[ 42.872142][ T26] audit: type=1800 audit(1570198785.064:25): pid=7179 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 42.909724][ T26] audit: type=1800 audit(1570198785.064:26): pid=7179 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 42.942806][ T26] audit: type=1800 audit(1570198785.064:27): pid=7179 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 43.260910][ T7245] sshd (7245) used greatest stack depth: 10032 bytes left [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.57' (ECDSA) to the list of known hosts. 2019/10/04 14:19:53 fuzzer started 2019/10/04 14:19:55 dialing manager at 10.128.0.105:44881 2019/10/04 14:19:55 syscalls: 2523 2019/10/04 14:19:55 code coverage: enabled 2019/10/04 14:19:55 comparison tracing: enabled 2019/10/04 14:19:55 extra coverage: extra coverage is not supported by the kernel 2019/10/04 14:19:55 setuid sandbox: enabled 2019/10/04 14:19:55 namespace sandbox: enabled 2019/10/04 14:19:55 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/04 14:19:55 fault injection: enabled 2019/10/04 14:19:55 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/04 14:19:55 net packet injection: enabled 2019/10/04 14:19:55 net device setup: enabled 2019/10/04 14:19:55 concurrency sanitizer: enabled 14:19:58 executing program 0: openat$uhid(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uhid\x00', 0x0, 0x0) pipe(&(0x7f0000000440)) r0 = memfd_create(&(0x7f0000000200)='queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x20a81) r2 = dup2(r1, r0) write$P9_RLINK(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syzkaller login: [ 56.370264][ T7349] IPVS: ftp: loaded support on port[0] = 21 14:19:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) creat(0x0, 0x201) [ 56.458648][ T7349] chnl_net:caif_netlink_parms(): no params data found [ 56.496061][ T7349] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.503801][ T7349] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.527794][ T7349] device bridge_slave_0 entered promiscuous mode [ 56.547904][ T7349] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.555090][ T7349] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.578320][ T7349] device bridge_slave_1 entered promiscuous mode [ 56.618611][ T7349] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 56.648543][ T7349] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 56.682988][ T7349] team0: Port device team_slave_0 added [ 56.689978][ T7349] team0: Port device team_slave_1 added 14:19:59 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) fcntl$getownex(r0, 0x10, &(0x7f0000000a80)={0x0, 0x0}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x6010) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x20000, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140ce9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 56.789781][ T7349] device hsr_slave_0 entered promiscuous mode [ 56.867186][ T7349] device hsr_slave_1 entered promiscuous mode [ 56.944557][ T7349] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.951799][ T7349] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.959206][ T7349] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.966313][ T7349] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.985490][ T7352] IPVS: ftp: loaded support on port[0] = 21 [ 57.061488][ T7349] 8021q: adding VLAN 0 to HW filter on device bond0 [ 57.099930][ T7354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 14:19:59 executing program 3: r0 = eventfd(0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r4 = eventfd(0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f00000002c0)={r3}) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f00000000c0)={r4}) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f00000000c0)={r0, 0x0, 0x3}) [ 57.117912][ T7354] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.136067][ T7354] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.145449][ T7354] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 57.159540][ T7349] 8021q: adding VLAN 0 to HW filter on device team0 [ 57.186270][ T7355] IPVS: ftp: loaded support on port[0] = 21 [ 57.204200][ T7354] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 57.221000][ T7354] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.228490][ T7354] bridge0: port 1(bridge_slave_0) entered forwarding state [ 57.291403][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 57.300649][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.307724][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 57.319284][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 57.352746][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 57.364052][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 57.395405][ T7349] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 57.427544][ T7349] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 57.467543][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 57.484992][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 57.496720][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 57.517563][ T7360] IPVS: ftp: loaded support on port[0] = 21 [ 57.529210][ T7349] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 57.547135][ T7352] chnl_net:caif_netlink_parms(): no params data found 14:19:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) [ 57.664879][ T7352] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.672859][ T7352] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.681888][ T7352] device bridge_slave_0 entered promiscuous mode [ 57.749389][ T7352] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.756627][ T7352] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.778414][ T7352] device bridge_slave_1 entered promiscuous mode [ 57.820118][ T7360] chnl_net:caif_netlink_parms(): no params data found [ 57.861722][ T7355] chnl_net:caif_netlink_parms(): no params data found [ 57.941097][ T7352] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 58.001278][ T7352] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 58.042354][ T7360] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.052479][ T7360] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.061838][ T7360] device bridge_slave_0 entered promiscuous mode [ 58.072245][ T7360] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.079584][ T7360] bridge0: port 2(bridge_slave_1) entered disabled state 14:20:00 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 58.091006][ T7360] device bridge_slave_1 entered promiscuous mode [ 58.117069][ T7355] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.124438][ T7355] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.135975][ T7355] device bridge_slave_0 entered promiscuous mode [ 58.182286][ T7372] IPVS: ftp: loaded support on port[0] = 21 [ 58.192359][ T7352] team0: Port device team_slave_0 added [ 58.199762][ T7352] team0: Port device team_slave_1 added [ 58.210292][ T7355] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.220190][ T7355] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.233762][ T7355] device bridge_slave_1 entered promiscuous mode [ 58.242968][ T7360] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 14:20:00 executing program 0: openat$uhid(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uhid\x00', 0x0, 0x0) pipe(&(0x7f0000000440)) r0 = memfd_create(&(0x7f0000000200)='queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x20a81) r2 = dup2(r1, r0) write$P9_RLINK(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 58.302050][ T7360] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 58.372520][ T7352] device hsr_slave_0 entered promiscuous mode [ 58.427389][ T7352] device hsr_slave_1 entered promiscuous mode [ 58.486941][ T7352] debugfs: Directory 'hsr0' with parent '/' already present! [ 58.510912][ T7355] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 58.523707][ T7355] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 58.545086][ T7360] team0: Port device team_slave_0 added [ 58.553134][ T7360] team0: Port device team_slave_1 added [ 58.558239][ T7374] IPVS: ftp: loaded support on port[0] = 21 [ 58.650299][ T7360] device hsr_slave_0 entered promiscuous mode [ 58.688139][ T7360] device hsr_slave_1 entered promiscuous mode [ 58.726980][ T7360] debugfs: Directory 'hsr0' with parent '/' already present! [ 58.761120][ T7355] team0: Port device team_slave_0 added [ 58.790934][ T7355] team0: Port device team_slave_1 added [ 58.874848][ T7372] chnl_net:caif_netlink_parms(): no params data found 14:20:01 executing program 0: openat$uhid(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uhid\x00', 0x0, 0x0) pipe(&(0x7f0000000440)) r0 = memfd_create(&(0x7f0000000200)='queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x20a81) r2 = dup2(r1, r0) write$P9_RLINK(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 58.939461][ T7355] device hsr_slave_0 entered promiscuous mode [ 58.977420][ T7355] device hsr_slave_1 entered promiscuous mode [ 59.017002][ T7355] debugfs: Directory 'hsr0' with parent '/' already present! [ 59.038347][ T7360] 8021q: adding VLAN 0 to HW filter on device bond0 [ 59.082440][ T7372] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.090021][ T7372] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.098677][ T7372] device bridge_slave_0 entered promiscuous mode [ 59.108484][ T7360] 8021q: adding VLAN 0 to HW filter on device team0 [ 59.137337][ T7372] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.144564][ T7372] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.152819][ T7372] device bridge_slave_1 entered promiscuous mode [ 59.162042][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.170266][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.184356][ T7352] 8021q: adding VLAN 0 to HW filter on device bond0 [ 59.225664][ T7372] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 59.238640][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 59.248746][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.257791][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.264822][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.274112][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 59.287495][ T7374] chnl_net:caif_netlink_parms(): no params data found [ 59.299151][ T7372] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 14:20:01 executing program 0: openat$uhid(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uhid\x00', 0x0, 0x0) pipe(&(0x7f0000000440)) r0 = memfd_create(&(0x7f0000000200)='queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x20a81) r2 = dup2(r1, r0) write$P9_RLINK(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 59.336727][ T7360] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 59.348120][ T7360] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 59.382639][ T7354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.391868][ T7354] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.409521][ T7354] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.417008][ T7354] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.424986][ T7354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.432772][ T7354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.440352][ T7354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.449255][ T7354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.458358][ T7354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 59.466736][ T7354] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 59.475787][ T7354] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 59.484449][ T7354] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 59.492693][ T7354] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 59.502027][ T7354] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 59.510395][ T7354] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 59.525690][ T7352] 8021q: adding VLAN 0 to HW filter on device team0 [ 59.534085][ T7372] team0: Port device team_slave_0 added [ 59.552732][ T7355] 8021q: adding VLAN 0 to HW filter on device bond0 [ 59.571344][ T7372] team0: Port device team_slave_1 added [ 59.583474][ T7355] 8021q: adding VLAN 0 to HW filter on device team0 [ 59.611387][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.619529][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.627946][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 59.636591][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.647498][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.654775][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.663090][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.672224][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.681288][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.688553][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.697681][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.712968][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 59.727566][ T7360] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 59.750314][ T7374] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.757838][ T7374] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.765713][ T7374] device bridge_slave_0 entered promiscuous mode [ 59.776309][ T7374] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.787040][ T7374] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.795095][ T7374] device bridge_slave_1 entered promiscuous mode [ 59.809106][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.818709][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 59.827839][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 59.837602][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 59.846570][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 59.855885][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 59.864857][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.873991][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.881072][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.889490][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.898518][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.907793][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.915088][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.924351][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.933977][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.943359][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 59.953380][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 59.962474][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 59.971792][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 59.981214][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 59.990266][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 59.999176][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 60.007938][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 60.016386][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 60.024898][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.033248][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 14:20:02 executing program 0: openat$uhid(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uhid\x00', 0x0, 0x0) pipe(&(0x7f0000000440)) r0 = memfd_create(&(0x7f0000000200)='queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x20a81) r2 = dup2(r1, r0) write$P9_RLINK(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 60.099685][ T7372] device hsr_slave_0 entered promiscuous mode [ 60.121515][ T7372] device hsr_slave_1 entered promiscuous mode [ 60.161351][ T7372] debugfs: Directory 'hsr0' with parent '/' already present! [ 60.172282][ T7352] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 60.189701][ T7352] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 60.211493][ T7352] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 60.225208][ T7355] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 60.244811][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 60.254236][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 60.267143][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 60.275452][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 60.284462][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 60.294202][ T7374] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 60.306289][ T7374] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 60.327314][ T7355] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 60.395435][ T7374] team0: Port device team_slave_0 added [ 60.428912][ T7372] 8021q: adding VLAN 0 to HW filter on device bond0 [ 60.442935][ T7405] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 60.453314][ T7372] 8021q: adding VLAN 0 to HW filter on device team0 [ 60.481868][ T7374] team0: Port device team_slave_1 added 14:20:02 executing program 3: r0 = eventfd(0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r4 = eventfd(0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f00000002c0)={r3}) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f00000000c0)={r4}) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f00000000c0)={r0, 0x0, 0x3}) [ 60.510212][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.549372][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.650266][ T7374] device hsr_slave_0 entered promiscuous mode 14:20:02 executing program 0: openat$uhid(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uhid\x00', 0x0, 0x0) pipe(&(0x7f0000000440)) r0 = memfd_create(&(0x7f0000000200)='queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x20a81) r2 = dup2(r1, r0) write$P9_RLINK(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 60.705561][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 60.705667][ T26] audit: type=1800 audit(1570198802.894:31): pid=7420 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16528 res=0 [ 60.733756][ T7374] device hsr_slave_1 entered promiscuous mode 14:20:03 executing program 3: r0 = eventfd(0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r4 = eventfd(0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f00000002c0)={r3}) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f00000000c0)={r4}) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f00000000c0)={r0, 0x0, 0x3}) [ 60.774502][ T26] audit: type=1804 audit(1570198802.944:32): pid=7416 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir517580280/syzkaller.oRHRdn/0/file0" dev="sda1" ino=16528 res=1 [ 60.846989][ T7374] debugfs: Directory 'hsr0' with parent '/' already present! [ 60.867571][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.876333][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.917597][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.924718][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.944507][ T26] audit: type=1804 audit(1570198803.034:33): pid=7420 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir517580280/syzkaller.oRHRdn/0/file0" dev="sda1" ino=16528 res=1 [ 61.012229][ T7356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 61.040746][ T7356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.077701][ C0] hrtimer: interrupt took 35264 ns [ 61.078828][ T7356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.119777][ T7356] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.127180][ T7356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.157472][ T7356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 61.167983][ T7356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.177737][ T7356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.192267][ T7356] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.203879][ T7356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.218317][ T7356] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.233048][ T7356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 61.242484][ T7356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 61.264354][ T7372] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 61.285426][ T7372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 61.324510][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 61.343094][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 61.370834][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 61.415194][ T7372] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 61.451873][ T7374] 8021q: adding VLAN 0 to HW filter on device bond0 [ 61.471702][ T26] audit: type=1804 audit(1570198803.664:34): pid=7425 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir517580280/syzkaller.oRHRdn/0/file0" dev="sda1" ino=16528 res=1 [ 61.522424][ T7374] 8021q: adding VLAN 0 to HW filter on device team0 [ 61.543748][ T7354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 14:20:03 executing program 0: openat$uhid(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uhid\x00', 0x0, 0x0) pipe(&(0x7f0000000440)) r0 = memfd_create(&(0x7f0000000200)='queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x20a81) r2 = dup2(r1, r0) write$P9_RLINK(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:20:03 executing program 3: r0 = eventfd(0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r4 = eventfd(0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f00000002c0)={r3}) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f00000000c0)={r4}) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f00000000c0)={r0, 0x0, 0x3}) 14:20:03 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) fcntl$getownex(r0, 0x10, &(0x7f0000000a80)={0x0, 0x0}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x6010) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x20000, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140ce9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 61.547013][ T26] audit: type=1804 audit(1570198803.664:35): pid=7441 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir517580280/syzkaller.oRHRdn/0/file0" dev="sda1" ino=16528 res=1 [ 61.585291][ T7354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.594767][ T26] audit: type=1804 audit(1570198803.664:36): pid=7425 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir517580280/syzkaller.oRHRdn/0/file0" dev="sda1" ino=16528 res=1 [ 61.695471][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.716046][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.741290][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.748464][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.780280][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.794747][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.819355][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.826478][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.838603][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 61.848526][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.858686][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.869932][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.879953][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.889418][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.899536][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 61.909585][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 61.918854][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 61.928233][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 61.939922][ T7374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 61.967550][ T7354] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.008453][ T7354] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 62.045084][ T7374] 8021q: adding VLAN 0 to HW filter on device batadv0 14:20:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) creat(0x0, 0x201) 14:20:04 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) fcntl$getownex(r0, 0x10, &(0x7f0000000a80)={0x0, 0x0}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x6010) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x20000, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140ce9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 14:20:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) creat(0x0, 0x201) 14:20:04 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 62.562935][ T26] audit: type=1800 audit(1570198804.754:37): pid=7485 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16544 res=0 14:20:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:04 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 62.678529][ T26] audit: type=1804 audit(1570198804.764:38): pid=7485 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir517580280/syzkaller.oRHRdn/1/file0" dev="sda1" ino=16544 res=1 [ 62.902344][ T26] audit: type=1800 audit(1570198804.784:39): pid=7490 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16548 res=0 [ 63.049401][ T26] audit: type=1804 audit(1570198804.784:40): pid=7490 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir179535038/syzkaller.Qqw7Z3/4/file0" dev="sda1" ino=16548 res=1 14:20:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:05 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 14:20:05 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) fcntl$getownex(r0, 0x10, &(0x7f0000000a80)={0x0, 0x0}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x6010) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x20000, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140ce9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 14:20:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) creat(0x0, 0x201) 14:20:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) creat(0x0, 0x201) 14:20:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:06 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) creat(0x0, 0x201) 14:20:07 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) creat(0x0, 0x201) 14:20:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:07 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) [ 65.725500][ T26] kauditd_printk_skb: 13 callbacks suppressed [ 65.725528][ T26] audit: type=1804 audit(1570198807.914:54): pid=7591 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir179535038/syzkaller.Qqw7Z3/6/file0" dev="sda1" ino=16523 res=1 14:20:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:08 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:09 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:09 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:09 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:10 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 14:20:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:10 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 14:20:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 14:20:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:10 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 14:20:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) creat(0x0, 0x201) 14:20:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 14:20:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) creat(0x0, 0x201) 14:20:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x300, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000600)={0x1, 0x0, 0x1000, 0xe4, &(0x7f0000000700)="ef592934e25cbe7d70d304cc01c7bc2330df18725fbba2ff08db499f21c252034db3733a8cab8c797ad67f4e494b0d892efa648f149613d41d942ee0bc462a9c6517598453f715011462b1a5439443f511782e75106ac54cd9240abfa42579413d5562dd2ddce3e50e1a337bf4cc82d5645abeb3693284247143a8adb7fe2bcedc2ad147d43200edbe9064bdf0a13eb9fce0cd0f06ece630d30a31f4fa206d0c9b61754135bcba72fd594e4528d7ea2ed753922d4c9d888913ae145dbd1d7665bd8893cc97fbcbbf4904ee6830bd7d846422f484f6dde703e26a1be9a7b0fa7cefb144e8", 0x6b, 0x0, &(0x7f0000000800)="8faf51ccf854f3bd3f6e6b66572e254735fe821b85cf0b323554f2f19dbe811d5586ef7cc4aa1f37a6c17f779d7878532b25fbf4d0f1b61bfc95df5396d5454efc69f4e4d7261c702d2cb6ce57eedb8cf3bf09c4e496928817634f5a7b59b45de230b52cd6cda853ec4536"}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x10029) r3 = socket$kcm(0xa, 0x2, 0x73) getsockname(r3, 0x0, &(0x7f000000ad00)) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)=0x120) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') socket$alg(0x26, 0x5, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000004c0)) quotactl(0xfff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, r7, 0x0, 0x1000003) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, 0x0) 14:20:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) creat(0x0, 0x201) [ 68.743049][ T26] audit: type=1800 audit(1570198810.934:55): pid=7706 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16567 res=0 [ 68.876860][ T26] audit: type=1804 audit(1570198810.944:56): pid=7706 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir517580280/syzkaller.oRHRdn/7/file0" dev="sda1" ino=16567 res=1 14:20:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) creat(0x0, 0x201) [ 69.063382][ T26] audit: type=1804 audit(1570198810.994:57): pid=7703 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir517580280/syzkaller.oRHRdn/7/file0" dev="sda1" ino=16567 res=1 14:20:11 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 69.162594][ T26] audit: type=1800 audit(1570198811.144:58): pid=7722 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16587 res=0 14:20:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) creat(0x0, 0x201) [ 69.313494][ T26] audit: type=1804 audit(1570198811.194:59): pid=7710 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir179535038/syzkaller.Qqw7Z3/10/file0" dev="sda1" ino=16587 res=1 [ 69.468681][ T26] audit: type=1800 audit(1570198811.234:60): pid=7724 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16552 res=0 [ 69.567892][ T26] audit: type=1804 audit(1570198811.294:61): pid=7722 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir179535038/syzkaller.Qqw7Z3/10/file0" dev="sda1" ino=16587 res=1 14:20:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) creat(0x0, 0x201) [ 69.687120][ T26] audit: type=1804 audit(1570198811.344:62): pid=7724 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir105703955/syzkaller.3bkWw1/16/file0" dev="sda1" ino=16552 res=1 14:20:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) creat(0x0, 0x201) [ 69.833525][ T26] audit: type=1800 audit(1570198811.394:63): pid=7734 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16589 res=0 14:20:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) creat(0x0, 0x201) 14:20:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) creat(0x0, 0x201) 14:20:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) creat(0x0, 0x201) [ 70.740031][ T26] kauditd_printk_skb: 19 callbacks suppressed [ 70.740061][ T26] audit: type=1804 audit(1570198812.934:83): pid=7785 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir286203775/syzkaller.bSCd7B/14/file0" dev="sda1" ino=16585 res=1 14:20:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) creat(0x0, 0x201) [ 70.886881][ T26] audit: type=1804 audit(1570198813.024:84): pid=7787 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir286203775/syzkaller.bSCd7B/14/file0" dev="sda1" ino=16585 res=1 14:20:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) creat(0x0, 0x201) [ 71.091506][ T26] audit: type=1800 audit(1570198813.284:85): pid=7794 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16582 res=0 [ 71.169098][ T26] audit: type=1804 audit(1570198813.334:86): pid=7794 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir582924297/syzkaller.FxRtB4/14/file0" dev="sda1" ino=16582 res=1 14:20:13 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) creat(0x0, 0x201) 14:20:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) creat(0x0, 0x201) 14:20:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) creat(0x0, 0x201) [ 71.269834][ T7794] ================================================================== [ 71.278151][ T7794] BUG: KCSAN: data-race in blk_mq_get_request / blk_mq_get_request [ 71.286148][ T7794] [ 71.288481][ T7794] read to 0xffff888129a62d48 of 8 bytes by task 7799 on cpu 1: [ 71.296033][ T7794] blk_mq_get_request+0x8b6/0xb40 [ 71.301063][ T7794] blk_mq_make_request+0x2d9/0xf40 [ 71.306263][ T7794] generic_make_request+0x196/0x740 [ 71.311458][ T7794] submit_bio+0x92/0x310 [ 71.315702][ T7794] submit_bh_wbc+0x40f/0x460 [ 71.320328][ T7794] __sync_dirty_buffer+0xd3/0x200 [ 71.325477][ T7794] sync_dirty_buffer+0x24/0x40 [ 71.330248][ T7794] ext4_write_inode+0x312/0x330 [ 71.335107][ T7794] __writeback_single_inode+0x6eb/0x8d0 [ 71.340829][ T7794] writeback_single_inode+0x22f/0x2f0 [ 71.346206][ T7794] sync_inode_metadata+0x74/0xa0 [ 71.351334][ T7794] __generic_file_fsync+0x122/0x190 [ 71.356536][ T7794] ext4_sync_file+0x48e/0xb00 [ 71.361220][ T7794] vfs_fsync_range+0x82/0x150 [ 71.366238][ T7794] [ 71.368656][ T7794] write to 0xffff888129a62d48 of 8 bytes by task 7794 on cpu 0: [ 71.376418][ T7794] blk_mq_get_request+0x8c9/0xb40 [ 71.381445][ T7794] blk_mq_make_request+0x2d9/0xf40 [ 71.386559][ T7794] generic_make_request+0x196/0x740 [ 71.391755][ T7794] submit_bio+0x92/0x310 [ 71.396155][ T26] audit: type=1804 audit(1570198813.394:87): pid=7799 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir582924297/syzkaller.FxRtB4/14/file0" dev="sda1" ino=16582 res=1 [ 71.420300][ T7794] ext4_mpage_readpages+0xb12/0x1270 [ 71.420320][ T7794] ext4_readpages+0x92/0xc0 [ 71.420330][ T7794] read_pages+0xa2/0x2d0 [ 71.420341][ T7794] __do_page_cache_readahead+0x353/0x390 [ 71.420353][ T7794] ondemand_readahead+0x35d/0x710 [ 71.420365][ T7794] page_cache_sync_readahead+0x1ad/0x1e0 [ 71.420378][ T7794] generic_file_read_iter+0xeb6/0x1440 [ 71.420393][ T7794] ext4_file_read_iter+0xfa/0x240 [ 71.420407][ T7794] generic_file_splice_read+0x35c/0x500 [ 71.420423][ T7794] [ 71.470576][ T7794] Reported by Kernel Concurrency Sanitizer on: [ 71.476905][ T7794] CPU: 0 PID: 7794 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 71.484454][ T7794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 71.494784][ T7794] ================================================================== [ 71.503023][ T7794] Kernel panic - not syncing: panic_on_warn set ... [ 71.509896][ T7794] CPU: 0 PID: 7794 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 71.517644][ T7794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 71.524296][ T26] audit: type=1800 audit(1570198813.714:88): pid=7810 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16545 res=0 [ 71.527936][ T7794] Call Trace: [ 71.527962][ T7794] dump_stack+0xf5/0x159 [ 71.527982][ T7794] panic+0x209/0x639 [ 71.528014][ T7794] ? vprintk_func+0x8d/0x140 [ 71.528044][ T7794] kcsan_report.cold+0x57/0xeb [ 71.573812][ T7794] __kcsan_setup_watchpoint+0x342/0x500 [ 71.579366][ T7794] __tsan_write8+0x32/0x40 [ 71.583826][ T7794] blk_mq_get_request+0x8c9/0xb40 [ 71.588973][ T7794] ? constant_test_bit+0x30/0x30 [ 71.595014][ T7794] blk_mq_make_request+0x2d9/0xf40 [ 71.601100][ T7794] generic_make_request+0x196/0x740 [ 71.606596][ T7794] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 71.612943][ T7794] submit_bio+0x92/0x310 [ 71.617657][ T7794] ? bio_add_page+0xf8/0x130 [ 71.622644][ T7794] ext4_mpage_readpages+0xb12/0x1270 [ 71.628072][ T7794] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 71.634147][ T7794] ? ext4_invalidatepage+0x1e0/0x1e0 [ 71.639637][ T7794] ext4_readpages+0x92/0xc0 [ 71.644153][ T7794] ? ext4_invalidatepage+0x1e0/0x1e0 [ 71.649620][ T7794] read_pages+0xa2/0x2d0 [ 71.653968][ T7794] __do_page_cache_readahead+0x353/0x390 [ 71.659784][ T7794] ondemand_readahead+0x35d/0x710 [ 71.664932][ T7794] page_cache_sync_readahead+0x1ad/0x1e0 [ 71.670577][ T7794] generic_file_read_iter+0xeb6/0x1440 [ 71.673628][ T26] audit: type=1800 audit(1570198813.754:89): pid=7811 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16552 res=0 [ 71.676075][ T7794] ext4_file_read_iter+0xfa/0x240 [ 71.676097][ T7794] generic_file_splice_read+0x35c/0x500 [ 71.676121][ T7794] do_splice_to+0xf2/0x130 [ 71.676136][ T7794] ? add_to_pipe+0x1a0/0x1a0 [ 71.676151][ T7794] ? add_to_pipe+0x1a0/0x1a0 [ 71.676171][ T7794] splice_direct_to_actor+0x1a1/0x510 [ 71.676186][ T7794] ? generic_pipe_buf_nosteal+0x20/0x20 [ 71.676216][ T7794] do_splice_direct+0x161/0x1e0 [ 71.737430][ T7794] do_sendfile+0x384/0x7f0 [ 71.741878][ T7794] __x64_sys_sendfile64+0x12a/0x140 [ 71.747185][ T7794] do_syscall_64+0xcf/0x2f0 [ 71.752058][ T7794] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 71.758060][ T7794] RIP: 0033:0x459a59 [ 71.761959][ T7794] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 71.765273][ T26] audit: type=1804 audit(1570198813.764:90): pid=7811 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir179535038/syzkaller.Qqw7Z3/12/file0" dev="sda1" ino=16552 res=1 [ 71.783052][ T7794] RSP: 002b:00007f3137c2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 71.783067][ T7794] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459a59 [ 71.783075][ T7794] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 71.783084][ T7794] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 71.783093][ T7794] R10: 000000007fffffa7 R11: 0000000000000246 R12: 00007f3137c2b6d4 [ 71.783102][ T7794] R13: 00000000004c7489 R14: 00000000004dd038 R15: 00000000ffffffff [ 71.785165][ T7794] Kernel Offset: disabled [ 71.863786][ T7794] Rebooting in 86400 seconds..