04, 0x0, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@NL80211_ATTR_P2P_CTWINDOW={0x5, 0xa2, 0x1}, @NL80211_ATTR_PRIVACY={0x4}, @NL80211_ATTR_BEACON_HEAD={0x6d7, 0xe, "537cab15239785c04a369f7a1277fb6af3315e8909f21a9508838ac86947d951dd19cf79aabc487a30165bd3f438722227de9305c779e46306666efae290214353e0fa58fcf7047547616e54739b92cc2178a06b79f8361709ae77a56d168472b62aeeffbc1b9db970e2792de50e6e9eb779e89d2484bb6fd21660cf57a364a1cde26449985fb1f06ef06ce37287c038b6570cfe612200539a7e7b07656bd44e795ce8157acc20b78bb32c1e9028f1099941477fd45c2c8d30067f6c5ef8d37a4fb0949484b4902880474cef50b95828bc2159c0aa8c0022595166c2b3252a7bc0b5a6e81f23a7615d37f14bd1136db556b0cc4d2ed9aa279962ef67aab1aed3601ec77ea65b3e0dd851bd55d7b5b273111a808ff9e4df559a4c1daa0f8eec82eb8a141255d07a11c79ac16604f7382803f725091d7c3ebedf07dd1912eeb396525a468e685cca538e3e3aabf070ea39a8e18acf443e5111cb46c10c8a6afb99fd180290293e26aae8b04b27222c1d88aea7dde59239c37fb14932293b33ee09ac9e9162903d6b900b60df4544b087f833f3c323b929b3f065cb835e2b3979416239213a12a3ea684227aa43ccbcd7b6b63b09a168ba9ae1734a76f0e91328031221efaa786b22d4cff59376d788a827e442536747a642c1599bd3a093dd3f434bad6aff93818856a5ece087e97326fbeadc79e0bae07f4c6723be0c9c51abb3abe9195356c57f312c32f5f180a0a3138733279d8b6cda506b03aebe939eea737413e21f05556e2e09a3b49f8342b73d3d71b8ecd864a1c9e2f056d3c8a1099bca2396865167a1e3955ed2026d737b3190f29806be369b7348f081932064c93eb654f6ad66c9ff9c486bc0d48485d4eecb5ca20c8344d42f2d7278b56efc7dfba17e2187a2dbb3f3950c1c2662ae5516e740a358dc75a071f67a5ac1d565f3dad82d4bc01bbd9ffb52d420f6fabe059bb902a59a3348bbf317b9cc1759502f8ee0a53ac5bd05730ac3ed775cff58b1df7dfbbf142f34dbf5ea2fc4eb1a3b2a7509498cebc6f897b0b2c67f46275316f59b57accb2193d522d421f446f3bdc1a058d2f2f4acda980bff93414f348d5b45f4f368edaf8253af37ac9f53e9541af3c41cc8ab511c955a97b7f3fe78ebc7a695cdd48dab0678c77f6f6567c5aebd78f2e35ad71080c6ff01d33c27e635565f4c9670c45ffc8e3b4684c67db31c47db5058713f62fc4474c505465849d2d7da5836e3f092461f99e86616d0637108bf79e06ff8dcfd569cc9eed97daca72480f3c7873e04e09a93fb72262f151644a8712ece0cb5a6c82fb031264a31c09f9cbc63fc8ffe6dcf6b4114e0ab61f55703b4bb93cfd959f3a4a463e1ef4477d9de36bd8acdfe80852553f517b38fee615e7d0e5d50519ac4e655ca74099ba2345d69cc6c45157ae9fd7c3524ab80a195782fbc92bf6f0bfc174a7e64c003cb7378db61745bae46bc0b5575842b625d916d67e49de159d25622a4cb2376dc927bff3518830f5293ddeef66b5886dcb72f1254ffcd670e345c1eb45ff64edbeca9a8556cc314b78fcc2d22bfdfd87992e9024965e9c68ade2dbb6e3b75471d572fce0e77f5fcab3c4daf7873c4d9f733454cee3a56e9450074283d9d0699121aae453131cc475c7ec7388c20c1a11fb542eea4894dd9a5a6c42ff1ce7593a29047d59a09348c42511a101f31c446affbfe56f1b3116359fe0918d602e9653136e4235f57c71713ae8920161d184febc1737b5d57452ca9b2741a32701c7961e505499e21673ac5f20bbb61b08c4a6f8f7d0d8ab48c8703b4753cd19d2c1e69863d4e7bd457c5072bff13d11796be113259531d16273161225080f8cdd18383143d0e6927f8cc1534c7415169b63db206088548c1044a08e9448fb575b280daf2acca6900cbeefbe357303fa8a5ea0c9d8c017a476170ef509bcbc0630f1466d4d8ddf5b1539949dd8e65680d8f5f9c384af4ebd62347184097e5676b723cc4bed9da1ac2c801efbdc8f397a205cb47d093a1298b09dcc8227dc80bc848a8d776158e85154eacd634e10ab3b74c28b0e96b972d0b48968986c5e015668a0d1886d6578cd4a3a3a97897f27eedd24cd739f65e03ce4fa414694a530ff09ac4f60f426642e496490d43456f8d589f318fa68d76776d2d1de08d21bbec87fbbd0b0f2c397087448bf4d320b651b2488d14c089f10a0fa3301ffacfa376b206da35ea119011a8e425b2e648a47510806172e572bb1dc7774967d91b1d0bc67352dfe6637152b50719c4f2e6c1c5d92132226f6bdb86fcbf3bfaf8fba1afa368a8b57f156863eea310b6ac5bf041458e7272f7423fc29393ac6b9fff33308b836bf11737800c6ee675daf62f8d51bff24ef3f3d02ddae72ad6364cdc7c538ef1e0b8f178e80eeca0c16c944f9f88eba1c13bc0785ef46edbd88a03f04f4528fe6a80dfb87a0f2208"}, @NL80211_ATTR_P2P_OPPPS={0x5}, @NL80211_ATTR_CIPHER_SUITE_GROUP={0x8, 0x4a, 0xfac0a}, @NL80211_ATTR_HIDDEN_SSID={0x8}, @NL80211_ATTR_IE_ASSOC_RESP={0x5f3, 0x80, "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"}]}, 0xd04}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000080)={0x0, 'ipvlan1\x00', 0x3}, 0x18) [ 1285.398614] audit: type=1804 audit(1583220918.639:11572): pid=13910 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir877835599/syzkaller.pzADnu/1399/file0" dev="sda1" ino=17794 res=1 07:35:18 executing program 0: r0 = socket$inet(0x2, 0x4, 0x81) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000200)={'team0\x00'}) getsockname$l2tp(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffe58) getsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000180)=0x4) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffe58) connect$bt_sco(r3, &(0x7f0000000000), 0x8) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) ioctl$FITRIM(r4, 0xc0185879, &(0x7f0000000240)={0xfffffffffffffff9, 0x1, 0x72}) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0xbff6e71b05fe6792, &(0x7f0000000100)=""/104, 0x68) 07:35:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 1285.545202] audit: type=1804 audit(1583220918.659:11573): pid=13910 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir877835599/syzkaller.pzADnu/1399/file0" dev="sda1" ino=17794 res=1 07:35:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0xc7) r1 = socket(0x10, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f0000000300)='syz1\x00', 0x1ff) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) r4 = getegid() r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffe58) ioctl$PPPIOCSMRU(r5, 0x40047452, &(0x7f0000000340)=0x8) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x800000, &(0x7f0000000200)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0xbe93}}, {@blksize={'blksize', 0x3d, 0x1c00}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@seclabel='seclabel'}]}}) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_int(r6, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r7, r7, 0x0, 0x100020000) 07:35:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, 0x0, &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 07:35:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, 0x0, &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 07:35:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x7fff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="340100001000010800"/20, @ANYRES32=0x0, @ANYBLOB="200000000000000008000400", @ANYRES32=r4, @ANYBLOB="1400030076657468315f746f5f62726964676500050021000300000024002b8008000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="080003000000000008000100", @ANYRES32, @ANYBLOB="08001b0003000000240024006512da13406fe15c29f5d228c5792f40ff6af4c62ffe60880a2390cdc33e80ff1400030076657468315f6d6163767461700000007c003480140035007465616d5f736c6176655f31000000001400350076747468315f746f5f68737200000000140035007663616e3000000000000000000000001400350076657468305f766972745f77696669001400350073697430000000000000000000000000140035007767320000000000000000000000000008002e00080000000500100084000000"], 0x134}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000340)={@loopback, 0x60, r4}) getsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000140)={@rand_addr, 0x0}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@getchain={0x3c, 0x66, 0x20, 0x70bd27, 0x25dfdbfb, {0x0, 0x0, 0x0, r5, {0xfff1, 0x1}, {0x9, 0xffe0}, {0x7, 0xa}}, [{0x8, 0xb, 0x4}, {0x8, 0xb, 0x8}, {0x8, 0xb, 0x81}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000040}, 0x90) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_int(r6, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r8 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x16e) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r9, 0x0, 0x0, 0x7fff) ioctl$UI_SET_PHYS(r9, 0x4008556c, &(0x7f0000000300)='syz0\x00') fchdir(r8) ioctl$UI_END_FF_ERASE(r8, 0x400c55cb, &(0x7f0000000080)={0x8, 0xfffffffb, 0x3}) sendfile(r7, r7, 0x0, 0x100020000) 07:35:19 executing program 3: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}}, 0x10) socket$kcm(0x29, 0x2, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0xfffffd3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) getpeername(r1, &(0x7f00000000c0)=@tipc, &(0x7f0000000040)=0x80) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x7fff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000140)={r0, r2}) 07:35:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, 0x0, &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 1286.352292] A link change request failed with some changes committed already. Interface veth1_macvtap may have been left with an inconsistent configuration, please check. [ 1286.405992] A link change request failed with some changes committed already. Interface veth1_macvtap may have been left with an inconsistent configuration, please check. 07:35:19 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="1b4d9a21fb512cfaae72647ce157c32dc229508fa4a08a4fdccaed983209ed37064e6a7cfc76d8f7ee30f5287d5b31802b7d6311700e213e41c99bbf858ff8be12e241b5e8f9709b46665dbb45d324b545"], 0x51) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3164", 0xff7c}], 0x1) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x2000) ioctl$EVIOCGUNIQ(r3, 0x80404508, &(0x7f00000000c0)=""/225) syz_genetlink_get_family_id$netlbl_unlabel(0x0) r4 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:35:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 07:35:19 executing program 1: r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ocfs2_control\x00', 0x82900, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000340)={@fixed={[], 0x10}, 0x8, 0x5, 0x5}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$SNDRV_PCM_IOCTL_PREPARE(r0, 0x4140, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffe58) sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, 0x2, 0x3, 0x201, 0x0, 0x0, {}, [@NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x3d}, @NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0x3}, @NFQA_CFG_CMD={0x8, 0x1, {0x0, 0x0, 0x1a}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20080001}, 0x4000880) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_int(r2, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r2, 0x8250aea6, &(0x7f0000000200)=""/217) sendfile(r3, r3, 0x0, 0x100020000) 07:35:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 07:35:20 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x40, 0x680000) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x3) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) sendmsg$AUDIT_DEL_RULE(r2, &(0x7f0000000580)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000040)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0x4d8}, 0x1, 0x0, 0x0, 0x40001}, 0x4000014) connect$bt_sco(r1, &(0x7f0000000080)={0x1f, @none}, 0x8) 07:35:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f00000000c0)={0x990000, 0x1, 0x0, r0, 0x0, &(0x7f0000000080)={0x99096e, 0xe3b, [], @ptr=0xdfc}}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, &(0x7f0000000200)={'syzkaller1\x00', {0x2, 0x5e22, @loopback}}) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000180)=@req={0x28, &(0x7f0000000140)={'wg1\x00', @ifru_addrs=@hci={0x1f, 0x0, 0x3}}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r4, r4, 0x0, 0x100020000) 07:35:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 07:35:20 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="1b4d9a21fb512cfaae72647ce157c32dc229508fa4a08a4fdccaed983209ed37064e6a7cfc76d8f7ee30f5287d5b31802b7d6311700e213e41c99bbf858ff8be12e241b5e8f9709b46665dbb45d324b545"], 0x51) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3164", 0xff7c}], 0x1) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x2000) ioctl$EVIOCGUNIQ(r3, 0x80404508, &(0x7f00000000c0)=""/225) syz_genetlink_get_family_id$netlbl_unlabel(0x0) r4 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:35:20 executing program 0: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x7fff) r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/validatetrans\x00', 0x1, 0x0) fstatfs(r1, &(0x7f0000000080)=""/150) connect$bt_sco(r0, &(0x7f0000000040), 0x8) 07:35:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x7fff) ioctl$VIDIOC_S_HW_FREQ_SEEK(r0, 0x40305652, &(0x7f0000000080)={0xf35, 0x5, 0x5, 0x1, 0x96cd, 0x107, 0xcf9}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x100020000) 07:35:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x100488, 0x0) 07:35:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x100488, 0x0) 07:35:21 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="1b4d9a21fb512cfaae72647ce157c32dc229508fa4a08a4fdccaed983209ed37064e6a7cfc76d8f7ee30f5287d5b31802b7d6311700e213e41c99bbf858ff8be12e241b5e8f9709b46665dbb45d324b545"], 0x51) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3164", 0xff7c}], 0x1) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x2000) ioctl$EVIOCGUNIQ(r3, 0x80404508, &(0x7f00000000c0)=""/225) syz_genetlink_get_family_id$netlbl_unlabel(0x0) r4 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:35:21 executing program 0: r0 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x900, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x92492492492483d, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 07:35:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x202240, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:35:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x100488, 0x0) 07:35:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x100488, 0x0) 07:35:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x7, &(0x7f00000002c0)=[{&(0x7f0000000180)="2e00000032000908d22780258c6394fb0400fc0e10000b500c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) read$dsp(0xffffffffffffffff, &(0x7f0000000040)=""/231, 0xe7) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000000)) 07:35:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x100488, 0x0) 07:35:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000007c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x0, 0x1b8, 0x0, 0x0, 0x1b8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x150, 0x1b8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x4, 0xd}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'batadv_slave_0\x00', {0x0, 0x0, 0x0, 0x2}}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) sendfile(r1, r2, 0x0, 0x1ca) 07:35:21 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="1b4d9a21fb512cfaae72647ce157c32dc229508fa4a08a4fdccaed983209ed37064e6a7cfc76d8f7ee30f5287d5b31802b7d6311700e213e41c99bbf858ff8be12e241b5e8f9709b46665dbb45d324b545"], 0x51) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3164", 0xff7c}], 0x1) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x2000) ioctl$EVIOCGUNIQ(r3, 0x80404508, &(0x7f00000000c0)=""/225) syz_genetlink_get_family_id$netlbl_unlabel(0x0) r4 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 07:35:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x100488, 0x0) [ 1288.284203] openvswitch: netlink: Message has 5 unknown bytes. [ 1288.312321] openvswitch: netlink: Message has 5 unknown bytes. 07:35:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:null_device_t:s0\x00', 0x23, 0x1) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100020000) 07:35:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{0x0, 0x0, 0x1}], 0x100488, 0x0) 07:35:21 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x4a) fchdir(r2) ioctl$TIOCL_GETKMSGREDIRECT(r2, 0x541c, &(0x7f0000000040)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0xd) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x7fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x10, r4, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x400000, 0x0) accept$nfc_llcp(r2, 0x0, &(0x7f0000000080)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 07:35:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{0x0, 0x0, 0x1}], 0x100488, 0x0) 07:35:21 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="1b4d9a21fb512cfaae72647ce157c32dc229508fa4a08a4fdccaed983209ed37064e6a7cfc76d8f7ee30f5287d5b31802b7d6311700e213e41c99bbf858ff8be12e241b5e8f9709b46665dbb45d324b545"], 0x51) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3164", 0xff7c}], 0x1) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x2000) ioctl$EVIOCGUNIQ(r3, 0x80404508, &(0x7f00000000c0)=""/225) syz_genetlink_get_family_id$netlbl_unlabel(0x0) fcntl$dupfd(r2, 0x0, r1) 07:35:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{0x0, 0x0, 0x1}], 0x100488, 0x0) 07:35:22 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="1b4d9a21fb512cfaae72647ce157c32dc229508fa4a08a4fdccaed983209ed37064e6a7cfc76d8f7ee30f5287d5b31802b7d6311700e213e41c99bbf858ff8be12e241b5e8f9709b46665dbb45d324b545"], 0x51) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3164", 0xff7c}], 0x1) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x2000) ioctl$EVIOCGUNIQ(r3, 0x80404508, &(0x7f00000000c0)=""/225) syz_genetlink_get_family_id$netlbl_unlabel(0x0) fcntl$dupfd(r2, 0x0, r1) 07:35:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580), 0x0, 0x1}], 0x100488, 0x0) 07:35:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580), 0x0, 0x1}], 0x100488, 0x0) 07:35:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580), 0x0, 0x1}], 0x100488, 0x0) 07:35:22 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="1b4d9a21fb512cfaae72647ce157c32dc229508fa4a08a4fdccaed983209ed37064e6a7cfc76d8f7ee30f5287d5b31802b7d6311700e213e41c99bbf858ff8be12e241b5e8f9709b46665dbb45d324b545"], 0x51) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3164", 0xff7c}], 0x1) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x2000) ioctl$EVIOCGUNIQ(r3, 0x80404508, &(0x7f00000000c0)=""/225) syz_genetlink_get_family_id$netlbl_unlabel(0x0) fcntl$dupfd(r2, 0x0, r1) 07:35:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3", 0x4a, 0x1}], 0x100488, 0x0) panic: bad arg kind: goroutine 30 [running]: github.com/google/syzkaller/prog.clone(0x0, 0x0, 0xc440b15b60, 0xc458962ea0, 0x3) /syzkaller/gopath/src/github.com/google/syzkaller/prog/clone.go:79 +0x9aa github.com/google/syzkaller/prog.(*Prog).Clone(0xc4388578c0, 0x8b5cd2) /syzkaller/gopath/src/github.com/google/syzkaller/prog/clone.go:24 +0x19d github.com/google/syzkaller/prog.resourceCentric(0xfc5540, 0xc42860b090, 0xc43f428340, 0x410801, 0x20, 0x85ec00, 0x13) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:848 +0xc1 github.com/google/syzkaller/prog.(*ResourceType).generate(0xfc5540, 0xc43f428340, 0xc42860b090, 0xc443d71f88, 0x4dfde3, 0xc4248af500, 0x6605ba7955aa43ec, 0xc443d71fa8) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:681 +0x931 github.com/google/syzkaller/prog.(*randGen).generateArgImpl(0xc43f428340, 0xc42860b090, 0xa45a00, 0xfc5540, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:674 +0x1b8 github.com/google/syzkaller/prog.(*randGen).generateArg(0xc43f428340, 0xc42860b090, 0xa45a00, 0xfc5540, 0x410848, 0xc443d720c0, 0x72f044, 0x8a5f29, 0x3) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:623 +0x52 github.com/google/syzkaller/prog.(*PtrType).generate(0xfc54e0, 0xc43f428340, 0xc42860b090, 0xa42160, 0xc43df1aba0, 0x0, 0x0, 0x0) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:829 +0xf7 github.com/google/syzkaller/prog.(*randGen).generateArgImpl(0xc43f428340, 0xc42860b090, 0xa45940, 0xfc54e0, 0xc443d72100, 0x0, 0x0, 0x0, 0x0, 0x0) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:674 +0x1b8 github.com/google/syzkaller/prog.(*randGen).generateArg(0xc43f428340, 0xc42860b090, 0xa45940, 0xfc54e0, 0x0, 0x0, 0x0, 0x0, 0x0) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:623 +0x52 github.com/google/syzkaller/prog.(*randGen).generateArgs(0xc43f428340, 0xc42860b090, 0xe44ac0, 0x3, 0x3, 0xc435a7ad50, 0x57df77fd572b8ed2, 0xc443d72350, 0x4e00ff, 0xc435a7ad50, ...) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:611 +0x18b github.com/google/syzkaller/prog.(*randGen).generateParticularCall(0xc43f428340, 0xc42860b090, 0x1c28680, 0x200, 0x201, 0xc43df20000) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:555 +0xd6 github.com/google/syzkaller/prog.(*randGen).createResource(0xc43f428340, 0xc42860b090, 0x1120a00, 0x0, 0x0, 0x0, 0x0, 0x0) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:388 +0x52b github.com/google/syzkaller/prog.(*ResourceType).generate(0x1120a00, 0xc43f428340, 0xc42860b090, 0x91, 0xc443d728a8, 0x41020d, 0xc438827b30, 0x30) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:710 +0x80b github.com/google/syzkaller/prog.(*randGen).generateArgImpl(0xc43f428340, 0xc42860b090, 0xa45a00, 0x1120a00, 0xc443d72800, 0x0, 0x0, 0x0, 0x0, 0x0) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:674 +0x1b8 github.com/google/syzkaller/prog.(*randGen).generateArg(0xc43f428340, 0xc42860b090, 0xa45a00, 0x1120a00, 0x18, 0xc43df1ab60, 0x0, 0x1ec0780, 0x1ec0780) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:623 +0x52 github.com/google/syzkaller/prog.(*ArrayType).generate(0x13355c0, 0xc43f428340, 0xc42860b090, 0xa42160, 0xc43df1ab60, 0x0, 0x0, 0x0) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:805 +0x16a github.com/google/syzkaller/prog.(*randGen).generateArgImpl(0xc43f428340, 0xc42860b090, 0xa45340, 0x13355c0, 0xc443d72a00, 0x0, 0x0, 0x0, 0x0, 0x0) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:674 +0x1b8 github.com/google/syzkaller/prog.(*randGen).generateArg(0xc43f428340, 0xc42860b090, 0xa45340, 0x13355c0, 0x0, 0x0, 0x0, 0x0, 0x0) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:623 +0x52 github.com/google/syzkaller/prog.(*randGen).generateArgs(0xc43f428340, 0xc42860b090, 0xf8fd40, 0x4, 0x4, 0xc443d72c90, 0xbc4619b0, 0xf4e5ab858a84ab6e, 0xc443d72c70, 0xf40000000072e348, ...) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:611 +0x18b github.com/google/syzkaller/prog.(*StructType).generate(0xf43880, 0xc43f428340, 0xc42860b090, 0x34, 0x1ede6a0, 0x41020d, 0xc43255a2b0, 0x10) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:813 +0x74 github.com/google/syzkaller/prog.(*randGen).generateArgImpl(0xc43f428340, 0xc42860b090, 0xa45ac0, 0xf43880, 0xc443d72d00, 0x0, 0x0, 0x0, 0x0, 0x0) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:674 +0x1b8 github.com/google/syzkaller/prog.(*randGen).generateArg(0xc43f428340, 0xc42860b090, 0xa45ac0, 0xf43880, 0x1, 0x1, 0x8, 0x93, 0xc443d72e60) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:623 +0x52 github.com/google/syzkaller/prog.(*randGen).generateArgs(0xc43f428340, 0xc42860b090, 0xd262d0, 0x1, 0x1, 0xc443d72f48, 0xbc4619b0, 0xdb1c1b4194daf347, 0xc443d72f28, 0xdb0000000072e348, ...) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:611 +0x18b github.com/google/syzkaller/prog.(*StructType).generate(0xf43980, 0xc43f428340, 0xc42860b090, 0x2c, 0x1ede6a0, 0x41020d, 0xc43df1ab00, 0x20) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:813 +0x74 github.com/google/syzkaller/prog.(*randGen).generateArgImpl(0xc43f428340, 0xc42860b090, 0xa45ac0, 0xf43980, 0xc400000000, 0x0, 0x0, 0x0, 0x0, 0x0) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:674 +0x1b8 github.com/google/syzkaller/prog.(*randGen).generateArg(0xc43f428340, 0xc42860b090, 0xa45ac0, 0xf43980, 0xf3e843055136367c, 0xc443d730a8, 0xf30000000072ec28, 0x8b5eda, 0xa) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:623 +0x52 github.com/google/syzkaller/prog.(*UnionType).generate(0xde3d40, 0xc43f428340, 0xc42860b090, 0xa, 0x1ede6a0, 0x0, 0x0, 0x0) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:820 +0xa1 github.com/google/syzkaller/prog.(*randGen).generateArgImpl(0xc43f428340, 0xc42860b090, 0xa45b80, 0xde3d40, 0xc443d73100, 0x0, 0x0, 0x0, 0x0, 0x0) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:674 +0x1b8 github.com/google/syzkaller/prog.(*randGen).generateArg(0xc43f428340, 0xc42860b090, 0xa45b80, 0xde3d40, 0x0, 0x0, 0x0, 0x0, 0x0) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:623 +0x52 github.com/google/syzkaller/prog.(*ArrayType).generate(0x12d28c0, 0xc43f428340, 0xc42860b090, 0xc443d732d0, 0x4dfde3, 0xc4248af500, 0x20294d10d4d22729, 0xc443d732f0) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:805 +0x16a github.com/google/syzkaller/prog.(*randGen).generateArgImpl(0xc43f428340, 0xc42860b090, 0xa45340, 0x12d28c0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:674 +0x1b8 github.com/google/syzkaller/prog.(*randGen).generateArg(0xc43f428340, 0xc42860b090, 0xa45340, 0x12d28c0, 0x9ac9703582c90ddb, 0xc443d73408, 0x72f044, 0x8a5f29, 0x3) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:623 +0x52 github.com/google/syzkaller/prog.(*PtrType).generate(0xfaa300, 0xc43f428340, 0xc42860b090, 0x5, 0xc4275ce7d8, 0x0, 0x0, 0x0) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:829 +0xf7 github.com/google/syzkaller/prog.(*randGen).generateArgImpl(0xc43f428340, 0xc42860b090, 0xa45940, 0xfaa300, 0xc443d73500, 0x0, 0x0, 0x0, 0x0, 0x0) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:674 +0x1b8 github.com/google/syzkaller/prog.(*randGen).generateArg(0xc43f428340, 0xc42860b090, 0xa45940, 0xfaa300, 0x0, 0x0, 0x0, 0x0, 0x0) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:623 +0x52 github.com/google/syzkaller/prog.(*randGen).generateArgs(0xc43f428340, 0xc42860b090, 0x1c22c80, 0x9, 0x9, 0xc443d736e0, 0xbc4619b0, 0xed9128f7b8d46d36, 0xc443d736c0, 0xed0000000072e348, ...) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:611 +0x18b github.com/google/syzkaller/prog.(*StructType).generate(0xe71b80, 0xc43f428340, 0xc42860b090, 0x9, 0x1ede6a0, 0x160, 0x160, 0xc43da99760) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:813 +0x74 github.com/google/syzkaller/prog.(*randGen).generateArgImpl(0xc43f428340, 0xc42860b090, 0xa45ac0, 0xe71b80, 0xc4539bf700, 0x0, 0x0, 0x0, 0x0, 0x0) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:674 +0x1b8 github.com/google/syzkaller/prog.(*randGen).generateArg(0xc43f428340, 0xc42860b090, 0xa45ac0, 0xe71b80, 0xc432afcf00, 0xb, 0xc, 0xb, 0xc) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:623 +0x52 github.com/google/syzkaller/prog.(*ArrayType).generate(0x12ff3e0, 0xc43f428340, 0xc42860b090, 0xc4539bf8e8, 0x4dfde3, 0xc4248af500, 0x17a1b0fc3f6efadf, 0xc4539bf908) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:805 +0x16a github.com/google/syzkaller/prog.(*randGen).generateArgImpl(0xc43f428340, 0xc42860b090, 0xa45340, 0x12ff3e0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:674 +0x1b8 github.com/google/syzkaller/prog.(*randGen).generateArg(0xc43f428340, 0xc42860b090, 0xa45340, 0x12ff3e0, 0xc4539bfa00, 0xc4539bfa20, 0x72f044, 0x8a5f29, 0x3) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:623 +0x52 github.com/google/syzkaller/prog.(*PtrType).generate(0x102bcc0, 0xc43f428340, 0xc42860b090, 0xa42260, 0xc43f42a100, 0x8, 0x8, 0xc431b4be08) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:829 +0xf7 github.com/google/syzkaller/prog.(*randGen).generateArgImpl(0xc43f428340, 0xc42860b090, 0xa45940, 0x102bcc0, 0xc4539bfb00, 0x0, 0x0, 0x0, 0x0, 0x0) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:674 +0x1b8 github.com/google/syzkaller/prog.(*randGen).generateArg(0xc43f428340, 0xc42860b090, 0xa45940, 0x102bcc0, 0xc431b4bdf0, 0x1, 0x1, 0x1, 0x1) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:623 +0x52 github.com/google/syzkaller/prog.(*randGen).generateArgs(0xc43f428340, 0xc42860b090, 0xf72300, 0x4, 0x4, 0x3b5ff1fcf5e04d05, 0xc4539bfcd8, 0x71450e, 0x81f0c0, 0xc439940000, ...) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:611 +0x18b github.com/google/syzkaller/prog.(*randGen).generateParticularCall(0xc43f428340, 0xc42860b090, 0x1c7e1c0, 0x8d9, 0xc42860b090, 0xc429b82540) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:555 +0xd6 github.com/google/syzkaller/prog.(*randGen).generateCall(0xc43f428340, 0xc42860b090, 0xc429b81980, 0x9, 0xc429b81980, 0x0, 0xc42860b090) /syzkaller/gopath/src/github.com/google/syzkaller/prog/rand.go:547 +0xb4 github.com/google/syzkaller/prog.(*mutator).insertCall(0xc4539bfe08, 0x14) [ 1289.477178] audit: type=1804 audit(1583220922.719:11574): pid=14117 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir877835599/syzkaller.pzADnu/1405/file0" dev="sda1" ino=17890 res=1 /syzkaller/gopath/src/github.com/google/syzkaller/prog/mutation.go:137 +0xf5 github.com/google/syzkaller/prog.(*Prog).Mutate(0xc429b81980, 0xa3fc20, 0xc441702b40, 0x1e, 0xc4416fa180, 0xc441724000, 0xc4fb, 0xf000) /syzkaller/gopath/src/github.com/google/syzkaller/prog/mutation.go:42 +0x2a9 main.(*Proc).smashInput(0xc4416fab40, 0xc43c1daed0) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:217 +0x131 main.(*Proc).loop(0xc4416fab40) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:82 +0x194 created by main.main /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:259 +0x1071