_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@mcast2, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@empty}}, &(0x7f0000000a00)=0xe8) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f00000021c0)="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", 0x2000, &(0x7f0000000b40)={&(0x7f0000000100)={0x50, 0x0, 0x0, {0x7, 0x21, 0x9, 0x0, 0x89d0, 0x40, 0xff, 0x4}}, &(0x7f0000000180)={0x18, 0xb, 0xfff, {0x4}}, &(0x7f00000001c0)={0x18, 0x0, 0x4, {0x4}}, &(0x7f0000000280)={0x18, 0x0, 0x80, {0x1a3}}, &(0x7f00000002c0)={0x18, 0x0, 0x9, {0xfffffff8}}, &(0x7f0000000300)={0x28, 0x0, 0x1000, {{0x20, 0x0, 0x1, r4}}}, &(0x7f0000000340)={0x60, 0x0, 0x1, {{0x4, 0x1258, 0x2, 0x4, 0x13eb, 0x8000, 0x1}}}, &(0x7f00000003c0)={0x18, 0x0, 0x800, {0x8e}}, &(0x7f0000000400)={0x15, 0x81747d0ce2364b79, 0xffffffffb80c3ea6, {'fuse\x00'}}, &(0x7f0000000440)={0x20, 0xfffffffffffffff5, 0xfffffffffffff77a, {0x0, 0x10}}, &(0x7f0000000480)={0x78, 0xfffffffffffffffe, 0x4, {0x9, 0x1, 0x0, {0x0, 0x5, 0x10000, 0x5, 0x80, 0xffffffffffffff80, 0x1, 0x100, 0x9a2, 0xa000, 0x2, r2, 0x0, 0x8, 0x2}}}, &(0x7f0000000500)={0x90, 0xffffffffffffffda, 0xfff, {0x1, 0x1, 0x1094, 0x0, 0x3, 0x80000001, {0x6, 0x100000001, 0x1, 0x4, 0x800, 0x4, 0x58e88442, 0x1, 0x3, 0xc000, 0x1, r2, 0x0, 0x101, 0x7}}}, &(0x7f00000005c0)={0x78, 0x0, 0x6, [{0x1, 0x1, 0x5, 0x1, 'fuse\x00'}, {0x2, 0x8, 0x5, 0x1000, 'fuse\x00'}, {0x5, 0x3ff, 0xa, 0x4b, '/dev/fuse\x00'}]}, &(0x7f0000000780)={0x148, 0xfffffffffffffffe, 0x3, [{{0x2, 0x0, 0x8, 0x6, 0x200, 0x80000000, {0x6, 0xfffffffffffffffc, 0x1, 0xe46, 0x7, 0x8, 0x3, 0xffff, 0x80000001, 0xc000, 0x3, r6, r8, 0x2, 0x1}}, {0x6, 0x5, 0x0, 0x40}}, {{0x4, 0x3, 0x13, 0x4, 0x20, 0x7, {0x0, 0x7fffffff, 0x0, 0x10000, 0x8, 0x10000, 0x1, 0x2, 0x8, 0x8000, 0x1ff, r2, r3, 0x8, 0x7c}}, {0x5, 0x9, 0x5, 0x1, 'fuse\x00'}}]}, &(0x7f0000000a40)={0xa0, 0x2f, 0xff, {{0x5, 0x1, 0x6, 0x0, 0x1, 0x18, {0x6, 0x2, 0x100000000, 0xab2c, 0x8001, 0x81, 0x1000, 0x3, 0x9, 0x4000, 0x10001, r9, r3, 0x6, 0x8}}, {0x0, 0x4}}}, &(0x7f0000000b00)={0x20, 0x0, 0x1, {0x0, 0x0, 0x7f, 0xfffffff7}}}) write$P9_RSTATu(r5, &(0x7f00000000c0)=ANY=[], 0x200002ae) dup2(r5, r0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 13:11:56 executing program 2: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:11:56 executing program 0: unshare(0x400) unshare(0x24000000) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4038ae7a, &(0x7f0000000100)) 13:11:56 executing program 0: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000000000408c0d22004800000000010902240001000000000904aa00010301000009212d980e2cb880e151058103"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f00000006c0)={0x24, 0x0, 0x0, &(0x7f0000000640)={0x0, 0x22, 0x1, {[@main]}}, 0x0}, 0x0) ioctl$HIDIOCSFLAG(0xffffffffffffffff, 0x541b, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000200)={0x24, &(0x7f0000000040)={0x0, 0x7, 0xd2, {0xd2, 0x11, "840a2c0482a573b3f25b68d538042ec015b52762a3e64d0bbdfca1317cd5e4d50164c9640771b68cdb033ed218f2b353be074d892438f2149682235cc6128c11b93f47ae46acb79d21823810228eb3833321ae648fe71ba04cf0a17d18abf56581e41993a71cbfd248fa6b0ec3af4ff05ada27df174a960ed7089e44227ca42ea83661d0c18197aa418d699a94f3bc6941b38d6bcd53ed74835d5235dbfeaa711fa13393182c15464e954958e180cba7eecb1d78284e69de5aea0af5a5cec549512606f0fe3cf37347e21f3165810190"}}, &(0x7f0000000140)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x2409}}, &(0x7f0000000180)={0x0, 0x22, 0x15, {[@main=@item_4={0x3, 0x0, 0xb, "6a489083"}, @global=@item_012={0x0, 0x1, 0xc}, @local=@item_4={0x3, 0x2, 0xa, "d0d71a27"}, @main=@item_4={0x3, 0x0, 0x8, "f5c23be4"}, @local=@item_4={0x3, 0x2, 0xa, "6aff7420"}]}}, &(0x7f00000001c0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x2, 0x20, 0x1, {0x22, 0xfc3}}}}, &(0x7f0000000400)={0x2c, &(0x7f0000000240)={0x0, 0x3, 0xd, "6c0df440c23f0eb54d37b3b5c9"}, &(0x7f0000000280)={0x0, 0xa, 0x1, 0x81}, &(0x7f00000002c0)={0x0, 0x8, 0x1, 0x40}, &(0x7f0000000300)={0x20, 0x1, 0xad, "cb9947b02e269627ee5d6607a51395735a96a9b14c4472bf42660a9cf5ac7282c219ed17e60de81b979e045e1fff56ce52a78f368a62658a73898f3fafce66ca02d4fa5767355bdf852285b2e459e9e178a4a42ae2d5d22fff0af898db3e8cacdf58ed295728d8ff5f87811e77d0058b270010603d17369d397d1baf0ef3c8e021d4fe0cfc61e76a30a6a9192af4518191376a90076baea300d98f82303cd69b0f7ef00681d37a0000055aefff"}, &(0x7f00000003c0)={0x20, 0x3, 0x1, 0x1f}}) 13:11:56 executing program 2: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:11:56 executing program 3: ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x300000000) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000180)=ANY=[]) write$vhost_msg_v2(r0, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1, 0x2}}, 0x48) r2 = dup(r1) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x0, r2}) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0x1fe, 0x1, 0x1000, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000005240)=[{{0x0, 0xffffff7f, 0x0}}], 0x300, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='cmdline\x00') preadv(r3, &(0x7f00000017c0), 0x3da, 0xf0ffff, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) syz_mount_image$sysv(0x0, &(0x7f00000054c0)='./file0\x00', 0x5, 0x0, 0x0, 0x0, 0x0) [ 127.383554][T10339] fuse: Bad value for 'user_id' 13:11:56 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x2c, 0x800) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='devices.list\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) write$cgroup_int(r2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100008, 0x500001c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x200a00, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x42) ioctl$PPPIOCGDEBUG(r2, 0x80047441, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) sendfile(r3, r0, 0x0, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x177a) close(r2) 13:11:56 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r1, 0x40000000af01, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000100)=0x300000000) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000180)=ANY=[]) write$vhost_msg_v2(r1, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1, 0x2}}, 0x48) r3 = dup(r2) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000000)={0x0, r3}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES16=r1], 0x50}}, 0x1) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x10c80, 0x0) 13:11:56 executing program 2: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000500)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:11:56 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 127.731042][ T5] usb 1-1: new high-speed USB device number 4 using dummy_hcd 13:11:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x5c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xfffffffffffffef9, 0x3, 'hash:ip,port,net\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x0}]}]}, 0x5c}}, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r1, 0x40000000af01, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000100)=0x300000000) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcsa\x00', 0x232c80, 0x0) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x140800}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x48, 0x2, 0x6, 0x101, 0x0, 0x0, {0x2, 0x0, 0x7}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_PROTO={0x5, 0x7, 0x67}]}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xc}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x24000004) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000180)=ANY=[]) write$vhost_msg_v2(r1, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1, 0x2}}, 0x48) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0xb8, 0x2, 0x7, 0x801, 0x0, 0x0, {0x0, 0x0, 0x4}, [@NFACCT_FILTER={0x3c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xbc8e}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xda}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x101}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xf4b}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x4}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1ff}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0xfffffe00}]}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x101}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0xfff}, @NFACCT_FILTER={0x34, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0xbea1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x20}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x9}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x4}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x4}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x2}]}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x18}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x7ffc}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x24000041}, 0x48024) r4 = dup(r2) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000000)={0x0, r4}) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='timerslack_ns\x00') copy_file_range(r5, &(0x7f0000000040)=0xfffffffffffffffc, r5, 0x0, 0x40, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00', r5) sendmsg$NL80211_CMD_JOIN_MESH(r6, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000600)={&(0x7f0000000240)={0x3c, r7, 0x1, 0x70bd28, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x0, 0x3c}}}}, [@NL80211_ATTR_BEACON_INTERVAL={0x8, 0xc, @random=0x1}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_ELEMENT_TTL={0x5, 0xf, 0x20}, @NL80211_MESHCONF_HWMP_ACTIVE_PATH_TIMEOUT={0x8}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040}, 0x400c044) sendmsg$NL80211_CMD_DISASSOCIATE(r4, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x50, r7, 0x300, 0x70bd2c, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @from_mac}, @NL80211_ATTR_IE={0x23, 0x2a, [@challenge={0x10, 0x1, 0x3}, @dsss={0x3, 0x1, 0x68}, @chsw_timing={0x68, 0x4, {0xc96, 0x191f}}, @dsss={0x3, 0x1, 0xb4}, @mesh_chsw={0x76, 0x6, {0x8, 0x3f, 0x7, 0x2c}}, @peer_mgmt={0x75, 0x6, {0x0, 0x2932, @void, @val=0xa, @void}}]}, @NL80211_ATTR_IE={0xb, 0x2a, [@supported_rates={0x1, 0x5, [{0xb, 0x1}, {0x12}, {0x1b, 0x1}, {0x8}, {0x36, 0x1}]}]}]}, 0x50}}, 0x11) 13:11:56 executing program 4: r0 = add_key$keyring(0x0, &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$setperm(0x5, 0x0, 0x815202f) keyctl$chown(0x4, 0x0, 0xee01, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) keyctl$assume_authority(0x10, r1) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000001c0)={r0, 0x0, 0x7d}, 0x0, 0x0, &(0x7f0000000300)=""/125) personality(0x0) ptrace(0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000040)={0x0, 0x1b, 0x55}, &(0x7f0000000640)=ANY=[@ANYBLOB="80b25e9ef88813da716a6c03d7d7ba5b2a435c0d6b01f73fce7cacd9906580da4a5234a379033e110a17390a78b434d98382aebb81618717804485be541eea83a23749f68a06305c51328664def2a73364d3e04f2ed17307821173ff3ec7aef6373dc0edbfb02d5af849f0dc7e42e36b53c57dc0efad39fd5b4391650a58a4fdd4ad0b16056067650c17c500efdef71b1db94da24ab71905a3a314ba8ed67d7085431a42c7881b9c8ecddf1f171cdf2e0ba19da46a4fff9cd47166ea70000000000000"], &(0x7f0000000800)="b6530f515a085691c4202ca7926143adc95abdb1162d56e1e1a8bb", &(0x7f0000000780)=""/85) r2 = syz_open_dev$vcsa(&(0x7f0000000440)='/dev/vcsa#\x00', 0xfffffffffffffffd, 0xc00) syz_open_procfs(0x0, &(0x7f00000000c0)='net/dev_mcast\x00') preadv(r2, 0x0, 0x0, 0x0, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x3) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x2, 0x0, 0x0, 0xff, 0x0, 0x3c43, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x208, 0x4, 0xfffffffe, 0x8, 0xfffffffffffffffe, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 13:11:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x40000000000000}, 0x0, 0x9, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000024f80)={0x0, 0x0, 0x0}, 0x12002) bpf$MAP_CREATE(0x0, 0x0, 0xdd961212f0ca6836) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x101}, 0x0) r0 = getpid() mkdir(0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7, 0x4}, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x101042, 0x0) ftruncate(r1, 0x200004) sendfile(r1, r1, 0x0, 0x80001d00c0d3) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x2, 0x48, 0x40, 0x2, 0x7ff, 0x8, 0x80000000, 0xb8b, 0x4}, 0x0) 13:11:56 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:11:56 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x300000000) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000180)=ANY=[]) write$vhost_msg_v2(r0, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1, 0x2}}, 0x48) r2 = dup(r1) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x0, r2}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280)='nl80211\x00', r2) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000800)={'wlan1\x00', 0x0}) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001600)='nl80211\x00', 0xffffffffffffffff) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000001780)={0x3c, r6, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_CENTER_FREQ2={0x8}], @NL80211_ATTR_DURATION={0x8, 0x57, 0xbd}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}]]}, 0x3c}}, 0x0) sendmsg$NL80211_CMD_GET_MPATH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="00082cbd7000fcdbdf251500000008000300", @ANYRES32=r5, @ANYBLOB="0c00990001000100790000000a001a00ffffffffffff00000a00060008021100000000000a001a00ffffff0180ff0000"], 0x4c}}, 0x40000) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r8, 0x0) preadv(r8, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r9, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05140000000000000000010000000900010073797a300000000014000000020a0500000000000000200000000000200000000b0a05000000000000000000010000000900010073797a200000000014"], 0x7c}}, 0x0) [ 127.877898][T10386] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.3'. [ 127.890688][T10387] loop4: detected capacity change from 0 to 1 [ 127.944494][T10387] ldm_validate_privheads(): Disk read failed. [ 127.962236][T10387] loop4: p2 < > [ 127.984552][T10387] loop4: partition table partially beyond EOD, truncated [ 128.015008][T10387] loop4: p2 size 2 extends beyond EOD, truncated [ 128.065886][ T36] audit: type=1800 audit(1616850716.844:3): pid=10395 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file0" dev="sda1" ino=13960 res=0 errno=0 [ 128.151612][ T5] usb 1-1: config 0 has an invalid interface number: 170 but max is 0 [ 128.159803][ T5] usb 1-1: config 0 has an invalid descriptor of length 81, skipping remainder of the config [ 128.190977][ T5] usb 1-1: config 0 has no interface number 0 [ 128.197070][ T5] usb 1-1: config 0 interface 170 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 128.230952][ T5] usb 1-1: New USB device found, idVendor=0d8c, idProduct=0022, bcdDevice= 0.48 [ 128.239993][ T5] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 128.249362][ T5] usb 1-1: config 0 descriptor?? [ 128.293239][ T5] usbhid 1-1:0.170: couldn't find an input interrupt endpoint 13:11:59 executing program 0: socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x0, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000740)=@in6={0xa, 0x4e24, 0x0, @local, 0x2}, 0x80, 0x0}, 0x8000) socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000040)) 13:11:59 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 13:11:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x3}, 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x4a) r0 = getpid() r1 = getpid() wait4(0x0, &(0x7f00000000c0), 0x40000000, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x10) rt_tgsigqueueinfo(r0, r1, 0x16, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0x0) tkill(r0, 0x1) 13:11:59 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000000000)=0x1, 0x4) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x2, 0x4}, 0x8, 0x10, &(0x7f00000005c0), 0x10}, 0x78) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in=@broadcast, @in6=@empty}}, {{@in6=@private0}, 0x0, @in6=@private2}}, &(0x7f0000000540)=0x144) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x2}, 0x8, 0x10, &(0x7f00000005c0), 0x10}, 0x78) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) dup(r1) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) 13:11:59 executing program 1: syz_usb_connect(0x0, 0x2d, &(0x7f0000000040)=ANY=[@ANYBLOB="1201000083147f20c81403008f2b0102030109021b00010000040009040000015958a7000905870388"], 0x0) r0 = syz_usb_connect(0x4, 0x24, &(0x7f0000000000)=ANY=[@ANYBLOB="120100002188ddee760600d8128700000001f3ff070004000000f9305d00000000000000"], 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, &(0x7f0000001cc0)={0x34, &(0x7f0000001d40)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f00000006c0)={0x24, &(0x7f00000004c0)={0x20, 0x23, 0xbf, {0xbf, 0x3, "569be648fd5134885aeb99456990c820ee6a59899bd9ac52e1908f9f41ae769d1ed30f959a3a310379ae57c73d28dfdd94c5ba8fd32003e62845ba08249fa9065c2180dc3a7529c5719a23315d44b839cb005300afde5771824809b1bce86f9f34d5d8cbce4e820a9329b74ba3bbd2e9e9df95f918cb5154b6393c121fe25f53edb06aacb83dbf27387948bd545b6efd1c9829c759bf23160a9bff3f6d8efa493c92b027d3c24de1d78884e7598daf7a28016d794c039026d69b951b92"}}, &(0x7f00000005c0)=ANY=[@ANYBLOB="0003740000007403e5d3f9783b7aded2c7f5f36bb06baab9528ae1ee0c0f882b4589e1f5f247211e842ea8c852d0941a6cbde1c0aa6fcb82998a924c8a66191c83a4b22c9cfe01ba77eff6cf71400ceb592efa87728048e25a6ceb1052a5ccd4b1b9c5857bbf4bbc6de23b8ead68d3288dfb94c1bc03e427ffc4"], &(0x7f0000000640)={0x0, 0x22, 0xa, {[@main=@item_012={0x1, 0x0, 0xb, "9d"}, @global=@item_4={0x3, 0x1, 0x7, "31c0a433"}, @local=@item_012={0x0, 0x2, 0x8}, @main=@item_012={0x1, 0x0, 0xa, "15"}]}}, &(0x7f0000000680)={0x0, 0x21, 0x9, {0x9, 0x21, 0x200, 0xff, 0x1, {0x22, 0x1ab}}}}, &(0x7f00000008c0)={0x2c, &(0x7f0000000700)={0x0, 0xa, 0x7f, "b59ba6954dd8bf7534da1cb5aaf257dc7dbfc3a9271b40484f46ae373b8c5d089687a59a11a076edd0803fb031d2f7dffc295c735760bea46d200f1a4ec17c2695bcd667788fd84d2a4da42f2c94adff322fdc7cd51024f157b44b64c555b3a4b324e14b897d5795d80d8aa43e0b482c5c87cdae66722ebd5bcd97cc6bad45"}, &(0x7f00000007c0)={0x0, 0xa, 0x1, 0xf0}, &(0x7f0000000800)={0x0, 0x8, 0x1, 0x3f}, &(0x7f0000000840)={0x20, 0x1, 0x33, "6ec82666d8339c3bdf21a9831dc57f52b399946eb969ec4c7125fa17b03ec6d2c6483d4b5aab1d41a178d32418a7fbf7e74170"}, &(0x7f0000000880)={0x20, 0x3, 0x1}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x4010, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000000180)=ANY=[]) r2 = dup(0xffffffffffffffff) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000000)={0x0, r2}) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000008900000000000000000000950000000000000011524f083f4674181352d0"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = open(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000900)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r4, 0xc0709411, &(0x7f0000000400)=ANY=[@ANYRES64=r5, @ANYBLOB="3f000000000000000300000000000000080000000000000000000000000000000000000000000000400000000000000001000108050000007f0000000004000002000000000000000000000000000000000000000000000008000000000000000800"/112]) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r2, 0xd000943e, &(0x7f0000000900)={0x0, r5, "465f14c201a44d70742c37615fe4430aeb2f3c776abe490f7be094a8d153ef3ca11c13025dd9b5f7bcc62baa15932965c80f9fdfa1eae47d9b14afa8d15f5d3989895530cc4481f2b71234727fba56e0c6b49ea7229a51dec202fc380cd1abc518c6e43ae7eed0287aea5b125a7a626094263bf94e7be1cf04f650b1d4cd3eee93872ad510edcb7bc6261873368ba37d223839f09a7ff7a38593193530ce4b96cecedbb7f8691e5f626ace6806aad0c966f17492fd938be4c7b8f5c517af4107b134e03e0c077662e71bd10b26035b652ac57256ec763ea3c62168b901191eef7127bd3c55e53d72bbd805d81663f7aa8f64e14444ded1ef9f7060f99a189ace", "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"}) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)={0x185, 0x11, &(0x7f0000000080)}) 13:11:59 executing program 3: unshare(0x6c060000) socket$inet6(0x10, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e21, 0x8001, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) r1 = socket(0x2b, 0x3, 0x2) sendto$inet6(r1, &(0x7f0000000080)="2febc6098c55a5136ee4aafcd78c42ea2ceb363b74140f6aedf75eb59c21f0ded66d7985366c72456c26a4f17cf682c313622625aabd576b0d3b341853ce0691ef2180cdc84f0f5e79dd452ba11db4dcf826ab655f3ced28d7999f37b8f7d3b5d1b912b60eae60754b4dca0d672f25c0a22bf3304364431eccf4b3ebbbaf183a1946fcbcd033a3836300e1bf42497d5b5fd6732f65cf2dbaf05464bea36c0a79590287093f6affdb7e49e786f1824744", 0xb0, 0x20004004, 0x0, 0x0) listen(r0, 0x5) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) recvfrom$inet6(r2, &(0x7f0000000000)=""/35, 0xffffffffffffff13, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r3 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000140), &(0x7f0000000180)=0x14) shutdown(r2, 0x1) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x600000000000004) 13:11:59 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) [ 130.430596][ T9703] usb 1-1: USB disconnect, device number 4 13:11:59 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 13:11:59 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:11:59 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='qdisc_create\x00', r0}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x58, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@TCA_EGRESS_BLOCK={0x0, 0xe, 0x40}, @TCA_INGRESS_BLOCK={0x0, 0xd, 0x1}, @TCA_INGRESS_BLOCK={0x0, 0xd, 0x64f9}, @TCA_INGRESS_BLOCK={0x0, 0xd, 0x9}, @TCA_INGRESS_BLOCK={0x0, 0xd, 0x9}, @TCA_INGRESS_BLOCK={0x0, 0xd, 0x8b3e}]}, 0x58}}, 0x0) [ 130.499189][T10444] IPVS: ftp: loaded support on port[0] = 21 13:11:59 executing program 0: setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000040)={0x0, 0xe680}, 0x8) syz_usb_connect(0x0, 0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="12e795140281c9000014d32108ab12a190eb1e000000010600000001000000000904410017ff5d010009050f1f0100000000090583032b"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000300)={0x51, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}) 13:11:59 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x85) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x0, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000100)=ANY=[], 0x1c) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 13:11:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x3}, 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x4a) r0 = getpid() r1 = getpid() wait4(0x0, &(0x7f00000000c0), 0x40000000, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x10) rt_tgsigqueueinfo(r0, r1, 0x16, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0x0) tkill(r0, 0x1) 13:11:59 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 130.635620][T10497] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.4'. 13:11:59 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:11:59 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) set_mempolicy(0x3, &(0x7f0000000040)=0x9617, 0x8) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x2812, r0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 130.771092][ T9590] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 130.892202][ T36] audit: type=1804 audit(1616850719.674:4): pid=10526 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/10/bus" dev="sda1" ino=13968 res=1 errno=0 [ 130.950852][ T36] audit: type=1800 audit(1616850719.704:5): pid=10514 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="ramfs" ino=34293 res=0 errno=0 [ 130.990831][ T36] audit: type=1804 audit(1616850719.704:6): pid=10523 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/10/bus" dev="sda1" ino=13968 res=1 errno=0 [ 131.022116][ T9703] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 131.060843][ T9590] usb 2-1: Using ep0 maxpacket: 32 [ 131.202586][ T9590] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x87 has an invalid bInterval 0, changing to 7 [ 131.213532][ T9703] usb 1-1: device descriptor read/64, error 18 [ 131.421179][ T9590] usb 2-1: New USB device found, idVendor=14c8, idProduct=0003, bcdDevice=2b.8f [ 131.435260][ T9590] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 131.448556][ T9590] usb 2-1: Product: syz [ 131.453982][ T9590] usb 2-1: Manufacturer: syz [ 131.458799][ T9590] usb 2-1: SerialNumber: syz [ 131.466898][ T9590] usb 2-1: config 0 descriptor?? [ 131.500790][ T9703] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 131.515818][ T9590] input: syz syz as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/input/input7 [ 131.690780][ T9703] usb 1-1: device descriptor read/64, error 18 [ 131.716518][ T9590] usb 2-1: USB disconnect, device number 2 [ 131.810796][ T9703] usb usb1-port1: attempt power cycle [ 132.490722][ T5] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 132.520737][ T9703] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 132.730730][ T5] usb 2-1: Using ep0 maxpacket: 32 [ 132.736028][ T9703] usb 1-1: device descriptor read/8, error -61 [ 132.850746][ T5] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x87 has an invalid bInterval 0, changing to 7 [ 133.010709][ T9703] usb 1-1: new high-speed USB device number 8 using dummy_hcd [ 133.020950][ T5] usb 2-1: New USB device found, idVendor=14c8, idProduct=0003, bcdDevice=2b.8f [ 133.030035][ T5] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 133.039593][ T5] usb 2-1: Product: syz [ 133.043811][ T5] usb 2-1: Manufacturer: syz [ 133.048443][ T5] usb 2-1: SerialNumber: syz [ 133.056254][ T5] usb 2-1: config 0 descriptor?? [ 133.104601][ T5] input: syz syz as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/input/input8 [ 133.220903][ T9703] usb 1-1: device descriptor read/8, error -61 13:12:02 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x300000000) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000180)=ANY=[]) write$vhost_msg_v2(r0, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1, 0x2}}, 0x48) r2 = dup(r1) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x0, r2}) connect$l2tp6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @private1={0xfc, 0x1, [], 0x1}, 0x7, 0x2}, 0x20) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x4, &(0x7f0000001240)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d00002000400000026010f00000000000602000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd010000000000000100000000000000dc01", 0x200}, {&(0x7f0000000140)="9ae5cbfbf5734bafc7eba82743828ff3833241cabb2dc83349e0f6869a142ed144e655cca03e37b88a6a61b0c81f0ba9101c4fcf5b4f10f8e7461c1ffb6859a62df8b6de4183fbffc16702818b2cbaa08e4fb6191a93c6eebe0d33f8c1dcf419118874ea9f9734", 0x67, 0x7}, {&(0x7f00000001c0)="08d8a6226b53af20b84fdc0456228a915465826078194370", 0x18, 0x11c}, {&(0x7f0000000240)="08bb1cf6da48a03e6843fa516313afa56cb5fd2046cd8f1af10153cb0ea43abcec4121d6e6432917a5b3f95ca7d382199717acbc2f38e51ee5cb2c05792aaa09a7958fa0a77885b33cf0944e35153673f5a59937831cf770191e66212611d30e16001392b30a776aae49cad5454711b02a6f9a7bd14ad21eef9a9f2137f19ac6136e5a5b9a95ba0b21b23045e1703cd676611ad67486b7bfb0d09f75bf607aff9260d5f4b64fc72e0dce896726b57e8cae8f0a42e00ca7d9028d8b76173e0e2eecff40c96b07e202f7622e5655ab40febdd8278ded00a7e5432e6ee77851b122446b244cdb02141039a9532cce7a8c135ca1931757144c25c74983b316e76722bb94e0ece6a94b065cdff0bff254763fff970e3296de1b2824377384c36122f3954a149f2643565d23ee5fdc5096abf538c17c041f4569823d579fb5dd172ef705ec46eedd2062d4d37993abc6d39f4c40d2805d257d5a0414798fb602715cd17a4141a0da497b88bb7848a7106312ea2ac285c44e518c1a425ae1ab7511955a6629cafac1f1e944a7ee8e34ee4729b3470192b1d4e9063c2e4f1fe80c840c89af241b52b24d7db99ebb105e16288366a0381a023a3839fa7982b65fa5a47d158a2a2290bb94a6f9e8c7c8c23808a5a813b8fa363cb6b6a9ed9f8a71d8e49ec430fea2e3bab633f1c53ab408fca622f6099937c58b12bb9f7a9b591b4cd9239d2fac71ef67680d346ce4687e1c708d941b72732170e1a90c6e5e617cebacf5048eb6b128c65dccda3558303460b87b347b0a34b3375b3da8abd8c740f4586e5218a3152c25d894458793792947327cb0577e068a5ef2dc449e45a5d698958fa8075dc85ba5c6bbc2470fcaf2c9b116c9867861886e69646c8a0e44574b4b20ff2c4b986b08786932cd3bb6897ef82b2c7113e6f932a710cf10d4f4075e9851d148d7a23a295a9c432cc29d54fe42f7022e495c9f6eaabe96d804dd3770e9379967b3cbcd0db1a3e7444457fca6b654a88425a5f3db8eb2959488e9ffb4d3ceb9166e1395cbf7c1d75c1de46ce114bb15254ad516697275e3c165af746977a6b456de8eee145340c86e04037fd1ca66d22c3aee51fb0e410fc2f75a7fbd2a9e7a945b3bde2852e3a06e9cb5b6272cabb2ddb6439f286d431008a43fa88512dbc09fa05610b64c6b7751fe0495ba806bcbf4acbb6d4171fe5c8f0a479010af553845386aec34a9f838248f04982b0ed58f3f168f5f39c1eee0f9bb938e54eca4ac139a1888cbc5c7875be9ea94edf74059c1a850b8b171fba6896cf194a0adf03019b801c31a947be348a37fbadafee591a3c934c8b7845eb1bcbc78a0c55a13724370e936e9ea32790f20aced9b82d3615ced781a1f9acbe54125f0cd0e3b10bbd14f1f67e5c5d25a8422bcd746dd8716bba920e77ed234ef267b06f1f0ee9e6b39419c8764e62b149fd2c4c69decde46ec70e0c8274d4dba4b2563a8244fdff0fd4fcbaae6a1082ad68aba938862d2b2328e917894defcd13ff90d8d9bc6f1dbb08099fe555b5e084abdac3b4fa808e45ad765e12271ebe613ab1a506ede1e9b77659b22d54ea56a40f78963009e4371aab859dacdddb66797850cf04420136345f03e55bc069c24382af0f447d0201fb6484e4fe3096d7360222adfec5b4a59fcd7d4759145b7823a039638c61d5d48ae1f4260b6f6d91a29ee7a18506aa6edee6b25da8e7346a5c187af4251dc249aeaa5f858a04d57bd885377f738bb82ffadf458809288cc9921f7af6ec5396881ceb748520ef594e32e78291b7098aecfed5de349411b1660b1c4d00434e8f0cdb495e00b31227d04197c0a34afd48645f9b73dee79cb3591ffa3210a5e78f76416a343a63898379cb2c0896e67571ce92146235d6f55b658ee2365efa257db162686960270cb3f206efa3216b2f65c5fc2e8c67a35633a59ea162bec1bd5b14ad565b79731175e67629b77468d9f18d7cce597822db07d25034c3c341defd2f11a889067c3ff16a5c877d376062290bfbf0d58049c4e81bf7264b7e55f58263e05b84415e68fa1468d8293a7e81c55a380190c760aaf2ffdaa2d86a52725f9e6037eca5e9c7d5340615415032ef5883834022dc41d68d5b2a672e765ee791443a8fdad0af28e2f5505128b4f1cb66a8239d07a63e68ad9dc86ae320419552a519922259ace9fcdd31d2a65955e475a343d9ecccaf6649c8c24c56aa5b78336e33371d25c8845b176b7ef7030466f34c8b4350a286c0bf3bcbe6f97d04bee6dd792412da230a344ddd4f41556dd40c21557c30dfbe99cdfdff332c0cf03903c48d0a3b1edc8821e857f4ebe4f3bfac6af9aa0109d39394235f21c2f00a960524b665d5e2b602981bc1e11dad8fb0ecb8371b387e5c32208616275b3221e0f06ea9725ef7b768734946a8db526c37ef39da4a1da1a648cf9e23e16e594452c8d005cd9f3d954c016c783b71ecac53a893fd642d4866438a18b6a51495cd34f153f80835211ce8adb35d4d151d4c039d2111a7d733e4fa9106a589c4b526c79fe18a27c31315ac0a402cb01c6826ec04319bdbefdb30d14458e5acc6db67183e245da36f66c174d2124e09cbca2603983e3d78cf265e554ded26e665e3669aff1027ffd87191e00ee2234e88b0768fabe5b34758b6fbd4604f6a2a4f9493ece0d76ab38cf3f1e66a0f85cfd6770a48ad636000d912ab9fd141d29a0591dc8335fdc52de47483670d6f4f57b8a9757c64974918abbcd80178270e084007c2fd724f10908b5f8b00242765c948b65187a6fc9d35d9f24dfb0e11fab9579d0fc75c9c8035b380b32c2f45c7eb65d73335e045ae5f35b218ad1e51914c0eb3bba982ca3c866a997867bdd69033ec8507f630fd54cd987ee5f4f4a4d9a8cb6b12ce777d7c95f9359cdf0f09eeceb43336fc21d7e31aef33be089be4f3051a7eda768a64797871d99306155a7e370cf9cacfabb164708fb13d5ecffc897c801ab1b757d2ce08596e4f314aae4e5f9b67aecd4312bd3fa606ea3f7dd74d067eda55d934c587d5a0f590e8b1a2121073a589199034b147702c5a3bbf3c5bdc6a21ef4da6d09a8d36a1a706a73cb0c99d19f8dfcfb13125d06b353292c95638c4bd685c49ddbb5be2ceb71c5f45765f6dadebcf1ec7cb516049f948fe236a91d648ff655c33f6c844b67a6fe36606e6ae5b4cbc224636813f9714574f7e678adb607d486a96ab8431ebc4a0c8e042aee98e64a851b9e564f4c6cb98edd40deb660e660854ea6fa3c55fe7694e4b4da4fb37a2f20851c79a479f7e6c7d32fb5d280885ffdc27958258847fcf65141064e1b6c2830a77d896b0e82d2d2ecc0f92ccda3ebc13a3b999919c99eb022d49ae89cc2e4ee8697a953c4e58e047e0280304c23f4ebecd3a7042bba2e48faa87697ea5c65a1ac09177a0e1d6e541975ee8ebeabdb73dedd810ae41a12c5dfd3627a69035878bd45959a38506e4f3de1326ad03a4e7eff7b119a7625b4414b617dee94b4d0431fd250412eea3276bc97fc5e3f19acca6897b58456220535883e33108d0819cc8bc44dfeaf0464bb1b5f01c788ade82b9e7741b05c2fe21b68ec6103440dcd1dfa3af473119fd3cd7d6f882a6bc7bd6f7724a60c47fd6ffc0539d56a1c7961cf4e21049a6034af57b4904a5420aff0f8e88878b1afabb9da2351e51246b3e76357a86cb3461318e20f6502f18ad60455d46fe4320294feb03bf0fec17d4c07fb97871521887919e8febc61509ac9aa5cc54ff63cad91d67ea26beec464bce511691e829b400b44ec972af91d8592c40be8439134143e7ec3fbfde5bd2a6aa6968926e67d1db907118e769b63268478d5a49eca2b7f2b64183322dbe8e5bd0e80a9d27571091a1d92b61cc86a93f2471d9c9d2c5f9b3d754c97de9e36b6d0b2b0157c0eb749f9ddf8fa4605d52e82e387d63497b8181f6fd88628f9d26715aae33fb1d54863af590fb0cc79add9cad26af8b0f9215e8265c825e265630928b9aaec2c3baaabdc8c5132ae563afa12cf250ebba64f020732e5b823fa2f09eb71145c519c7123f520b1c19cff9b191a3990ce0fec8b709120a7e63a549ad8d55c20f32abf309fbc23dbf01aa65fa8ddd155a192c36b20fe0efe9cd90c14cacae92f793ff370339459a9ad573d6e4cc3b9a78bc2430be23c01952e9d79158aaec26c8872af9fb7e6106a84f429b261162ce0d223bfff47bc6a29e6285f38260b72fe6d4df28f110d2fe31bb453280bd9a8fb5451d7a12c3762173a2db3b2c6f994f327b3173a7d09918fc1866d5ce29143918e9787f3d25bbfbdcc5cc16ed987faa1cc6ccfcf08876eacbab993ca0db693a95f504b4c6e17f1a5702ebb0e61aa0ef13d49f1270c91f921602141a47cb6f22141a1b091cdb111159066bee44313df5bea5cb9555367c24e45baeb82dcf117108c9e01f8a10611889d229f43a9e73734cbc382fd2a445f9d166f64bf629644d4449a36062d0eb92815c685c2d80aad2077a52c239fcf56c28ee72d2dc4bac3d2b7f1f1a31ced6f7cfb936a84223327104ff8768a1efb1f11fb308f03ec8e0397db6da4b234b5964c5b82b6a7fe6811c367e745487861a468e64879fa01d068384e638a9f20e78cd24e0a78b7e4f1ea1219d6ec17ac7124f941344a38458b057c37b8e82b79fbcd8d8ca74497c78828cdb77414a5acd96d4e3468c0e8f3515c9e3f97984efb6c9fa2cf95a178871c363c7cd5c254668baaa8c139984f01a9c7aa8e6aa98c6481dd9000fe57f8742f66089d5059f98babaa0c5b953ced67269bb68f8114d174c33f49773e8c529786d456c161e665a8fb15c25517d0780e7b5130e4c4e4e1808f0d84807cd36ee71b4030008045e2e3ba60ebd76c007fd5a72fbcdc1df52f2ad2b50fe68816361936cf1f23536314993c9e3018fa2e849e5cc4f5203c83e61c3ea3064b4fcb68d848aff6c19b9d446e5890876601e15e85d0beb3562a526546865f4142f35d44c4ebffe17742d4bd347a91392a8c78c57b9d9875d45de2cf54ae075397ba4ad4e607f78eeee6589f128a665182b659a5aef368faf077745c611703537693a0e7f3654fc9ec3126a95c2b50bb5622bdad5130188a8e5376ee8cc8a2e5d574ec5f48959cef5da6a42696f6119f176d5b398ab7c0f59f25442b554b6876691d04157561c767225e511c58e36ff9020a099a082b3034a60cad557d9aa086f0102532221c6d8f79d5ecf07279b16da5c2205024d93c82d1b1111293f4cff15296514393b502191895734896ed21fac9d10bf32730475cbd254c041baac53b53b83ed86bd6908fb8a339ae2b7bdcba76b00e2dfe1d1df391f8a1cb522780a64decc4ba6832f03659834ef2349d49ee28702021ff87bdb7d269e6f0aaa3f78dcc94119bf9a2aee86d4ae800cb73c0028427be3763ea9ed3fb93988d54a8d7c1d4385d580dbfb7d0e236bfecbd067fe99cef8da2b85c9e9e2d76d14791e8fd9fc5cfd9a29e3c4232617a6a2360b1c2e41920ad31ea4d12d3a745d21e2164839d465b0422c1b2857769b4caf104c2999dde2a05f766d10007ffbaad4d89f8853e8fa48290b63f68ac09696113e0274261bf895f27dbeac6fcf923625072500ab16cfdba957f8ae1dad32bab9dbe3d012b868e84b86a2e6b929b2c67e70bd63698395624a279fc8608bea48bf4ff306c1b5323304c54bd0774549d84ba3d38005c36491ef5493f4e1e73d6db8485b31358124e6b9a6298eecc534eb279c5e9ac2f773ea73958cea7e10b35", 0x1000}], 0x0, &(0x7f0000010200)=ANY=[@ANYBLOB='!']) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x0) 13:12:02 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:12:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) set_mempolicy(0x3, &(0x7f0000000040)=0x9617, 0x8) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x2812, r0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:02 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x85) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x0, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000100)=ANY=[], 0x1c) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 13:12:02 executing program 3: r0 = syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000480)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x80b, &(0x7f0000000580)=ANY=[]) getdents(r0, &(0x7f0000000200)=""/208, 0xd0) setxattr$incfs_metadata(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='user.incfs.metadata\x00', &(0x7f0000000140)="ee9475ac34ed593fb85200c2522e4717ca9c7e991f4780ff401f58efc5e9c509fa0397eea6492d9c76eccf6c58c185ffcd0e3a918884945fe53f4413bb99d1e3c53f47d1f46af2a29556db38fb8f3c69ade8396e0eb30dfcb19bf75ef71a9f366cb9b043b2731d2cf395a6c0bb4d2ac58d76971fbce05575f65facc76a835d13aeb562ce44ae70d3f4bee9a061b5b3cc08fa0dbf51c325e2646a4b408dd60d71cc0e2f38430a1c6535cadc6a7507", 0xae, 0x1) chdir(&(0x7f0000000040)='./file0\x00') open(&(0x7f0000000780)='./file0\x00', 0x141042, 0x0) [ 133.303352][ T5] usb 2-1: USB disconnect, device number 3 [ 133.310732][ C0] usbtouchscreen 2-1:0.0: usbtouch_irq - usb_submit_urb failed with result: -19 13:12:02 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 133.350744][ T9703] usb usb1-port1: unable to enumerate USB device [ 133.418685][T10608] loop1: detected capacity change from 0 to 8 [ 133.435962][T10608] squashfs: Unknown parameter '!' [ 133.448152][T10611] loop3: detected capacity change from 0 to 272 13:12:02 executing program 4: perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x34, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x2600009a) write(r0, &(0x7f0000000600)="bb8f9f640903127a53527c6fbfe65d43b0e0586f2d40c7e7df58cac83420e83662d6e39bb6d5430622431454eedeeaee423d8f210bc3525fa7927c18d5fbc91ab13c2041136047d8da9375934d00f325499bfe7712208d387d41c31821c2a22d1325b556528e9b790b74053d1ed631c6ec8126d37c87216173138c00cef396868029af5b76bebac5e38b74d8bbc6ae66b6e202b6d505710377710ea7d43edf00e1a4c1c670bb4c263ce777da81abdd5ba5a5c82f67232f9b4d6f21b2e6afa8b38e4642b0daa2acbc0478d89b88e8b2094d4248855e5e81992e60be3afff0f3c3799350615489a901a659abdeca0c615a622ebf64175f990320e0356d4a11ed62eff72b709c23dd65942e8b534d7d775d370c1e435654a2634e6ee3649c4c3bcbe39e866f1eb9972af1a9cef42e701798a53dc92a242aadbac343e1765cf8ea5665e22deda69777e52b1e9e5d3edc022256939e1eee013448294911139d5b9c6241049fecdf9b31f4cdf6cff65d71b5071ef70e1798347c8846aa5b905e83050e3e606986ed3f603d18c5cdeb11cda1ce3abddea9376231af130e19fc7601ec1ab8cb5a7de9e2174547f18225b09a54fc8720dbb91eb69c1be88e601c3c9df4f2758f39a5151951b9c6dbb419ffd783a34c9fad10f201b8724d31865e2fc1fcf48db2be713053b43a0e3943c1e2b08e8a26e946c439d891db2a80b5ffa054bc8d0177d3214056250c61a537d2ec7630fb90395df2cd6aa9c5e573365db580520bdc3f1c6b2be992e1516a4b810a11935dc780699e461d9715f70c6d103ff49bf168f3cff4c0d0d6ba5671fcd2975450b0e1a3474139cb0f2d3476fcd87a8bccbeb2f5f8a821017b879aa5b9d1fafa9f4c429a74cd2da782114d97bf031746a817dd0293c4eddc3a9ecb5afe496f4971474ccd827449409f07cf94dda2e7dbe8520b5afff10a7e3b0b4289a167fc692635b5b7426d9e771b95860b09a3e752c867213c772e48ba30a78feecc7ff26e63e1749c62b52d377ac5cc52db830c965e04ccfcfb24ceacc69cfdc2094124dd27b2d68f699476a2562bab1de117ffc2b0702ee8b0b77f85fecec3a25b37ab7eb06232c9a73b4470f1727c82581d81942abf42d3ea37957927ad3dbd0ebe46678a9f4d25c47acaac83c14210a54b71fed40df017e2be27f01e3e6ea3ea381ca14efd202858e6535ad4f79a8cdf47e385b740a70c14e3651731a45cc0ca4a56f2e903cad0384efcc364caf67e09551d35c682ebc90a9286c4d274ba1b8ced742ede4e55a62db7ef9a96fde2add05b41599fd72a79ba280cc125cb266ef21b7eeafe3ee6aa78eef33fc66454549c3ec298cb683a55a32208cf6ce88b560166159d59e65f30540f62c5437652ea7f2a02f87ca242dd2250f58e75938a9a3ded51ae6598c2aba53287ff5cdaab17be7f4310f8e07e310d52778de79e1c2e4391b254be38910aa1cf6e1ca0e75d24be97d59f7025f16c6fbd549529b74e319c58f50438765ef0e3dc394eeb75dec41b3d80435b17520c97f5cd7ee692fb86d188fb0089fbf737dc1b96b9cc49be23a38a8cd92e5075f349993d7866369dd25eccbe1481477a05fee14e0edd1617921d7fcaa8fdc642e63b64388fa5b63442ff1466b1938d02546750b01ed9c980282ccbe10f204741249aed88c555ed6fdf7f68af9209807a71bbf4f31bef5a4223466da74ba8b034df529aef6ec6610a0d25973961e50e02af22d0ca8be1b9804a5918acbdb536e8f2f441ec9d640ed15133ee747440c86fc4526c9195954528673d25c8390170f3c19cb0b0c30b9e634c7ebae96946ae97c19eabca92226da925d22be37abbe0740938ea899ec42fd529a3b1063981e4c154219df5cf5af60a29b5a8ee530905725a14b28900eae937e705401ba8f632a7bca00d9724a992afdc9ed14aac71b8e3a7ee5ca095888feb195b4e083c3b611a1c2f8d092febe3b9f5f0df61e8d3c31a643c935b76bc1ad4265164e755484beb06610510bc51e8c6da8d71123bbe83a5e4128f41cf5c486d6a60496c300c406f990bee485cbdef794f2663ee66d2b18d8e55210c25c04b1a0c6d9c5f904e72806d2d4f5e5439bcdf146343cdffe4d0d70d42a9959cff9bd50c37cd478b0b0add16aae4dc839b46bca2ac7547144b6a422aed5e2db661bcb31a82bc0fc678e71a6cb090ef772860f3008b4152b5d281033be4a77b367baec3ab8ce7c83c601b11c8199bafcd15161a5454a6a982dbc3c2e3a5172b6a63e4904817075754eccbb0188c9cb2e5da9600f567485014887463b40f189b7ec3c5c0f36d502509e402c285765c78417ce6b3aab130ee79622dcd8ada842233e73a14554ee5e4995e32b3fe4075e247eb9bdeef64d1a7436c9b5782fb2f84f74e4c6e976289729c37b5bb8200a9480d181a6b11f5ec229b818134b8334967ae935ac1d81be4776fae4cb68b6fa330e93bd8de388b38455d569159bcd166df030a6dfedf28caf4608de7243f5df2c76f6680c301d819dc67d24d2f780432a931700a253b0a5b075195c6dbfd1fe17a1c11a3dffa872a07b877adc66d069fffb6d8326e1998c5a337c3d530250cae335ceffcf81dc438a47e73490d050a053813dbe6674e42c91ae94b4a88144f36adc1b08b4bcd6ddf4058c4e08d4dc83d5fbd843ee27eaf50b297c220350260d9abbeeb6deb921e50cae0ea590cfb6f00fb3c71520f565bb769705e2481ef27cf537d29f163c9fe3d39ed9fd18dc8b0c976cd302283e430807a9d751357f89092532d89fe280c69ad36e3541b5da9dea13fd19d0434c760fe295dfd9b9e63453c7853914c50b1b77ccd4b33c8b1f31fcb1aec040ffe2f9d728d8ea84297bac2e22230ebd1488c503b05b2e433cc37ce9fc123b7d3eb244b4549e9a841e73b664c8f6621ea5a4c9ff9c1da032255311f2c063a682baf4c97e7ba552bf71af4bd64f43872b846d15c65c487089be272cfa24a33f8c50930ea0bc4b089505fb8e9e688d35a978813c38add66548d7575727ded0e7e64a5ce897da6b940df4c3dddb8b4871d773f6ebf02058518c55c19aadb0f266caf18777ae68d2bfcfb2225961fcd10538ba664fd053a443320072707533ab761b9397bd0559126b84fe9196463ae50633017ea2d80940311d9c867102b1017f34af1965d8eb61be616a0d40656e2bbb750aee6f74f788c8acb2578e8686f5f8da6a19e979c152b7ee7c7f16902120588e2ff630144b5f929ffc593e946d9717c5968aa16c2d73d689fb5cce117acda3e23e5e0116de1cb6bddfa1a84cefb22c1e2c3753017696f27b9aec5d44f15411247643b84dd4410e784b4eb5b9c68fea671976f9b51c6526e2ddb40659611b0b3bcc7e249c77396fdb8c864ea9318f9de7fd3936fcbdc732c2f8b9556ec9afeb15d5e2df890351d66074d53dddc6e8dba8c91d733623ac95a49eb69c7de37ff2364ccddb01f6500750a012c2acf32a9f6bbd9e92d17ef858fbc34575db414ea42ad87a65b11ae5506469db256c421328f45aec73bdf18562447dc2840bbe9fc84dedd0fe6276fa174f21210d40193530ec7a70a9e60bfd6b00cba4d483be59950f16fa0dbd089b5fd0bb078badfcf42270cc62fe37be22b0d81f755263d74636fa466d2574ca62b58c649936d21e949de73ea45df3acade6609413f56fc218d6f11947bf1fd629d38d8acce90ee3c1a51117601ae126bec537e3e76ce7ecc53cfeefee8aaa104aa853a65aadf27bac9849ee0122793b11cd8e4f32fb07afa39e439cb738c30a6df958160aac15c26032a61aaf614b2e6601581fb0ab8d115e045005dee3df8ea42643cbcbb0b111130c42c94b7e874cfee50d5c2eb13b3a38c417fce9d740b7d43120431a7d44bc3934ee87b112401cbee3553837b6a0b4b3faaceb46eca4064301c8060870350e256ac9d5557f674536b9d9717a82fa211e7dfb52ca410d8a4f2f6b733c2a082f247538a6c40f56cf64204e62515db692f32733ff6f4b0787ef305d5e80881375467ae603ac3600e688c42f89a4fea4fdda09a8d59e19457c654a98c8129a8c65bae3310af2b170729e18400c915d0a2f4c4fc51747846630b95ec181228bda7ef48ad389815aa82de6c4a3b0746c28c01f9ec697ff17f095e1cf9d2fe78fdab9cbb1ca7aefc8af6a0cd98444735fad79e394a8f9c2fd358c3cde4ca6d57a620d0bb52dc6ff93f034b596f407c21511cc2c5ec8b0ede7f5c0acca61939ac7f2cad820c15133e69507eaa739e9a88936f4a74f0ad1574a1591f31f582a76157d89805cb3ba5e8d10509bf7a08e928653b4f05ba797a06765b74c8759fc34178624c08a2b99e59bcff5d33af2b0f9176b56c35f4da31c751a4c2fd88a1997cd9fc9bbf78220731d4c8cea23be1fd29c36b34d8458b7021ebcfafdc7e54096e517da3eb684298f742532d776164d9c9658e5faca0a3b08afca1bc27ed357884f49fe51bd0c38057f4288f1917e36e3865310b5eed140aef6150ae363293cf7467abd5e06cd7af5e2c49e7c5253a1155741e380bccb023a0faed93d9a64512d72436f1ef4ac0904a413e45164c23413bd57274a0a951c41a9a43aed094d4ea5c480ce64663cc9d36723179e2b19a48e9277a6591bbd888a06e0f2f142cd4495be4ba7274d69ba32a2788b935b2f18c5f336cb9de062829e2e0bb476efb36c3f53a766c14314f31637a464ac59d378ad7f51bef8d88715613653a427038e0d3e4dc3948bb1d70eb55c91c92f7510b1c0387253b458d2c90d17238f9eb239c680179a6c1e0759be367963e3b4d7395fd3911626582a094e6a8d0e746242f94267a4c57d5b2360ce3a6f7f3e3c10e124a54ed24d1585bc7b731cf731c94ee00ebf070b999b9bf28d76bfec9dcf12fcce2b9c4444c706ec6b943b5f39e9151a764ba1cd0cd6c1c7cdc3aa824cf17da705be27a18fbee41be39d6ae4dd4312f5f4bfee2c5bb21d941666f9d79b0f80c9b1bace84a05d2b0e3be1c3fd04d72b4b0124595c435813969d413960fddc858730a433383f3bc0472cb7683ea569e001f", 0xe00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x12000) 13:12:02 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="c800000010001fff000000000000000000050000", @ANYRES32, @ANYBLOB="0000ea6de27388aaf265da001000010069700002001400060000000000000000000000ffffe0000002000000000800ffac1e010108000300000000000400122000"/74], 0xc8}}, 0x0) r0 = socket(0x10, 0x8000000000000003, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x24200, 0x0) splice(r0, &(0x7f0000000000)=0x1, r1, &(0x7f0000000140)=0x1f, 0x3bb0a92d, 0x3) sendmmsg(r0, &(0x7f0000000000), 0x249, 0x0) 13:12:02 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:12:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) set_mempolicy(0x3, &(0x7f0000000040)=0x9617, 0x8) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x2812, r0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:02 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0), 0x10000000000000cb, 0x0, 0xffffffffffffff69, 0x20000001}, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xf, 0x6, &(0x7f0000001100)=ANY=[@ANYBLOB="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"/330, @ANYRESHEX=r1, @ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x8, 0x2, 0xfffb}, 0x10}, 0x78) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x10, 0x0, 0x1, 0x0, 0x0, 0x81, 0x200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x0, 0x32b3b131}, 0x0, 0x3, 0x210, 0x0, 0x0, 0xfffffffc}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) close(r2) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x48000) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000100)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000c00)=[{0x0}, {&(0x7f0000000900)="48d3a73be652ad9e7a9bac93adcd68cb1fc646a5959abbff73e5527604ecf6483fd8ff4258855d1f45f042158ae94a725167221a134057a41ec7b148a1889a946f01422449e111c424f9d9eeda9f61bd0b51a77364fd901d6a3d98062f3281455957c325e8d549232bc87c201e1545d0b3c792887996f6a9a81f22ed031788845c8836", 0x83}, {&(0x7f0000000780)="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", 0x102}, {&(0x7f0000000ac0)="c2e8ea0bfdcef130b4b951aba05feb9ca23583079fa0c4075114a575d31998239f9db4736ee6c55bec7622b5bac5828b7d7a108b36ab8aa1f08c7ebfbf9e2dd1267c268d515c953b56f7474bbd34e45613f9092eab52e651a81bea2e2b51b0ac0d", 0x61}], 0x4}, 0x20000000) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_type(r4, &(0x7f0000000000)='threaded\x00', 0x248800) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@nameseq={0x1e, 0x1, 0x0, {0x43, 0x4, 0x4}}, 0x10, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x40}, 0x4008050) socketpair(0x18, 0x3, 0x0, &(0x7f0000000480)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 13:12:02 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x300000000) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000180)=ANY=[]) write$vhost_msg_v2(r0, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1, 0x2}}, 0x48) r2 = dup(r1) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x0, r2}) connect$l2tp6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @private1={0xfc, 0x1, [], 0x1}, 0x7, 0x2}, 0x20) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x4, &(0x7f0000001240)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d00002000400000026010f00000000000602000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd010000000000000100000000000000dc01", 0x200}, {&(0x7f0000000140)="9ae5cbfbf5734bafc7eba82743828ff3833241cabb2dc83349e0f6869a142ed144e655cca03e37b88a6a61b0c81f0ba9101c4fcf5b4f10f8e7461c1ffb6859a62df8b6de4183fbffc16702818b2cbaa08e4fb6191a93c6eebe0d33f8c1dcf419118874ea9f9734", 0x67, 0x7}, {&(0x7f00000001c0)="08d8a6226b53af20b84fdc0456228a915465826078194370", 0x18, 0x11c}, {&(0x7f0000000240)="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", 0x1000}], 0x0, &(0x7f0000010200)=ANY=[@ANYBLOB='!']) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x0) 13:12:02 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 133.767034][ T36] audit: type=1800 audit(1616850722.544:7): pid=10638 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=13970 res=0 errno=0 [ 133.810749][T10643] loop1: detected capacity change from 0 to 8 [ 133.812909][T10648] netlink: 168 bytes leftover after parsing attributes in process `syz-executor.0'. [ 133.846880][T10643] squashfs: Unknown parameter '!' 13:12:02 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:12:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) set_mempolicy(0x3, &(0x7f0000000040)=0x9617, 0x8) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x2812, r0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:02 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:12:02 executing program 0: unshare(0x6c060000) socket$inet6(0x10, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) r1 = socket(0x2b, 0x3, 0x2) sendto$inet6(r1, &(0x7f0000000080)="2febc6098c55a5136ee4aafcd78c42ea2ceb363b74140f6aedf75eb59c21f0ded66d7985366c72456c26a4f17cf682c313622625aabd576b0d3b341853ce0691ef2180cdc84f0f5e79dd452ba11db4dcf826ab655f3ced28d7999f37b8f7d3b5d1b912b60eae60754b4dca0d672f25c0a22bf3304364431eccf4b3ebbbaf183a1946fcbcd033a3836300e1bf42497d5b5fd6732f65cf2dbaf05464bea36c0a79590287093f6affdb7e49e786f1824744", 0xb0, 0x20004004, 0x0, 0x0) listen(r0, 0x5) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) recvfrom$inet6(r2, &(0x7f0000000000)=""/35, 0xffffffffffffff13, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r3 = accept4(r0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) sendto$inet6(r3, &(0x7f00000001c0)="6e670f7df1a11db3692639a4e454e676c247ffa637824626bb966f11f09a403fff362d3b4eacbba549a4d5a0d1239ce5c1ae64ad78b6e7d12cbd463c3f290acd17ad231310937c2eefc4eb0500d50f5ce2ffd1f7371e7174cc1d440767de42ac37dd1eb389cf4f64832f0f4f03560cf245495a565c119df89a6d66602985fe010ed060467181", 0x86, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000400)=@nat={'nat\x00', 0x1b, 0x5, 0x630, 0x490, 0xf0, 0xffffffff, 0x490, 0x0, 0x560, 0x560, 0xffffffff, 0x560, 0x560, 0x5, &(0x7f0000000140), {[{{@ipv6={@rand_addr=' \x01\x00', @private2={0xfc, 0x2, [], 0x1}, [0xff000000, 0xff, 0xffffff00], [0xffffff00, 0x0, 0xff0000ff, 0xffffffff], 'vlan1\x00', 'veth1_to_team\x00', {0xff}, {0xff}, 0x73, 0x1, 0x1, 0x32}, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@private1={0xfc, 0x1, [], 0x1}, @ipv6=@ipv4={[], [], @empty}, @gre_key=0x101, @port=0x4e23}}}, {{@uncond, 0x0, 0x100, 0x148, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x2, 0x2, 0x1}}, @common=@ah={{0x30, 'ah\x00'}, {[0x4d5, 0x4d6], 0x0, 0x7, 0x2}}]}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x6, @ipv6=@private0={0xfc, 0x0, [], 0x1}, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x7}}}, {{@ipv6={@private1={0xfc, 0x1, [], 0x1}, @private0={0xfc, 0x0, [], 0x1}, [0xffffffff, 0x0, 0xff000000, 0xffffff00], [0xffffff00, 0xffffffff, 0x0, 0xffffff00], 'netpci0\x00', 'syzkaller0\x00', {0xff}, {}, 0x3a, 0x0, 0x2, 0x1}, 0x0, 0x210, 0x258, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x2, [0x2, 0x7], 0x7ff, 0x30, 0x3, [@initdev={0xfe, 0x88, [], 0x0, 0x0}, @private1={0xfc, 0x1, [], 0x1}, @mcast2, @private0, @remote, @dev={0xfe, 0x80, [], 0x32}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private1={0xfc, 0x1, [], 0x1}, @ipv4={[], [], @broadcast}, @mcast1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @local, @local, @mcast2, @mcast1, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x39}}], 0xb}}, @common=@ah={{0x30, 'ah\x00'}, {[0x100, 0x4d3], 0x800, 0x5, 0x1}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x10, @ipv4=@dev={0xac, 0x14, 0x14, 0x39}, @ipv6=@dev={0xfe, 0x80, [], 0x2d}, @port=0x4e23, @icmp_id=0x65}}}, {{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', [0xffffffff, 0xff000000, 0xff000000, 0xff], [0xff, 0x0, 0xff], 'team_slave_1\x00', 'tunl0\x00', {0xff}, {0x1fe}, 0x32, 0xbd, 0x0, 0x4}, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x3, 0x5}, {0x1, 0x8f, 0x6}}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x690) [ 133.850287][ T36] audit: type=1804 audit(1616850722.574:8): pid=10638 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir354286546/syzkaller.UkUAnz/14/file0" dev="sda1" ino=13970 res=1 errno=0 [ 133.884017][T10651] netlink: 168 bytes leftover after parsing attributes in process `syz-executor.0'. 13:12:02 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:12:02 executing program 4: syz_emit_ethernet(0x46, &(0x7f0000000040)={@local, @broadcast, @val={@void, {0x8100, 0x3, 0x1, 0x1}}, {@ipv4={0x800, @tcp={{0x8, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x6, 0x0, @local, @private=0xa010101, {[@timestamp={0x44, 0x4, 0xb0}, @rr={0x7, 0x3, 0x9}, @generic={0x82, 0x4, "8beb"}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) syz_emit_ethernet(0x26, &(0x7f0000000000)={@multicast, @random="d325401568b7", @val={@val={0x9100, 0x0, 0x1}, {0x8100, 0x7, 0x0, 0x4}}, {@can={0xc, {{0x1, 0x1, 0x0, 0x1}, 0x8, 0x3, 0x0, 0x0, "fc7ec5835954d50b"}}}}, 0x0) 13:12:02 executing program 3: r0 = mmap$IORING_OFF_SQ_RING(&(0x7f00009fa000/0x3000)=nil, 0x3000, 0x4, 0x50, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r0, 0x0, &(0x7f0000000000)=@IORING_OP_WRITE_FIXED={0x5, 0x2, 0x4004, @fd, 0xffffffffffffffff, 0x7fff, 0x100, 0x8, 0x1, {0x2}}, 0x9) syz_io_uring_setup(0x2ba6, &(0x7f0000000440)={0x0, 0x6fce, 0x0, 0x1, 0x112}, &(0x7f000040b000/0x1000)=nil, &(0x7f0000578000/0x14000)=nil, &(0x7f00000002c0), &(0x7f00000004c0)) mkdir(0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a010d0000000000000000000000040004800900020002000000000000000900010073797a300000000008000340000000011400000011001b00"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000340)={&(0x7f0000000200), 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="30000000040a01080000000000000000030000041c0008800c0002400000000000000c4c0c000140000000000000bd3dbdb6b1f03236100b40568a06a6b5b92619491a1da4f1d2417035f46d7af9b17913ca9d7850b03fa3f6dedcaf34665ff614305f85b8290dfe9a78c66a314133596ae5223ab9141b0702b18befeb432eb145aa00ad8907622108eca4959115af94"], 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x40) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x110010005) 13:12:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) set_mempolicy(0x3, &(0x7f0000000040)=0x9617, 0x8) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:02 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = syz_mount_image$v7(&(0x7f0000000380)='v7\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001540), 0x0, &(0x7f00000015c0)=ANY=[@ANYBLOB='\x00']) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r2, 0x40000000af01, 0x0) preadv(r1, &(0x7f0000000600)=[{&(0x7f00000001c0)=""/209, 0xd1}, {&(0x7f0000000300)=""/124, 0x7c}, {&(0x7f0000000400)=""/165, 0xa5}, {&(0x7f00000004c0)=""/236, 0xec}, {&(0x7f00000005c0)}, {&(0x7f0000001600)=""/4096, 0x1000}], 0x6, 0x3, 0x3) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000100)) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f0000000180)=ANY=[]) write$vhost_msg_v2(r2, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1, 0x2}}, 0x48) r4 = dup(r3) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000000)={0x0, r4}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=ANY=[@ANYRES64, @ANYRESDEC=r1, @ANYRES64=r4]) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000100)=0x1d) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000000180)=ANY=[]) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1, 0x7}}, 0x48) r5 = dup(0xffffffffffffffff) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000000)={0x0, r5}) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, r1, r0, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, r5, r3], 0x9) 13:12:02 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 134.023215][T10671] IPVS: ftp: loaded support on port[0] = 21 13:12:02 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000080)=""/4) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0xfe, 0x0, 0x0, "7288ee3559ac7338e28d3b4a6fe740f99becf5ff8b839a9153463481c03e08b0"}) 13:12:02 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:12:03 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 134.170288][T10706] VFS: could not find a valid V7 on loop1. [ 134.189069][T10671] x_tables: duplicate underflow at hook 1 13:12:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) set_mempolicy(0x3, &(0x7f0000000040)=0x9617, 0x8) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:03 executing program 4: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r2, 0x40000000af01, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000100)=0x300000000) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f0000000180)=ANY=[]) write$vhost_msg_v2(r2, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1, 0x2}}, 0x48) r4 = dup(r3) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000000)={0x0, r4}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000080)}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='dctcp\x00', 0x6) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x172) mmap(&(0x7f0000331000/0x1000)=nil, 0x1000, 0x1800006, 0x110, r5, 0xffffd000) preadv(r4, &(0x7f00000004c0)=[{&(0x7f0000000200)=""/11, 0xb}, {&(0x7f0000000300)=""/142, 0x8e}, {&(0x7f00000003c0)=""/153, 0x99}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000000480)=""/58, 0x3a}], 0x5, 0xd9f, 0xfffffffe) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20008000, &(0x7f00000001c0)={0x2, 0x4e23, @remote}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) [ 134.220239][ T36] audit: type=1804 audit(1616850722.994:9): pid=10690 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir170259973/syzkaller.DfBZup/13/cgroup.controllers" dev="sda1" ino=13993 res=1 errno=0 [ 134.247919][T10690] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.3'. [ 134.562706][ T36] audit: type=1804 audit(1616850723.344:10): pid=10712 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir170259973/syzkaller.DfBZup/13/cgroup.controllers" dev="sda1" ino=13993 res=1 errno=0 [ 134.603154][ T36] audit: type=1804 audit(1616850723.344:11): pid=10690 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir170259973/syzkaller.DfBZup/13/cgroup.controllers" dev="sda1" ino=13993 res=1 errno=0 13:12:03 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000002c0)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000003000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_unix(&(0x7f0000000200)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000280)={'trans=unix,'}) 13:12:03 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:12:03 executing program 1: r0 = syz_usb_connect(0x0, 0x34, &(0x7f00000000c0)=ANY=[@ANYBLOB="12010000b1c51f0102030104"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) r1 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x21, 0x5d, 0x4b, 0x40, 0x6a5, 0xd800, 0x8712, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xf9, 0x30, 0x5d}}]}}]}}, 0x0) syz_usb_control_io$printer(r1, 0x0, 0x0) syz_usb_control_io$printer(r1, 0x0, &(0x7f0000001cc0)={0x34, &(0x7f0000001d40)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r1, 0x0, 0x0) syz_usb_control_io$hid(r1, &(0x7f0000000840)={0x24, &(0x7f0000000740)={0x0, 0x1, 0x78, {0x78, 0xb, "39790b2e55a8b6954fc12f84d34dcc13866fd21fd347fde4097d5eaab6ad05aa36beeccacfdab4517edfe02f5c56dd17233ef33b48ed18e75188777f2607d6c57adeb8a61d1bf29fa1d4d2b6493fab8db0231ff1bb30b3d939873790151795a098add0e3fff0544ba6241d80df3cbf442bfc0a07f239"}}, &(0x7f0000000100)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x43e}}, &(0x7f00000007c0)={0x0, 0x22, 0xf, {[@global=@item_4={0x3, 0x1, 0x3, "7282b1e7"}, @global=@item_4={0x3, 0x1, 0x3, "8da8dc56"}, @local=@item_4={0x3, 0x2, 0x4, "956f7ea7"}]}}, &(0x7f0000000800)={0x0, 0x21, 0x9, {0x9, 0x21, 0xf7ca, 0xbd, 0x1, {0x22, 0xb0b}}}}, &(0x7f0000000a40)={0x2c, &(0x7f0000000880)={0x0, 0x0, 0x90, "d976faa7da89b42091e60efb484f829bb200aa768b60cb3420711f3e62f032fa0b686ba4e3ef992e829efe465b09bf95ea3123e8c32c564ccd30f13a520cc9229030e0f681b2bce0523f763358d3badd4cb712af253bc4e3b465282b0c10fce2cec4ce34f7dd6b3078bbf2dfc117aea44b66994162ad83504b4a455c4fe97c4ca7896a274127db67927e35cb81e205aa"}, &(0x7f0000000940)={0x0, 0xa, 0x1, 0x75}, &(0x7f0000000980)={0x0, 0x8, 0x1, 0x5}, &(0x7f00000009c0)={0x20, 0x1, 0x25, "34b967f6eca723d0c7a71f3046d0c58d692188d367b1357c10e6e8706537565046e5ec651e"}, &(0x7f0000000a00)={0x20, 0x3, 0x1, 0x81}}) syz_usb_control_io(r0, &(0x7f00000001c0)={0x2c, &(0x7f0000000000)={0x40, 0x30, 0x5e, {0x5e, 0x30, "bbfd309cb9664195fed726b1323542be08d2e3193feeca3d5323652227fbab8d8b7eef885a001ee5b3534870eaece748162a7b2c507d8d3066f434b66a16f7271de050dcdfeebc47fc05aa5dc324fd941d92509a4d8ec170801bd3eb"}}, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x813}}, &(0x7f00000006c0)=ANY=[@ANYBLOB="00680f05000000050f050000280d62848fdfb00257dabdba47b8263abb2a1cb8ed138a15d70b00ca39188647c9a34c735eb608101f50c5345d66b75cb3706aea420343119889b1784a3117c05b596c"], &(0x7f0000000140)={0x20, 0x29, 0xf, {0xf, 0x29, 0x1, 0x60, 0x6, 0x7, "99962615", "92a107e1"}}, &(0x7f0000000180)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x9, 0x0, 0xff, 0x2, 0x0, 0x401, 0x4c}}}, &(0x7f0000000600)={0x84, &(0x7f0000000200)={0x40, 0x15, 0xa, "6ac27094877bcde0b1d7"}, &(0x7f0000000240)={0x0, 0xa, 0x1}, &(0x7f0000000280)={0x0, 0x8, 0x1, 0x20}, &(0x7f00000002c0)={0x20, 0x0, 0x4, {0x1, 0x2}}, &(0x7f0000000300)={0x20, 0x0, 0x4, {0x10, 0x2}}, &(0x7f0000000340)={0x40, 0x7, 0x2, 0x2}, &(0x7f0000000380)={0x40, 0x9, 0x1, 0x4d}, &(0x7f00000003c0)={0x40, 0xb, 0x2, "1978"}, &(0x7f0000000400)={0x40, 0xf, 0x2, 0x800}, &(0x7f0000000440)={0x40, 0x13, 0x6, @local}, &(0x7f0000000480)={0x40, 0x17, 0x6, @dev={[], 0x41}}, &(0x7f00000004c0)={0x40, 0x19, 0x2, "8c3a"}, &(0x7f0000000500)={0x40, 0x1a, 0x2, 0x3973}, &(0x7f0000000540)={0x40, 0x1c, 0x1, 0x20}, &(0x7f0000000580)={0x40, 0x1e, 0x1, 0x8}, &(0x7f00000005c0)={0x40, 0x21, 0x1}}) 13:12:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) set_mempolicy(0x3, &(0x7f0000000040)=0x9617, 0x8) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:03 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e20}, 0x6e) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000000)) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0x8) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r5, 0x40000000af01, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r5, 0x4008af00, &(0x7f0000000100)=0x300000000) ioctl$VHOST_SET_MEM_TABLE(r5, 0x4008af03, &(0x7f0000000180)=ANY=[]) write$vhost_msg_v2(r5, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1, 0x2}}, 0x48) r7 = dup(r6) ioctl$VHOST_NET_SET_BACKEND(r5, 0x4008af30, &(0x7f0000000000)={0x0, r7}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000000c0)={0x200, 0x4, 0x4, 0x20, 0x7, {}, {0x4, 0x1, 0x7, 0x1, 0x5, 0x5, "6c120919"}, 0x0, 0x4, @fd=r4, 0x9, 0x0, r7}) 13:12:03 executing program 3: syz_emit_ethernet(0x52, &(0x7f0000000000)={@local, @remote, @void, {@ipv4={0x800, @icmp={{0xa, 0x4, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x1, 0x0, @dev, @private=0xa010102, {[@timestamp_prespec={0x44, 0x14, 0x10, 0x3, 0x0, [{@broadcast}, {@multicast1}]}]}}, @dest_unreach={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}}}, 0x0) syz_emit_ethernet(0x5e, &(0x7f0000000080)={@broadcast, @broadcast, @val={@val={0x9100, 0x0, 0x0, 0x4}, {0x8100, 0x6, 0x0, 0x2}}, {@canfd={0xd, {{0x0, 0x0, 0x1, 0x1}, 0x29, 0x2, 0x0, 0x0, "9f0821b425edc0e5d5c1d5a9dfc1b520a10a4f41539bceaebcfff48754346cea13994a9c9ed97c8603740531ed4a73694babb4b6c08469bc2c2d2d94cfbadf5e"}}}}, 0x0) syz_emit_ethernet(0x11fa, &(0x7f0000000100)={@multicast, @empty, @val={@val={0x9100, 0x3, 0x0, 0x3}, {0x8100, 0x2, 0x1, 0x2}}, {@mpls_mc={0x8848, {[{0x8}], @ipv6=@icmpv6={0x4, 0x6, "c23fbd", 0x11b8, 0x3a, 0xff, @private2, @mcast1, {[@routing={0xff, 0x8, 0x2, 0x9, 0x0, [@private1={0xfc, 0x1, [], 0x1}, @dev={0xfe, 0x80, [], 0x2d}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01']}, @routing={0x2, 0x10, 0x1, 0x1f, 0x0, [@mcast2, @private0, @private1={0xfc, 0x1, [], 0x1}, @mcast1, @private1, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2]}, @fragment={0x3a, 0x0, 0xfd, 0x0, 0x0, 0xc, 0x65}, @srh={0x11, 0x4, 0x4, 0x2, 0x42, 0x70, 0x6, [@private1, @local]}, @hopopts={0x2b, 0x6, [], [@padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @private2}, @jumbo={0xc2, 0x4, 0x3}, @ra={0x5, 0x2, 0x1000}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, [], 0xe}}]}, @dstopts={0x33, 0x0, [], [@pad1]}], @time_exceed={0x3, 0x1, 0x0, 0x4, [], {0x3, 0x6, "8e507a", 0x70b7, 0xb5, 0x1, @mcast2, @rand_addr=' \x01\x00', [@routing={0x0, 0x2, 0x0, 0x40, 0x0, [@loopback]}, @routing={0x87, 0x2, 0x0, 0x80, 0x0, [@mcast2]}, @fragment={0x4d, 0x0, 0x2, 0x0, 0x0, 0x1f, 0x64}], "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"}}}}}}}}, &(0x7f0000001300)={0x0, 0x3, [0xdbb, 0xba0, 0xfb1, 0x10a]}) 13:12:03 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:12:03 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r2, 0x40000000af01, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000100)=0x300000000) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f0000000180)=ANY=[]) write$vhost_msg_v2(r2, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1, 0x2}}, 0x48) r4 = dup(r3) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000000)={0x0, r4}) getsockname$packet(r4, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="480000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000010001280e9cde3491f7893730dfa5b3883a963d49c02800800050005b115186bd87f859633e1081305b3d87c51f3d1", @ANYRES32=r5, @ANYBLOB="0a000100a2021102046f0000"], 0x48}}, 0x0) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0)='l2tp\x00', r1) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x30, r6, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000040}, 0x16) 13:12:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) set_mempolicy(0x3, &(0x7f0000000040)=0x9617, 0x8) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:03 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000600)="4c000000120081ae08060c0f006b3f007f03e3f700000000000000ca1b4e0906a6bd7c493872f74a375ed08a56331dbf64705465ce960169381ad6e747033a0093ba446b9bbc7a0600000000", 0x4c}], 0x1}, 0x0) socket$kcm(0x29, 0x7, 0x0) 13:12:03 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:12:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) set_mempolicy(0x3, &(0x7f0000000040)=0x9617, 0x8) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:03 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000140)={0x5}, 0x10}, 0x78) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x4e21, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000180)=[@ip_retopts={{0x30, 0x0, 0x7, {[@timestamp_addr={0x44, 0x1c, 0x10, 0x1, 0x0, [{@multicast1}, {@empty}, {@dev}]}, @ra={0x94, 0x4}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @broadcast, @broadcast}}}], 0x50}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001f00)={0x18, 0x1, &(0x7f0000000e00)=@raw=[@alu={0x4, 0x1, 0x8, 0x2, 0xa, 0xffffffffffffffe0, 0x10}], &(0x7f0000000e40)='syzkaller\x00', 0x3f, 0x1000, &(0x7f0000000e80)=""/4096, 0x40f00, 0x1b, [], r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000001ec0)={0x0, 0x3, 0x8, 0xffffffff}, 0x10}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) bpf$BPF_PROG_ATTACH(0x16, &(0x7f0000000040), 0x14) 13:12:03 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 135.046981][T10770] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 135.062976][T10770] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 135.122131][T10781] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 135.149502][T10781] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 135.210632][ T3582] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 135.400644][ T3582] usb 2-1: device descriptor read/64, error 18 [ 135.670635][ T3582] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 135.860581][ T3582] usb 2-1: device descriptor read/64, error 18 [ 135.980598][ T3582] usb usb2-port1: attempt power cycle [ 136.690529][ T3582] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 136.781476][ T3582] usb 2-1: Invalid ep0 maxpacket: 1 [ 136.931628][ T3582] usb 2-1: new high-speed USB device number 7 using dummy_hcd [ 137.020703][ T3582] usb 2-1: Invalid ep0 maxpacket: 1 [ 137.026078][ T3582] usb usb2-port1: unable to enumerate USB device 13:12:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53eff0059f84a38d8c998984d97e9db8aad0da64e88fc68ebedb4ab2a1b2a86441cf3a93004414928734bec239bf", 0x66, 0x402}], 0xc8824, &(0x7f0000000240)) 13:12:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) sendmsg(r1, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d2c}], 0x1}, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x140, 0x0, 0x240, 0xffffffff, 0xffffffff, 0x310, 0x310, 0x310, 0xffffffff, 0x4, &(0x7f0000000340), {[{{@ipv6={@private1={0xfc, 0x1, [], 0x1}, @private2, [0xff, 0x0, 0xff], [0x0, 0xffffff00], 'vxcan1\x00', 'vcan0\x00', {0xff}, {0xff}, 0x5e, 0xbe, 0x1, 0x2}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e6b2"}}, @common=@frag={{0x30, 'frag\x00'}, {[0x8, 0x9], 0xffff, 0x18, 0x1}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xffb258e, 0x0, 0x2, 0xfff, 0x80, 0x7fffffff, 0x400, 0x1]}}}, {{@ipv6={@loopback, @empty, [0xff0000ff, 0x0, 0xffffffff, 0xffffff00], [0x0, 0xffffff00, 0xff, 0xffffffff], 'veth0_to_hsr\x00', 'tunl0\x00', {0xff}, {}, 0x16, 0x9, 0x0, 0x5b}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x4d6, 0x4d2], 0x4, 0x3, 0x2}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x440) dup(r2) close_range(r2, r1, 0x2) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/113, 0x71}, {&(0x7f0000000100)=""/222, 0xde}, {&(0x7f0000000200)=""/149, 0x95}, {&(0x7f00000002c0)=""/105, 0x69}], 0x4, 0x9, 0x84) 13:12:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) set_mempolicy(0x3, &(0x7f0000000040)=0x9617, 0x8) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:12:06 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000840)='net/anycast6\x00') preadv(r0, &(0x7f0000000b00), 0x0, 0x0, 0x0) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000080)=0x21, &(0x7f00000000c0)=0x2) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', 0xffffffffffffffff) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2e, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000001000008000000d2420000120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e31333638353234303200"/192, 0xc0, 0x400}, {&(0x7f0000010100)="0000000000000000000000008395006fb905454792d9f392427055b7010040000c00000000000000d6f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000040000003700000000000000", 0x40, 0xdf42}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010500)="ff030000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d6f4655fd6f4655fd6f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d6f4655fd7f4655fd7f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000010f00)="2000000098a2e27a98a2e27a00000000d6f4655f00"/32, 0x20, 0x1580}, {&(0x7f0000011000)="8081000000180000d6f4655fd6f4655fd6f4655f00000000000001002000000010000800000000000af3020004000000000000000000000002000000300000000200000004000000320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000d6f4655f00"/160, 0xa0, 0x1600}, {&(0x7f0000011100)="8081000000180000d6f4655fd6f4655fd6f4655f00000000000001002000000010000800000000000af3020004000000000000000000000002000000400000000200000004000000420000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000d6f4655f00"/160, 0xa0, 0x1700}, {&(0x7f0000011200)="c041000000300000d6f4655fd6f4655fd6f4655f00000000000002002000000000000800000000000af301000400000000000000000000000c00000020000000", 0x40, 0x1e00}, {&(0x7f0000011300)="20000000000000000000000000000000d6f4655f00"/32, 0x20, 0x1e80}, {&(0x7f0000011400)="ed41000000040000d7f4655fd7f4655fd7f4655f00000000000002002000000000000800030000000af3010004000000000000000000000001000000500000000000000000000000000000000000000000000000000000000000000000000000000000005bbc60cd0000000000000000000000000000000000000000000000002000000098a2e27a98a2e27a98a2e27ad7f4655f98a2e27a0000000000000000", 0xa0, 0x1f00}, {&(0x7f0000011500)="ed8100001a040000d7f4655fd7f4655fd7f4655f00000000000001002000000000000800010000000af301000400000000000000000000000200000060000000000000000000000000000000000000000000000000000000000000000000000000000000491c1dd40000000000000000000000000000000000000000000000002000000098a2e27a98a2e27a98a2e27ad7f4655f98a2e27a0000000000000000", 0xa0, 0x7}, {&(0x7f0000011600)="ffa1000026000000d7f4655fd7f4655fd7f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3133363835323430322f66696c65302f66696c6530000000000000000000000000000000000000000000008a6df6170000000000000000000000000000000000000000000000002000000098a2e27a98a2e27a98a2e27ad7f4655f98a2e27a0000000000000000", 0xa0, 0x2100}, {&(0x7f0000011700)="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", 0x1a0, 0x2240}, {&(0x7f0000011900)="ed81000064000000d7f4655fd7f4655fd7f4655f00000000000001002000000000000800010000000af3010004000000000000000000000001000000900000000000000000000000000000000000000000000000000000000000000000002248c6120000000000000000000000000000000000000000000000002000000098a2e27a98a2e27a98a2e27ad7f4655f98a2e27a00"/160, 0xa0, 0x2400}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009403090166696c652e636f6c64000000", 0x80, 0x4000}, {&(0x7f0000011b00)="0b0000000c0001022e00000002000000f40302022e2e00"/32, 0x20, 0x8000}, {&(0x7f0000011c00)="00000000000400"/32, 0x20, 0x8400}, {&(0x7f0000011d00)="00000000000400"/32, 0x20, 0x8800}, {&(0x7f0000011e00)="000000000004000000000000000000000087c3e87affa38e6229cd483ad70000", 0x20, 0x8c00}, {&(0x7f0000000cc0)="0000000000040000000000000000000000000000000000000000000000000000676b2337d8d1273d9566a553097af1514f8f", 0x32, 0x9000}, {&(0x7f0000000880)="0000000000e10000000000000000000000000000000000000000970200000000905ac276e4542dec10e9606f5f5e1dc4beb0917c813037983c8403c4", 0x3c, 0x9400}, {&(0x7f0000012100)="00000000000400"/32, 0x20, 0x9800}, {&(0x7f0000012200)="00000000000400"/32, 0x20, 0x9c00}, {&(0x7f0000012300)="00000000000400"/32, 0x20, 0xa000}, {&(0x7f0000012400)="00000000000400"/32, 0x20, 0xa400}, {&(0x7f0000012500)="00000000000400"/32, 0x20, 0xa800}, {&(0x7f0000012600)="00000000000400"/32, 0x20, 0xac00}, {&(0x7f0000012700)="111fc0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0xc000}, {&(0x7f0000012800)="0200"/32, 0x20, 0xc400}, {&(0x7f0000012900)="0300"/32, 0x20, 0xc800}, {&(0x7f0000012a00)="0400"/32, 0x20, 0xcc01}, {&(0x7f0000012b00)="0500"/32, 0x20, 0xd000}, {&(0x7f0000012c00)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000c00100"/96, 0x60, 0xd400}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x10000}, {&(0x7f0000012e00)="0200"/32, 0x20, 0x10400}, {&(0x7f0000012f00)="0300"/32, 0x20, 0x10800}, {0x0, 0x0, 0x10c00}, {&(0x7f0000013100)="0500"/32, 0x20, 0x211000}, {&(0x7f0000013200)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000c00100"/96, 0x60, 0x11400}, {&(0x7f0000013300)="0c0000000c0001022e000000020000000c0002022e2e00000d0000001000050166696c65300000000e000000d803050766696c653100"/64, 0x40, 0x14000}, {&(0x7f0000013400)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x18000}, {&(0x7f0000000180)='syzkallers\x00'/32, 0x20, 0x1c000}, {&(0x7f0000013a00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallekallersyzkallers\x00'/128, 0x80, 0x24003}], 0x0, &(0x7f00000012c0)=ANY=[@ANYRESHEX]) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)={0x24, r1, 0x100, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x1}, @BATADV_ATTR_VLANID={0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x2400c802) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x5382, 0x750000) sendmsg$IPSET_CMD_GET_BYINDEX(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x208002}, 0xc, &(0x7f00000006c0)={&(0x7f0000000b00)=ANY=[@ANYBLOB="a15e40f08f17199f9e426a513c0000000f060101000000000000000007000006050001000700000016000b000400000006000b00ffff000006000b000100000005000100070000006737afa03c9c28d901ccfd256490d4d797c01295c7b67f1ba450df4c960a67f1e3f500d29f057d956bbb7d19fc424f839779b82f94b7f817c141fc3a03cb6afe4b760f770f1c90e0af23d7884024e39058253fce536a7bcfa44860ea7d78043cf54eada07ec83e83728ca0105247036fe23f7dc9833a3f62b54b86cc9fda3065f38411baf065b1ef50ae8b49ddfc9884a455984e44809d88dbef15d486eb7d2b87d81ffde8048670fe2ee8f1748c006f"], 0x3c}, 0x1, 0x0, 0x0, 0x20004014}, 0x20000000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) renameat(r2, &(0x7f0000000740)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000780)='./file0\x00') socketpair$unix(0x1, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000007c0)={'#! ', './file0/../file0', [{}, {0x20, 'trusted.overlay.opaque\x00'}], 0xa, "1aac24b2d7a7640ff775c9880021a7979fe8cd912153800f02fa1136b338c95e71fbe972b381cbc48d7e55d9eb239129910f485892979d9f8969153efce738d72a2fe9e981ea79361357032e8bbabeab77"}, 0x7e) rmdir(&(0x7f0000000140)='./file0\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) exit(0x800) setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.opaque\x00', &(0x7f0000000340)='!\xf1%\'@[)\x00', 0x8, 0x0) 13:12:06 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e20}, 0x6e) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000000)) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0x8) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r5, 0x40000000af01, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r5, 0x4008af00, &(0x7f0000000100)=0x300000000) ioctl$VHOST_SET_MEM_TABLE(r5, 0x4008af03, &(0x7f0000000180)=ANY=[]) write$vhost_msg_v2(r5, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1, 0x2}}, 0x48) r7 = dup(r6) ioctl$VHOST_NET_SET_BACKEND(r5, 0x4008af30, &(0x7f0000000000)={0x0, r7}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000000c0)={0x200, 0x4, 0x4, 0x20, 0x7, {}, {0x4, 0x1, 0x7, 0x1, 0x5, 0x5, "6c120919"}, 0x0, 0x4, @fd=r4, 0x9, 0x0, r7}) 13:12:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:12:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) set_mempolicy(0x3, &(0x7f0000000040)=0x9617, 0x8) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:06 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0xa, 0x0) ioctl$TIOCSBRK(r0, 0x5427) 13:12:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 137.983119][T10812] loop3: detected capacity change from 0 to 8464 [ 138.001230][T10812] EXT4-fs (loop3): Unrecognized mount option "0xffffffffffffffff" or missing value [ 138.010627][T10816] loop1: detected capacity change from 0 to 4 13:12:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:12:06 executing program 1: sync() r0 = syz_mount_image$befs(&(0x7f0000000000)='befs\x00', &(0x7f0000000040)='./file0\x00', 0xcc7, 0x5, &(0x7f0000000380)=[{&(0x7f0000000080)="198b3dd529eff48e23bfc540026f10c933dd246df169ad195c5bce7748df9a52fdfd010c0513a2005df4ab0bd284e1f466e0e3371c629082aeea391076475311759dbec304d1c387395f1ea00c89642129999bfabd2f8b3296805f9e75143a0dcf4ef1cf010fdf7015fb97dee2bd9276fae4984fa56e997edeb17ed573704b2ed6894c89dec7c60c", 0x88}, {&(0x7f0000000140)="90fc746e409fbae5d9c47ff08b904450770f34786213aeb6a31091264f7b2c07f00f1c146a57f78a74c97649", 0x2c, 0x4}, {&(0x7f0000000180)="deaeca7ba6786415c4d274ca9f3efdc27955248f0b549a9322fbae560bd0bb6438c8d4e517f788c1922fb3897c8236604ed6c7c82080a19bf718c739c4a8b0fe2aa8bb300fdb7bcc8dae5c4401a5420664b4cfd0ca7e424351ab4efdb8604cce90241867f40de4907c3f9787418b85f8096a77aaf691998c77490918e0eab4fbca15", 0x82, 0x9}, {&(0x7f0000000240)="6902b09a5fdb982eeea3fa52764419b15d173fe237db07e6520c6c55c7f77a35c4c7a0204b0ab11db59d3507bcdb457352d0c17fa9249f30ffe8e6d046012ffcc91ad0bf35aa2331d5f40508eee75bce616951c90f96a6706e46fe039a25db8532a7cacba285d4b82997cd16ac90b8b4f717224b3737e0e2a2d4787f5edc7bacc69797913945c0d82ef4b0670b961ebd5458e7aa220d9b8c6185b513dfb776ff465b6a358b6fe4f1b0ee62dd137d3f8fee53a4a8454afa", 0xb7, 0x10001}, {&(0x7f0000000300)="95d8b588572a42e2bae9f7b6a9cfc444e92e178f58ac15790c34ae0119106b80fbac9211404114b3d526967dda83ebae953d72a22b48e44552da8c817891448a0de5f854811b641f40a1cd573dbe8b", 0x4f, 0x80000000}], 0x404, &(0x7f0000000400)={[{}], [{@euid_gt={'euid>'}}, {@subj_user={'subj_user', 0x3d, '\x85{+$,'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}]}) sendfile(0xffffffffffffffff, r0, 0x0, 0x3) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, 0x0, 0x0) 13:12:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) set_mempolicy(0x3, &(0x7f0000000040)=0x9617, 0x8) r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:06 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000480)=ANY=[]) statx(r0, &(0x7f0000000180)='./file0\x00', 0x4000, 0x2, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x2081, &(0x7f00000001c0)={'trans=tcp,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@loose='loose'}, {@cache_loose='cache=loose'}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}, {@dfltuid={'dfltuid', 0x3d, r1}}, {@access_any='access=any'}], [{@fsname={'fsname', 0x3d, 'vfat\x00'}}]}}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000280)) mkdir(&(0x7f0000000240)='./file0\x00', 0x10) [ 138.056229][T10816] loop1: detected capacity change from 0 to 4 13:12:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) set_mempolicy(0x3, &(0x7f0000000040)=0x9617, 0x8) r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:07 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 138.188302][T10848] loop0: detected capacity change from 0 to 270 [ 138.204538][T10847] loop1: detected capacity change from 0 to 264192 [ 138.216262][T10847] befs: Unrecognized mount option "euid>00000000000000000000" or missing value [ 138.229648][T10847] befs: (loop1): cannot parse mount options [ 138.794849][T10876] loop3: detected capacity change from 0 to 8464 [ 138.802212][T10876] EXT4-fs (loop3): Unrecognized mount option "0xffffffffffffffff" or missing value 13:12:07 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) set_mempolicy(0x3, &(0x7f0000000040)=0x9617, 0x8) r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:07 executing program 0: openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000007000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="000261a19fffbe9cd8ef47423956890d495e1a56d24234a66123124954b000d510fab0a8af1e39c9001d00"/67]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000140)='./file0\x00', 0x4, 0x9, &(0x7f00000007c0)=[{&(0x7f0000000240)="dc90b5da14cb3d4e8a263710d1d44cd51fb875531ae436d04c0006c228d992d50260980aa24db967214252dcb10f073ddcf6390c7ca33da546ac61ea1aa153b88c9f779235ed8bf8a1aec8cb73d029fdee1d90fe716ad349d6a99ef0abbe8e717351479556edd54408d1d479e8a884a781e4bc417df5cfb07f02c38a2f09f3cf20b12ab0e24e3fc42b00cfda45b22ef1786f63cf174db70729ebb2b5bfc3e8c6fe5fa20eb0e817883ac7c48e821668f59c7ad87970d67379", 0xb8, 0x62}, {&(0x7f0000000380)="8eaabff0e2aeccc7a64f26f58c2279d472f9d7d3044e77ab81b0ed63c11bc73d5d737a950fc4c963cbd879fa73d6d27e45e9a985901a9cf0e308232fe7e71218b05e30787a3c36ddbf78e7e2430d298b9fa055122bb76f278e2142a3728e9076f7fb06b4ca0375594e6107e12bec921af407a8ac85b4ace5d1c9548c3ce07f17c87c198ef4d2d14a83b3c2114d1849d071c7a99625b56024", 0x98, 0x95c}, {&(0x7f0000000440)="7eac36f26fac7879dd24d78e9eafdfff9cd9421f43766336c333b80bbec5ef7e07b09f0d2ab5aeac26da9f6e20fdfd61e6c49ebabe70216d6e7aaae31e8e827916365ffb80025636967f7fb03326e1fb421888161e0e23510b007d97ec7659905d91e2b9623611849048a7a909", 0x6d, 0x3ff}, {&(0x7f00000004c0)="0ee9897d7f9a5ad8eec9cc1a07a7b09abecb059d634b5b32228470255cec77fd5c00e6fb9e702e827850f31480662a96a08cb84168b3e5cf484f45eab213064da22de184b874adc6bb53317d9665b021c08b23b2db8eeff4062aa7fbf6b2cf36f09fc40e109f595b5aba7e6019f2501b9a8a72ecfb255d4fd1fe349605af8138ef2ee111d905f5d9854bdc75d4743f865c688230160e66ee72d38763e2063f6fb23aa2b6b7ad91ff48eaa1e992a94186c83fe7d23bf6e8b5fffbfb", 0xbb}, {&(0x7f0000000580)="c72e57fabf759097d350965c6d38ece03ea3a8d13b1e80eb8009a8d22aa146e1540df124856d765130edcc1eefe39c3ab4852418d0339b0e5260933864fa9cb39a3b77c9ba52aa12992073aa878be82f3cab7113ca3bbee119d10fd19b4d738ac8862949bbd53135593ce4263fc1eb82fc63930da95bf2c0ca88f9f69ec6b7ed88ad8d4c737a084027997edbad9cc9236ea6314920c0932635cc0d1131d1adeee4cda3cb4d6780bfb7bfbf169b0f699a38e4e21e9f45033f0f7ab5e33423bdba5ad40d3d0dad", 0xc6, 0x4}, {&(0x7f0000000680)="b0d610241e0291947adb5d082c449bcea89f0cf5bfa6855dea7887516758608dd0ba1bcda34ac88606f097279d3e8f12501dcb23b3bb0db032188aef7dbf8ed7", 0x40, 0x1119}, {&(0x7f00000006c0)="bc89b0bbb41e94b51985d9a451a99d2c217379544aa47e6bb9e3aca104850a50934f31438125", 0x26, 0x4}, {&(0x7f0000000700)="4f3a4cad5f8b49", 0x7, 0x2}, {&(0x7f0000000740)="75c61c386fb054dfe4cbf4f962d91fc9ff954351f54014521227d1e3f30a79ba502bb61749bd6f5af34a91cdebff935009663ab883a384eb30072356009531b6b546a3c5e8efa6203aea962546a209010a38ea8cad2edd7ca8cffcd6", 0x5c, 0xe65}], 0x8, &(0x7f00000008c0)={[{@fat=@check_strict='check=strict'}, {@nodots='nodots'}, {@nodots='nodots'}, {@fat=@check_strict='check=strict'}, {@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots='dots'}], [{@uid_gt={'uid>', 0xee00}}, {@measure='measure'}, {@euid_gt={'euid>', 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/bsg\x00'}}, {@uid_eq={'uid', 0x3d, 0xee00}}]}) fchmodat(r1, &(0x7f0000000980)='./file0\x00', 0x10) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 13:12:07 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:12:07 executing program 1: r0 = socket(0x15, 0x5, 0x0) getsockopt(r0, 0x200000000114, 0x5, &(0x7f0000c35fff)=""/1, &(0x7f0000000000)=0xf002) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000e00)={@in={{0x2, 0x4e20, @rand_addr=0x64010101}}, 0x0, 0x0, 0x1d, 0x0, "a861740d0c02add741420847d78a2fb8d1b2932c56862cb3e17a5b1e6c9d196e35846cc5b7e77cdde6af1ec9949387885472ed4800bb30d47a9c6731d0873fc8dd2ac431a7e3a0d663254cbd853b0ff0"}, 0xd8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r2, 0x40000000af01, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000100)=0x300000000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) getsockname$packet(r1, &(0x7f0000000000), 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) syz_emit_ethernet(0x59, &(0x7f0000001500)={@remote, @broadcast, @val={@val={0x9100, 0x6, 0x1, 0x1}, {0x8100, 0x0, 0x0, 0x2}}, {@mpls_mc={0x8848, {[{0xa5a9, 0x0, 0x1}, {0x3, 0x0, 0x1}], @llc={@snap={0x1, 0x1, "14", "194b45", 0x80f3, "6f1dfce686ce57da9a62a2859fbf82abf58a530dff1e0410149a8f8972073672f1572bcf4aa1724d6bd49dbdf46e0bfb01f117"}}}}}}, &(0x7f0000000480)={0xfb, 0x3, [0x37d, 0x3d8, 0x21f, 0xf79]}) sendmsg$NL80211_CMD_SET_MULTICAST_TO_UNICAST(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r5}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:12:07 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e20}, 0x6e) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000000)) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0x8) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r5, 0x40000000af01, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r5, 0x4008af00, &(0x7f0000000100)=0x300000000) ioctl$VHOST_SET_MEM_TABLE(r5, 0x4008af03, &(0x7f0000000180)=ANY=[]) write$vhost_msg_v2(r5, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1, 0x2}}, 0x48) r7 = dup(r6) ioctl$VHOST_NET_SET_BACKEND(r5, 0x4008af30, &(0x7f0000000000)={0x0, r7}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000000c0)={0x200, 0x4, 0x4, 0x20, 0x7, {}, {0x4, 0x1, 0x7, 0x1, 0x5, 0x5, "6c120919"}, 0x0, 0x4, @fd=r4, 0x9, 0x0, r7}) 13:12:07 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:12:07 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'vlan1\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="200000010400000000f50035e93283753fc63b93e7ca0faaf19bf69156f419", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x0) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r5, 0x40000000af01, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r5, 0x4008af00, &(0x7f0000000100)=0x300000000) ioctl$VHOST_SET_MEM_TABLE(r5, 0x4008af03, &(0x7f0000000180)=ANY=[]) write$vhost_msg_v2(r5, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1, 0x2}}, 0x48) r7 = dup(r6) ioctl$VHOST_NET_SET_BACKEND(r5, 0x4008af30, &(0x7f0000000000)={0x0, r7}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000400)={{{@in=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @initdev}}, 0x0, @in=@initdev}}, &(0x7f0000000140)=0xe8) sendmsg$nl_route_sched(r7, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000500)=@deltfilter={0x3534, 0x2d, 0xb26, 0x70bd26, 0x25dfdbfe, {0x0, 0x0, 0x0, r8, {0xc, 0xffff}, {0x3, 0x7}, {0x6, 0x9}}, [@filter_kind_options=@f_flower={{0xb, 0x1, 'flower\x00'}, {0x54, 0x2, [@TCA_FLOWER_KEY_TCP_DST={0x6}, @TCA_FLOWER_KEY_MPLS_TC={0x5, 0x45, 0x80}, @TCA_FLOWER_KEY_ENC_UDP_SRC_PORT={0x6}, @TCA_FLOWER_KEY_UDP_SRC_MASK={0x6}, @TCA_FLOWER_KEY_ENC_IPV4_DST={0x8, 0x1d, @private=0xa010100}, @TCA_FLOWER_KEY_CT_STATE={0x6, 0x5b, 0xe40}, @TCA_FLOWER_KEY_ICMPV6_CODE={0x5}, @TCA_FLOWER_KEY_ICMPV6_TYPE_MASK={0x5}, @TCA_FLOWER_KEY_VLAN_PRIO={0x5, 0x18, 0x2}, @TCA_FLOWER_KEY_ENC_KEY_ID={0x8, 0x1a, 0x65e4}]}}, @TCA_RATE={0x6, 0x5, {0xc0, 0xff}}, @TCA_RATE={0x6, 0x5, {0x5, 0x1}}, @TCA_CHAIN={0x8, 0xb, 0x9}, @TCA_RATE={0x6, 0x5, {0x0, 0x2}}, @filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3310, 0x2, [@TCA_BASIC_EMATCHES={0xdc, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x14, 0x2, 0x0, 0x1, [@TCF_EM_IPSET={0x10, 0x3, 0x0, 0x0, {{0x401, 0x8, 0x1}, {0xffffffffffffffff, 0x3, 0x1}}}]}, @TCA_EMATCH_TREE_HDR={0x8}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x4}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x7ff}}, @TCA_EMATCH_TREE_LIST={0xac, 0x2, 0x0, 0x1, [@TCF_EM_IPSET={0x10, 0x1, 0x0, 0x0, {{0x0, 0x8, 0x7}, {0x0, 0x5}}}, @TCF_EM_CONTAINER={0x98, 0x3, 0x0, 0x0, {{0x3f, 0x0, 0x1}, "744a3171ddc1a13b71507e663fdafe461ccaa50c1ac7db91c9b58088df22a312233dc3a81234f3d414403f82866d6a624efb2cdfdec0988d27bd74c1cac2c242d223c67048bfee83eafd7e0211f95b22840783ef0261dc9b995a27a2012f8a630ebece058d02508707887f5e1de72686dffd613723b654ed2c09de3dbb9717b4698d913323032d03af3730"}}]}]}, @TCA_BASIC_EMATCHES={0x454, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xe81f}}, @TCA_EMATCH_TREE_LIST={0x414, 0x2, 0x0, 0x1, [@TCF_EM_CMP={0x18, 0x3, 0x0, 0x0, {{0x1, 0x1, 0x5}, {0x6, 0x7, 0x3, 0x1, 0x7, 0x0, 0x1}}}, @TCF_EM_NBYTE={0x14, 0x3, 0x0, 0x0, {{0x2, 0x2, 0x8}, {0xe4a7}}}, @TCF_EM_IPT={0x294, 0x3, 0x0, 0x0, {{0x8}, [@TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x3}, @TCA_EM_IPT_HOOK={0x8, 0x1, 0x3}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x5}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0xfb}, @TCA_EM_IPT_MATCH_DATA={0xad, 0x5, "2c40aaefaeb317544190a5f4760e09095bba278422d6242e00180fa9c6dbf8a4d027f51d0ba41e6f70c8edf97ffa9aaa943298da9aad599a239ba948fc43d14918329df899a8f2722496567066979e55cfc44e0b0eee1fd4fdcdfc4e42e1d768a21fb4e6b352dfff307ccf9c89bc5e89026b00157ef66cf1e95617bc0d7ae11bb34f412e667aa927f706398f664113827e29f7a72ef6f696daad1f3b8402609575c42fe2fcf923d603"}, @TCA_EM_IPT_MATCH_DATA={0xf0, 0x5, "48035984554caa583f69eaaacf59dcc0bd91df12b9f0b08fd1ad56c8f21a095c2e2706e902850ac5299fc2b1cdee5463bc3732469ecda4927d0b9b68f9f538fccc58e6b81d074a527c89d8771f82d365c8fbd2992deaedbd5c5f58a251acf7e8f4006d4ab3e3601d5925167070fadc4674c24f87b3f86c08960bc2b94b1b17595fe3ab253c39d54a2a8a38a37fc3347b2389b6d5abfed87001ad578e7d5d3d8354d0859c004694d5d251e52ee397240c5f1f928790dd32b4901dbcbb80393f60d97a9b7ad66abad5cf0192596a35e3e3018b31f564243cc5717eeba79ec396f940389b76c70d63dbe14bad5b"}, @TCA_EM_IPT_HOOK={0x8}, @TCA_EM_IPT_MATCH_DATA={0xbe, 0x5, "dddb23ebbc3371f293b9c65698d21f6754f8d1f108e343fc47453090a9c1b700bd5535a8b5893952744b97f29f7cf5acb088822b4979e90db582e984f2543ec5c6bdf27dc4146b81f2681ca52565674438511bb91435a0bb7ad38d46fe0c544f5e14e26d4d6846c463211e0723d5d004f3e47eae29ef2f621df6342670f0d249151f82b1f9ba5cb4222bed423c8340bf5d282f66fe87b5c511f5c74cb918781f96723b74c9a64f0d78212ed45478d778301db21965e6af947a74"}]}}, @TCF_EM_IPSET={0x10, 0x3, 0x0, 0x0, {{0x401, 0x8, 0x8000}, {0x0, 0x3, 0xe}}}, @TCF_EM_IPT={0x140, 0x1, 0x0, 0x0, {{0x7, 0x9, 0x80}, [@TCA_EM_IPT_MATCH_NAME={0xb, 0x2, 'policy\x00'}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x1}, @TCA_EM_IPT_MATCH_NAME={0xb, 0x2, 'policy\x00'}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0x4}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0x4b}, @TCA_EM_IPT_HOOK={0x8, 0x1, 0x2}, @TCA_EM_IPT_MATCH_DATA={0xe4, 0x5, "7a882fece50242f5de5a8930b0d56515c8fb68abf399e257a55c38fa3fcf20379f3d763efa2d6dbf2d0afa26d71c12ce97f58227cce5ff870b5716354b207b3fec9a8f94fae20dd715b6f18ffac1f992d4b98edc28571e6763cadf9c7d2efc129e36a15197b6f40ed992a122a7a50b1b91b0d72f1b81caa90159e71ddf2e57abd0b80e2dd266d3823814f0b7a2fb0f156f986c7862788199b592c7db27acf25ac5b3b57e3c6e4f0de0f3172e09ce0a68827f84409ba592e165e8af970fd6daa446d227e5a685b5e5cabae5829b1cfe824fc0ae42b236665c659c9f710b7ee328"}, @TCA_EM_IPT_HOOK={0x8, 0x1, 0x4}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0x1f}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0x5}]}}]}, @TCA_EMATCH_TREE_LIST={0x34, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x3, 0x0, 0x0, {{0xff, 0x7, 0x20}, {{0x2, 0x1}, {0x2, 0x0, 0x1, 0x1}}}}, @TCF_EM_U32={0x1c, 0x3, 0x0, 0x0, {{0x101, 0x3, 0xfff}, {0x100, 0x4, 0x7, 0x7ff}}}]}]}, @TCA_BASIC_POLICE={0x814, 0x4, [@TCA_POLICE_RATE={0x404, 0x2, [0x5, 0x7, 0x8, 0x401, 0x7, 0xffffffff, 0x4, 0x7, 0x7, 0x4, 0x401, 0xc0a, 0x1ff, 0x7fffffff, 0x6, 0x1, 0x7f, 0xf, 0x7, 0x7, 0x8f1, 0x4, 0x6, 0x8, 0x1, 0xa8cf6d8, 0x65a0, 0x7, 0x8, 0x1, 0xc3a, 0x4, 0x4, 0x3, 0x5, 0x0, 0x81, 0x2, 0x2, 0x1f, 0x2, 0x8, 0x6, 0x7f6b, 0x4000000, 0x9, 0x3, 0x0, 0x8, 0x8, 0x80000001, 0x6, 0x0, 0x3, 0x300000, 0x7, 0x3f, 0xffff733d, 0x9fd, 0x20, 0xfff, 0x0, 0x15ed9bc4, 0x7, 0x7ff, 0xdae, 0x5023, 0x7, 0x0, 0x1, 0x101, 0x5, 0x8, 0x400, 0xfffffffa, 0x4, 0x1f758afe, 0x3c2, 0x0, 0x2, 0x7, 0x2, 0x9, 0x3, 0x3, 0x8, 0x6, 0x3f, 0x6, 0x1ff, 0x9, 0x1, 0xd4a, 0xd6, 0x0, 0xb76, 0x4, 0x8, 0x3, 0x4, 0x3f, 0x7, 0x8, 0x8001, 0x80000000, 0x7, 0x6, 0x3, 0x1000, 0x5, 0xffffaefd, 0x200, 0x0, 0x8, 0x2, 0x7, 0x8, 0x100000, 0x4, 0x2, 0x3, 0xfffffffe, 0x80, 0x2, 0x3f, 0x80000001, 0x1f, 0x7, 0x7, 0x40, 0x8001, 0x2520000, 0x5, 0x0, 0xe3400ceb, 0x101, 0xd1, 0x7f, 0x2, 0x8000, 0x4, 0x9, 0x4, 0x9, 0xed5, 0x3, 0x6, 0x0, 0x7, 0x0, 0x3dd, 0x0, 0x3, 0x0, 0x3, 0x8c3, 0x1, 0x401, 0x1, 0x89, 0x6, 0x9, 0x3f, 0x2, 0x43, 0x3, 0x6f, 0x7f, 0x0, 0x9, 0x4, 0x8, 0x81, 0x1000, 0x1ff, 0x4, 0x7, 0x4, 0x9, 0x1, 0x3, 0x1, 0x4, 0x7, 0x7, 0x7f, 0x4, 0xfffeffff, 0x0, 0x5, 0xa1, 0x4, 0x1, 0x7fff, 0x4000000, 0x1, 0x4, 0x6, 0x4, 0x20, 0x20, 0x1, 0x6, 0x0, 0x400, 0x261, 0x81, 0x1, 0x4, 0x2, 0x2, 0x8, 0x101, 0x8000, 0x9, 0x10000, 0x10000, 0x2, 0xfffffff9, 0x9, 0x101, 0x3, 0xccd, 0x1, 0x8, 0x401, 0xf35, 0x8, 0x1, 0x6, 0x2d, 0x1bbecb23, 0x2f33, 0x7, 0x3, 0xab, 0x200, 0x4, 0x4f5, 0x0, 0x3, 0x4, 0x7ff, 0x9, 0x5, 0xe69, 0x4, 0xa31f, 0x2, 0x3, 0x7, 0x6, 0x7, 0x4, 0x4000, 0x7]}, @TCA_POLICE_RATE={0x404, 0x2, [0x101, 0x7251, 0x40, 0x8, 0x7, 0x4, 0x2, 0x40, 0x2, 0x9, 0x4, 0x8, 0x3, 0x4, 0x8000, 0x5, 0x8, 0x7, 0x4, 0x80000001, 0xcc6c, 0x0, 0x86, 0x0, 0x800, 0x9a4c, 0x3, 0x1e9, 0x6, 0x9, 0xffff, 0x0, 0x653, 0x2, 0xffffffc0, 0x2, 0xfffff800, 0xfffffff7, 0x7, 0xff, 0x40, 0x10001, 0x3, 0x9, 0x8001, 0x6, 0x9, 0x1000, 0x6, 0xff, 0x20, 0x0, 0x2, 0x40, 0x3ff, 0x9, 0x7fff, 0x6, 0x6, 0x100, 0x1, 0x7fffffff, 0x4, 0x1ff, 0x7, 0x8, 0x20, 0x2ff7, 0x0, 0x101, 0x80000000, 0x0, 0x0, 0x5, 0x1, 0x7, 0x1, 0x10000, 0x2, 0x38c23981, 0x3, 0xf361, 0x401, 0x6, 0x7fffffff, 0x2, 0x4, 0x8, 0x6, 0x9, 0x2, 0xe938, 0x2, 0x1, 0x8, 0x45, 0x2, 0x40, 0x7, 0x26, 0x0, 0x1ff, 0x4, 0x7, 0x7bd8f5d0, 0x200, 0x3ff, 0x3f, 0x4, 0x2, 0x0, 0x7b, 0x4, 0x4, 0x800, 0x7, 0xffffffff, 0xaa, 0x6, 0x400, 0x1000000, 0x4, 0x80000000, 0xffff7fff, 0x7fff, 0x4, 0x2, 0x8000, 0x8, 0x100, 0x80000001, 0x2, 0x4, 0x1, 0x1000, 0x2, 0xfffffff8, 0x7fff, 0x7f, 0x8, 0x1000, 0x0, 0x7498, 0x8, 0x8, 0x7f, 0x4, 0x3, 0xa0, 0x0, 0x6, 0xffffff7f, 0x9, 0x5, 0x2, 0x3, 0x4, 0x8, 0x8001, 0x0, 0x8, 0xa2a, 0x0, 0x386, 0xe4d, 0xc04, 0x1, 0x200, 0x5, 0x1, 0x401, 0x7, 0x81, 0x5, 0x3, 0xcd8, 0xfffffffc, 0x9320000, 0x9, 0x20, 0x3, 0x200, 0x8, 0x9, 0x8, 0x3ff, 0x40, 0x2, 0x6, 0x0, 0xede, 0x4d23, 0xfffffffd, 0x4, 0x9, 0x82f, 0x4, 0x91a, 0x1, 0x38e, 0x400, 0x7f, 0x17c, 0x8, 0x0, 0xd579, 0x3ff, 0x4, 0x7fffffff, 0x80000, 0xffffffc0, 0x1, 0x20, 0x7, 0x6, 0x84, 0x7ea1, 0x7, 0x96, 0x5, 0x4, 0x22f, 0x7, 0x1458, 0xffffffff, 0x8, 0xffffffff, 0x28, 0xfffffff7, 0x8, 0x0, 0x7fffffff, 0x3, 0x5, 0xffff, 0xffff8d20, 0x3, 0x100, 0x8001, 0x6, 0x1, 0xfff, 0x9, 0x71d1, 0x8, 0x1000, 0x9, 0x2, 0x20, 0xfff, 0x5, 0x2, 0xff8, 0x2, 0x0, 0x2]}, @TCA_POLICE_RESULT={0x8, 0x5, 0x7}]}, @TCA_BASIC_POLICE={0x5c, 0x4, [@TCA_POLICE_RESULT={0x8, 0x5, 0x4d}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x2}, @TCA_POLICE_RATE64={0xc, 0x8, 0x8}, @TCA_POLICE_TBF={0x3c, 0x1, {0x1, 0x20000000, 0x4, 0x73f, 0x7fff, {0x1, 0x1, 0x5, 0x1, 0xd25, 0x200}, {0xff, 0x1, 0x1, 0x6b, 0x1, 0x1}, 0x8, 0x7, 0x6e8}}]}, @TCA_BASIC_EMATCHES={0x510, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x290, 0x2, 0x0, 0x1, [@TCF_EM_U32={0x1c, 0x3, 0x0, 0x0, {{0x2, 0x3, 0x5}, {0x6, 0x6, 0xffffffff, 0xfffffff9}}}, @TCF_EM_META={0xec, 0x1, 0x0, 0x0, {{0x6fb9, 0x4, 0x6}, [@TCA_EM_META_LVALUE={0x13, 0x2, [@TCF_META_TYPE_VAR="50fc39", @TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_INT=0x5, @TCF_META_TYPE_VAR='H', @TCF_META_TYPE_VAR="da16c7"]}, @TCA_EM_META_HDR={0xc, 0x1, {{0xa1, 0xe8}, {0x6, 0x80, 0x1}}}, @TCA_EM_META_HDR={0xc, 0x1, {{0x26b, 0x7f, 0x4}, {0x1ff, 0x61, 0x1}}}, @TCA_EM_META_RVALUE={0x30, 0x3, [@TCF_META_TYPE_VAR="15984fef77c08bd3", @TCF_META_TYPE_VAR="86331221759e0ce99a", @TCF_META_TYPE_INT=0x7, @TCF_META_TYPE_VAR="dbcd8316bc59ff", @TCF_META_TYPE_VAR="639575af63fedaf3", @TCF_META_TYPE_INT=0x5, @TCF_META_TYPE_INT=0x9]}, @TCA_EM_META_LVALUE={0xf, 0x2, [@TCF_META_TYPE_VAR="312532f1ece289", @TCF_META_TYPE_INT=0xa]}, @TCA_EM_META_RVALUE={0xe, 0x3, [@TCF_META_TYPE_VAR="12ecc4e2465e", @TCF_META_TYPE_INT=0x6]}, @TCA_EM_META_RVALUE={0x22, 0x3, [@TCF_META_TYPE_INT=0x7, @TCF_META_TYPE_INT=0x7, @TCF_META_TYPE_VAR="68a7b472fa", @TCF_META_TYPE_INT=0x8, @TCF_META_TYPE_VAR="6cd39009fab75f3b28", @TCF_META_TYPE_INT=0x7]}, @TCA_EM_META_LVALUE={0xf, 0x2, [@TCF_META_TYPE_VAR="4399fc3b6b", @TCF_META_TYPE_VAR="418f5fe40b1e"]}, @TCA_EM_META_LVALUE={0x2e, 0x2, [@TCF_META_TYPE_VAR="6babb508", @TCF_META_TYPE_INT=0x3, @TCF_META_TYPE_VAR="f4", @TCF_META_TYPE_VAR="dc509bc1b89f3448f0", @TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_VAR="1268d6065071", @TCF_META_TYPE_INT=0x9, @TCF_META_TYPE_VAR="91d338ac367cc13fb46b"]}]}}, @TCF_EM_META={0xc4, 0x2, 0x0, 0x0, {{0x67e, 0x4, 0x6}, [@TCA_EM_META_HDR={0xc, 0x1, {{0x84b0, 0xb9}, {0x100, 0x6}}}, @TCA_EM_META_LVALUE={0x8, 0x2, [@TCF_META_TYPE_INT=0x9]}, @TCA_EM_META_LVALUE={0xf, 0x2, [@TCF_META_TYPE_VAR="9219185845", @TCF_META_TYPE_VAR="0087", @TCF_META_TYPE_INT=0x3]}, @TCA_EM_META_RVALUE={0x32, 0x3, [@TCF_META_TYPE_VAR="1681716857754115ff", @TCF_META_TYPE_VAR="b66b782cf6ae699d38", @TCF_META_TYPE_VAR="6ed19547ed", @TCF_META_TYPE_INT=0x7, @TCF_META_TYPE_VAR="7b042a40", @TCF_META_TYPE_VAR="08adbf1d2b", @TCF_META_TYPE_VAR="4394d4903acbeb52d3d1"]}, @TCA_EM_META_HDR={0xc, 0x1, {{0x81, 0x3, 0x1}, {0x2, 0x34, 0x1}}}, @TCA_EM_META_HDR={0xc, 0x1, {{0x3, 0x58, 0x2}, {0x4, 0x9, 0x3}}}, @TCA_EM_META_HDR={0xc, 0x1, {{0x5, 0x52, 0x2}, {0xe5b5, 0x0, 0x2}}}, @TCA_EM_META_LVALUE={0xe, 0x2, [@TCF_META_TYPE_INT=0x8, @TCF_META_TYPE_VAR="f013c5a2e305"]}, @TCA_EM_META_HDR={0xc, 0x1, {{0x40, 0x2}, {0x400, 0x2, 0x3}}}, @TCA_EM_META_LVALUE={0x20, 0x2, [@TCF_META_TYPE_INT=0x8, @TCF_META_TYPE_INT=0x2, @TCF_META_TYPE_INT=0x8, @TCF_META_TYPE_VAR="8aff", @TCF_META_TYPE_VAR="3e182b7a8c0e01", @TCF_META_TYPE_VAR="e73255083c5283"]}]}}, @TCF_EM_NBYTE={0x18, 0x2, 0x0, 0x0, {{0x6, 0x2, 0x6}, {0x100, 0x5, 0x2, "e407e3f581"}}}, @TCF_EM_META={0x2c, 0x1, 0x0, 0x0, {{0x5, 0x4, 0x89}, [@TCA_EM_META_LVALUE={0x8, 0x2, [@TCF_META_TYPE_VAR="0036fa3b", @TCF_META_TYPE_VAR]}, @TCA_EM_META_HDR={0xc, 0x1, {{0x2, 0x6, 0x1}, {0x4000, 0x9}}}, @TCA_EM_META_HDR={0xc, 0x1, {{0x4ea, 0x20}, {0x8, 0x9}}}]}}, @TCF_EM_IPT={0x7c, 0x1, 0x0, 0x0, {{0x6, 0x9, 0x6}, [@TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0x18}, @TCA_EM_IPT_MATCH_NAME={0xb, 0x2, 'policy\x00'}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0x1}, @TCA_EM_IPT_MATCH_NAME={0xb, 0x2, 'policy\x00'}, @TCA_EM_IPT_MATCH_DATA={0x21, 0x5, "6393b5fddabf461b2c9cffea516824a6bb432054530c4368815b96e72a"}, @TCA_EM_IPT_MATCH_NAME={0xb, 0x2, 'policy\x00'}, @TCA_EM_IPT_MATCH_REVISION={0x5}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x7}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0xc}]}}]}, @TCA_EMATCH_TREE_LIST={0x158, 0x2, 0x0, 0x1, [@TCF_EM_IPT={0x128, 0x3, 0x0, 0x0, {{0x8001, 0x9, 0x9}, [@TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x3}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0xa}, @TCA_EM_IPT_MATCH_DATA={0x6a, 0x5, "1d101de16a100d65a45c33daa4eb394d111170dce3cc74863b4bd7fbb1f8696f6c415548214c034fb0d3e64001cdbaf4aacad2d2a85bd61b25b5e3cd3fd7948c8c4768208fb1acb415ccf40480e32c6dc4266c9f7c1fcf2c29a346e37363b2b6beeb250f73eb"}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x2}, @TCA_EM_IPT_MATCH_NAME={0xb, 0x2, 'policy\x00'}, @TCA_EM_IPT_HOOK={0x8}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0xc}, @TCA_EM_IPT_MATCH_DATA={0x73, 0x5, "e701d6db62102e2a475e25b5caee7f76be4df9649340d17e33d8f03017ccadc3692193aa76a78826372d672777f621e2194c57fc6e09024f0e44cfa68bda57daa3eb367b4d446417f2508ff41967c4ca2a309fdcc002e8893c203c83025235ed19241f79d96711ed4641aba76d8f82"}, @TCA_EM_IPT_HOOK={0x8, 0x1, 0x2}]}}, @TCF_EM_CMP={0x18, 0x2, 0x0, 0x0, {{0x0, 0x1, 0x5}, {0x6, 0x80000001, 0x5, 0x6, 0x7, 0x0, 0x1}}}, @TCF_EM_NBYTE={0x14, 0x1, 0x0, 0x0, {{0x101}, {0x1f, 0x2, 0x3, 'Y|'}}}]}, @TCA_EMATCH_TREE_LIST={0x14, 0x2, 0x0, 0x1, [@TCF_EM_IPSET={0x10, 0x2, 0x0, 0x0, {{0x0, 0x8, 0x10}, {0x4, 0x5, 0x7}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x100}}, @TCA_EMATCH_TREE_LIST={0xdc, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xc4, 0x1, 0x0, 0x0, {{0x9, 0x0, 0x7}, "5fe04f7654b31e022fc5a4b4bcea1b8df1e612ea38382f9e36caf59becd9f061ac6eb0e86aab0a04b3375a63ffc5896e1459e6960732c7d86b3ba67667fb3faf655163b1b0d6742c798a9586e2b1159fbe88af718e673f06f5396f157e595f435497d99422c3fca6dbeebb2d21d50bd030637ca18f18d8faab56bf1bb660cc47df3fb863ec84849aa744bce19c71a3f3d18d79a33910847c78a4a095d19ec8f0290102a48fedefd36661d9e26fda174c7d33f240a86b8a"}}, @TCF_EM_CANID={0x14, 0x3, 0x0, 0x0, {{0x8}, {{0x3, 0x0, 0x0, 0x1}, {0x0, 0x1, 0x1}}}}]}, @TCA_EMATCH_TREE_LIST={0x28, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x2, 0x0, 0x0, {{0x2, 0x7, 0x8001}, {{0x4, 0x0, 0x1}, {0x1, 0x0, 0x0, 0x1}}}}, @TCF_EM_IPSET={0x10, 0x3, 0x0, 0x0, {{0x1, 0x8, 0x81}, {0x4, 0x1}}}]}, @TCA_EMATCH_TREE_LIST={0x4}]}, @TCA_BASIC_ACT={0x142c, 0x3, [@m_police={0x11fc, 0x13, 0x0, 0x0, {{0xb, 0x1, 'police\x00'}, {0x10d4, 0x2, 0x0, 0x1, [[@TCA_POLICE_RESULT={0x8, 0x5, 0x8d6}, @TCA_POLICE_RESULT={0x8, 0x5, 0x9}], [@TCA_POLICE_RATE={0x404, 0x2, [0x401, 0x9, 0x2, 0xfffffff8, 0x9, 0x0, 0x1, 0x81, 0x9d, 0x4bb, 0x3, 0x6, 0x3f, 0x2, 0xf1ac, 0x11a, 0x9, 0x7fffffff, 0x3, 0x1f, 0x3d79c75f, 0xfffffff8, 0x0, 0x8, 0x4, 0x0, 0x80, 0x500000, 0x400, 0x0, 0x5, 0x7, 0x8000, 0xe1ac, 0x2, 0x0, 0x6, 0x3ff, 0x6, 0xd529, 0xfffff387, 0x5e, 0x2, 0x7, 0x4, 0x6, 0x3, 0x2, 0x6, 0xffff, 0x9, 0x35, 0x2, 0x2, 0x7f, 0x8, 0x7ff, 0x4, 0xffff, 0x7, 0xf2, 0x5, 0x1000, 0xffffffff, 0x3, 0x2, 0x1f, 0x2, 0x4, 0x4, 0x3, 0x1, 0x1, 0x401, 0x7f, 0x0, 0x0, 0x1, 0xb9c9, 0x0, 0x2fc0, 0x4, 0x1, 0x10000, 0x2, 0x1, 0x8, 0x4f, 0x5, 0x80000000, 0x10001, 0x3b, 0x2, 0x0, 0x2, 0x0, 0x1d, 0x7, 0x6, 0x17af, 0x955, 0x7, 0x8000, 0x8, 0x5, 0x10000, 0x9, 0xff, 0x80000001, 0x200, 0x7fff, 0x3f, 0x9, 0x8001, 0x3, 0x2, 0x101, 0x3, 0x4, 0x2, 0x400, 0x50, 0x5, 0x1000, 0x7, 0x0, 0x4, 0xa7, 0x2, 0xffffffff, 0x303, 0x4, 0x6, 0x8000, 0x3, 0x902, 0xd61, 0x9, 0x0, 0x3, 0x1000, 0xe20, 0x90, 0x2, 0x1, 0x7, 0x6, 0x1f, 0x1, 0x2, 0x8, 0x81, 0x4, 0xffffffff, 0x0, 0x2, 0x4, 0x5, 0x8, 0xb8, 0xff, 0x8, 0x0, 0x7, 0x2, 0x4, 0x101, 0x2, 0x9, 0x2, 0x8000, 0x3, 0x800, 0x7, 0x0, 0x7ff, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x2, 0x75, 0x1fcc, 0x800, 0x0, 0x12fc, 0x5, 0x5, 0x81, 0x7, 0x1, 0x8, 0x3, 0x800, 0x550ed730, 0x81, 0x4, 0xaf21, 0x3f, 0x80000001, 0x100, 0x4, 0x7, 0x0, 0x1, 0x3, 0xde, 0x0, 0x80000000, 0x10000, 0x0, 0x81, 0x4, 0xffff0000, 0xa1d, 0x6, 0xc11, 0x5, 0x6, 0x2, 0x1, 0xf3, 0x7, 0x9, 0x0, 0x10000000, 0x6, 0x7, 0xaf, 0x0, 0x5, 0x800, 0x40, 0x5, 0x1000, 0x1, 0x4, 0x0, 0x0, 0x3, 0x4, 0x80000000, 0x6, 0x80000001, 0x10000000, 0x20, 0x8000, 0x1, 0x1000, 0x8001, 0x7, 0x1, 0x8001, 0x69d, 0x40]}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x7}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x5d}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x5}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x9}, @TCA_POLICE_RESULT={0x8, 0x5, 0x7}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x1f}], [@TCA_POLICE_RATE64={0xc, 0x8, 0x5}, @TCA_POLICE_RATE={0x404, 0x2, [0x20, 0x3, 0xe35a, 0x200, 0x800, 0x1, 0x6, 0xfffff800, 0x20, 0x1, 0x50000000, 0xe033, 0xb26, 0x3, 0x7fff, 0xc461, 0x6f7, 0x8, 0x8, 0x0, 0x8f2, 0xffff, 0x8, 0x6, 0x825, 0x4, 0x8, 0x40, 0xde, 0x80, 0x0, 0x80000000, 0xfffffff7, 0x9, 0x2, 0x1, 0x9, 0x0, 0x6, 0x4, 0x1, 0x3, 0x3, 0x4, 0x3, 0x808, 0x10000, 0xac7, 0x200, 0x5, 0x200, 0x17, 0x6, 0x9, 0x52, 0x9, 0x8000, 0x1, 0x3ff, 0x0, 0x7fffffff, 0x7ff, 0x3, 0xfffffeff, 0xc96, 0x7, 0x6, 0x81, 0x8, 0x2, 0x80000000, 0x200, 0x0, 0x0, 0x7f, 0x5, 0x800, 0x1c000000, 0x9, 0x8978, 0x4, 0x5, 0x8, 0x0, 0x5, 0x3, 0x8, 0xfffff001, 0x2, 0x0, 0x6, 0x200, 0x3, 0x4, 0x0, 0xad3, 0x4, 0x3, 0x9, 0x10000, 0x1, 0x515, 0x10001, 0x7, 0x3, 0x9, 0x2, 0x58a951dd, 0x4, 0x8e5, 0xffff, 0x1f03, 0xef3d, 0x2, 0x1, 0x9, 0x3, 0x4, 0x7, 0x8001, 0x77, 0x401, 0xff, 0x8, 0x3ff, 0x2, 0x9690, 0x8, 0x7, 0x1, 0x2, 0x3, 0x3146, 0x8044, 0x0, 0x7, 0x2, 0x0, 0x8, 0x20, 0xc3, 0x9, 0x3, 0x7, 0x9, 0x100, 0x7, 0x1000, 0xff, 0x10001, 0x7, 0x1000, 0xfff, 0x0, 0xc7, 0x4000, 0x2, 0x3, 0x0, 0x1, 0x3, 0x8, 0x100, 0x800, 0xffffff87, 0x10000, 0x6d3, 0x401, 0x0, 0x6, 0x4, 0xec3, 0x5, 0x0, 0x1000, 0x7, 0xa67, 0x20, 0x0, 0xab, 0xa1, 0x9, 0x7, 0x2, 0x7, 0x4, 0x0, 0x10001, 0x1, 0x5, 0x3f, 0x1, 0x80000001, 0x7, 0xffffffc1, 0x40, 0x1, 0x6874122c, 0x0, 0x5, 0x8, 0x1, 0x7, 0xce4, 0x9, 0x20, 0x7, 0xffffffff, 0x8000, 0x8, 0x3, 0x80000000, 0xbffffff8, 0x80000001, 0xffff, 0x7, 0xfffffff8, 0x4, 0xd6, 0x3, 0x1, 0xea25, 0x7, 0x6, 0x2, 0x4, 0x7ff, 0x7, 0x0, 0x401, 0xfffffffe, 0x0, 0x3, 0x1d, 0x6, 0x9, 0x9, 0x9, 0x3, 0x3, 0x8000, 0x1, 0x6, 0x5, 0x4, 0x80000000, 0x2, 0x8, 0x101, 0x400, 0x0, 0x4, 0x4, 0x2, 0x9, 0x10000]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x8a4, 0x8, 0x9, 0x80000000, 0xfffffff9, {0xf9, 0x0, 0x1, 0x2, 0x0, 0x401}, {0x1, 0x1, 0x5, 0x7, 0x87d, 0x6b6}, 0x5df, 0x7, 0x8215}}, @TCA_POLICE_RESULT={0x8, 0x5, 0x1a62e0ba}, @TCA_POLICE_RATE={0x404, 0x2, [0xffffff7f, 0x5, 0x800, 0x9809, 0xffffffff, 0x7, 0x4, 0x3, 0x3, 0x3ff, 0xfff, 0x4, 0x8, 0x2, 0x1, 0x5, 0x81, 0x2, 0xfffffff7, 0x8, 0x37ae, 0xff, 0x0, 0x3, 0x2, 0x1ff, 0x80000001, 0x5, 0x5, 0x8, 0x1, 0x7fff, 0x9, 0x7, 0x2, 0x6, 0x3f, 0x9, 0x49be, 0x1, 0x20, 0x3, 0xfffffffd, 0x3ff, 0x0, 0x2, 0x200, 0x0, 0x3, 0xfffff000, 0x7, 0x5, 0x10001, 0x0, 0xffff8001, 0x6, 0x0, 0x3, 0xfffffffc, 0x2, 0x2, 0x9, 0x2, 0x3, 0x401, 0x95f, 0x8001, 0x7, 0x1, 0x401, 0x4ab0, 0x0, 0x5, 0x0, 0x8, 0x8, 0x400, 0x9, 0x8, 0x7, 0x401, 0xffffffff, 0x3, 0xff, 0x2, 0x6, 0x1, 0x2, 0xda, 0xffffffff, 0x6, 0x9, 0xf3, 0x5, 0x4, 0x5, 0x10000, 0x1, 0x200, 0x1, 0x0, 0x0, 0x9, 0x61, 0xfa9, 0x7fff, 0x9, 0x0, 0x9, 0x8000, 0x8001, 0x244, 0x80000001, 0x0, 0x401, 0xffffffff, 0x5, 0x7, 0x8, 0x7, 0x3, 0x3, 0x9, 0x7, 0x1ff, 0x1, 0xffff8000, 0x0, 0xfffffbff, 0x4, 0x8, 0x294f, 0x63, 0x20, 0x4de, 0xffffffff, 0xe09, 0x40, 0x7f, 0x2, 0x1, 0xfffffff7, 0x3, 0x1, 0x400, 0x200, 0x0, 0x9, 0x1ff, 0x80, 0xfffffff9, 0x4, 0xffff, 0x8, 0x3f, 0xfffffeff, 0xff, 0x8000, 0x4, 0x10001, 0x8, 0x81, 0x0, 0x1000, 0x0, 0x2a592f48, 0x5e207d2d, 0x2, 0x80, 0x3680000, 0x40, 0x2, 0x7, 0x6, 0x3ce, 0x7ff, 0x4, 0x0, 0x5, 0x1000, 0x0, 0x80000001, 0x3, 0x101, 0x9, 0x9, 0x0, 0x66, 0x8000, 0x800, 0x800, 0x0, 0xffffffff, 0x7fff, 0x80000000, 0x7fffffff, 0x3, 0x4d, 0x1000, 0x8, 0x1, 0x5, 0x8, 0x9, 0xa728, 0x1, 0x40, 0x8, 0x5, 0x8, 0x0, 0x5, 0x95, 0x6, 0x400, 0x3, 0x6, 0x1, 0x0, 0x48, 0x2, 0x2, 0x1f, 0x9, 0x9, 0x81, 0x7, 0x3, 0x3ff, 0x2, 0xa804, 0x1000, 0x5, 0x5, 0x1, 0x5, 0x7fff, 0x2ad8, 0x80, 0x7, 0x7f, 0x6, 0x8, 0x2, 0x401, 0x6, 0x7, 0x1000, 0x80000001, 0x6, 0x7, 0x4bb2, 0x4, 0x9, 0x8, 0x401]}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x9}, @TCA_POLICE_PEAKRATE64={0xc}, @TCA_POLICE_RATE64={0xc, 0x8, 0xfff}], [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x3ff, 0xa22, 0x9, 0x0, 0xc0, 0x800, 0x8, 0x0, 0x80000000, 0x8001, 0x6, 0x80000000, 0xf19, 0x2c8f, 0x8000, 0x6, 0x0, 0x9, 0x4089, 0x6712, 0x3ff, 0x1, 0x4, 0x6, 0x80000000, 0x8, 0x0, 0x1, 0x6d, 0xf8, 0x9, 0x9, 0xcb, 0x2, 0x8001, 0x4, 0x1f, 0x0, 0x9, 0x9, 0x2, 0x8, 0x1f, 0x2, 0x7, 0x8, 0x4, 0x7, 0xd10, 0x6, 0x7f, 0x9, 0x3, 0x7, 0xd83, 0xe0, 0x7fff, 0x100, 0x6, 0x7fff, 0x800, 0x4, 0x4, 0x30f61a6, 0x7fffffff, 0x1800, 0x800, 0xd4, 0x0, 0xff, 0x1ff, 0x2, 0x10000, 0x8, 0xfffffff7, 0x2, 0x1, 0x1f, 0x80000001, 0x9, 0xfffffff9, 0x7, 0x10000, 0xb80, 0x3, 0x5, 0x3, 0x9, 0x4006, 0x9, 0xa4, 0x7, 0x6, 0x9, 0x80000000, 0xc32, 0x0, 0x5, 0x7, 0x100, 0x8, 0x6, 0x5, 0x1, 0x3, 0xfffffbff, 0x0, 0x8000, 0x5, 0x8, 0x1ff, 0x3f, 0x64ff, 0x8, 0x9, 0xe000, 0x5, 0x0, 0x3ff, 0x0, 0x9, 0x400, 0x401, 0x9, 0xcb9, 0x6a4b, 0xeb9, 0x2, 0x0, 0x1, 0x3, 0x1f, 0x9484, 0x6, 0x40, 0x7, 0x7, 0x8, 0x9, 0x2, 0x7, 0x3, 0x800, 0x5, 0xffffffff, 0x68c2, 0x3a, 0x7, 0x3, 0x8, 0x2, 0x2a, 0x89, 0x9, 0x81, 0x1488, 0x4, 0x532d, 0x7f, 0x80000000, 0x96, 0x2, 0x1fac5721, 0x7, 0x1f, 0x400, 0xea7, 0xffffffff, 0x3, 0x5, 0x9, 0x3f, 0x3, 0x0, 0x1, 0x0, 0x1, 0x7, 0x8, 0x2, 0x0, 0x2, 0x2, 0xe192, 0x3, 0xf439, 0x11, 0xda, 0x9, 0xb6, 0x7fff0, 0x5, 0x61d, 0x7, 0xffffff01, 0x8, 0x7139, 0x727, 0x5d, 0x9, 0x1, 0x0, 0x62e8, 0x7fff, 0x3, 0x80, 0x7, 0x4, 0x3c, 0x3, 0x7ff, 0x3, 0x1ff, 0x101, 0x3, 0xc5, 0x80000001, 0x5, 0x5, 0x6, 0x70c, 0x6, 0x7fffffff, 0x9, 0x1f, 0x0, 0xa0b, 0x3, 0x2e3, 0x351, 0x7f, 0x7, 0x4, 0x7, 0x0, 0x7, 0x89, 0x0, 0x2, 0x20, 0x7, 0x10000, 0x4a, 0x81, 0x8, 0x100000, 0x5, 0xfffffffd, 0x3, 0x3ff, 0x9, 0x6, 0xffffffff, 0x8d14, 0x108, 0x401]}]]}, {0xfe, 0x6, "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"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_xt={0x22c, 0x14, 0x0, 0x0, {{0x7, 0x1, 'xt\x00'}, {0x1f0, 0x2, 0x0, 0x1, [@TCA_IPT_TARG={0x9a, 0x6, {0x489, 'filter\x00', 0x20, 0x9928, "8de1f4b9ef67f3837bc0275a609219fe83f22b9edadb53a8e3109e3683677e6d28436e9f782266ae0241344765c3dd14ce7683982d888298a77ef5b93188a72a338e056a5e38903071d061fa6b210caebbe45cfe08953b2392eed8130d2e330629c2ec45a334865ef8309be53cf1fdf1"}}, @TCA_IPT_INDEX={0x8}, @TCA_IPT_HOOK={0x8, 0x2, 0x3}, @TCA_IPT_HOOK={0x8}, @TCA_IPT_HOOK={0x8}, @TCA_IPT_TARG={0x104, 0x6, {0x8000, 'filter\x00', 0x2, 0x5, "1e5a2bf064789658f4d57afad716f01a3ee14534b66ac61bcf8029d4d937e0d5ef3071f5e7a2fccb1d7503e63afae6cc23e80b65d390cbbe1ba965af3c9994ff26833706e612688e97744a590a23447bd0be5f5090cb0d508d97a68b1a37d001a0c022034082cced44fad9a0254dd57c331d55e43b791e14a300bbc4cc0b0ee274d67215fe366837245e823ecdbc31840bf91bc39166df55bb7b007d83ecaa0beebd9863441f3e957370bfed728949c3094706a173797059b040e50ae2053d42d6fea9ed28958011fee927c54c752d91062f9e07860879725533"}}, @TCA_IPT_TABLE={0x24, 0x1, 'filter\x00'}, @TCA_IPT_HOOK={0x8}]}, {0x18, 0x6, "16d78be82c71dca264fc0af44959971d6a61e934"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}]}, @TCA_BASIC_POLICE={0x410, 0x4, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x100, 0xfffff800, 0xfffffffd, 0xe6ac, 0x8, 0x3, 0xffffffff, 0x9, 0x8, 0x2, 0x1, 0x80000001, 0x1c, 0xffffff6b, 0x8, 0xad7, 0x80, 0x7b04, 0x20, 0x40, 0x4, 0x400, 0x10001, 0x4, 0x285a, 0xfff, 0x3, 0x7f, 0x7, 0x8, 0x4, 0x1, 0x7, 0x3, 0x9, 0x897, 0xe5e, 0x6, 0x4, 0xfffffeef, 0x7ff, 0x8, 0x3ff, 0x5c5a6074, 0xfffffffa, 0xc07, 0x6, 0x7f, 0x1, 0x10001, 0x1, 0x6, 0x3, 0x3, 0x3a5, 0x4, 0x1000, 0xffffff4c, 0x7, 0x5, 0x10001, 0x0, 0x4, 0x0, 0x2, 0x3, 0x4, 0x40, 0x3ff, 0x5, 0xfffffff8, 0x13, 0x40, 0x0, 0x2, 0x3, 0x1000, 0x4, 0x3, 0x1, 0x81, 0x5, 0x5, 0xc79, 0x0, 0x1, 0x7, 0x82, 0x0, 0x3, 0x9, 0xffffffff, 0xffffff01, 0xffffffff, 0x0, 0x7, 0x0, 0x80000000, 0x7, 0x8, 0x7ff, 0x949, 0x7, 0x2aa00, 0x14000000, 0x6, 0x6, 0x5, 0x98, 0x2, 0x2, 0xabd, 0xfffffffa, 0x5, 0x7f, 0x0, 0xc9f5, 0x5, 0x4, 0x10000, 0x3ff, 0x200, 0x3ff, 0x0, 0x40000000, 0x1, 0x6, 0x8, 0x3, 0x7, 0x9, 0xb2, 0x9, 0x9, 0x3, 0x400, 0x0, 0x7fff, 0x8282, 0x3, 0x7f, 0x0, 0x1, 0x9, 0x7, 0x3, 0x9, 0x4, 0x2, 0x6, 0x0, 0x8, 0x31, 0x764c, 0x7, 0x1, 0x9, 0x4, 0x100, 0x3, 0x5, 0x40, 0x0, 0x5, 0x7f, 0x3, 0x5, 0x4, 0x7ff, 0x1, 0x1, 0xfffffffe, 0x2, 0x6, 0x101, 0xffffffc6, 0x1, 0x8001, 0x6, 0x101, 0x0, 0xfff, 0xfffff800, 0x2, 0x400, 0x800, 0x9, 0x400, 0x9, 0x5, 0xbf, 0xc6, 0x23, 0x80000001, 0xd8b5, 0x4, 0x7f, 0x1, 0x80, 0x6, 0xc92, 0x7, 0x4, 0x20, 0x0, 0x8001, 0x3, 0x2, 0x80, 0x8000, 0xe0, 0x3, 0x6, 0x6, 0xe7cd, 0x4, 0x0, 0x1bb2, 0x80000000, 0x6, 0x0, 0x7ff, 0x9, 0x3, 0xfffff000, 0xfffffffa, 0x9, 0x5, 0x6, 0x1ff, 0x8, 0x2, 0x31bc, 0x8, 0xbd9, 0x40, 0x1, 0x0, 0x800, 0x6, 0x7fffffff, 0x131, 0xea, 0x82c, 0x3, 0x6, 0xfff, 0xc59, 0xfffffffc, 0xea, 0x60be, 0x3f, 0xf36, 0x0, 0x101, 0x3]}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x9}]}, @TCA_BASIC_POLICE={0x820, 0x4, [@TCA_POLICE_AVRATE={0x8, 0x4, 0x1}, @TCA_POLICE_RATE64={0xc, 0x8, 0x8ef}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x7f, 0x3, 0x8000, 0xfffffff7, 0x3, 0x7, 0x4, 0x0, 0x4711, 0x1f, 0x401, 0xba, 0x4, 0x8, 0x9, 0x0, 0x9, 0x8001, 0x3, 0x3, 0x7, 0xbc, 0x6, 0x256, 0x4, 0x10001, 0x6, 0x9, 0x6, 0x0, 0x9, 0x7, 0x0, 0x7f, 0x2, 0x9, 0xffffffff, 0xddc, 0x8, 0x1000, 0x8, 0x7, 0x8, 0x4, 0x9, 0x2, 0x80000001, 0x7fffffff, 0x10001, 0x80, 0xaf, 0x8, 0x100, 0x71, 0xff, 0x10001, 0x1, 0x5, 0x1, 0x1, 0xad, 0xf79, 0x8, 0x80000001, 0x1ff, 0x8, 0x7ff, 0x4, 0x3, 0x5, 0x40, 0x9, 0x6000, 0x8, 0x1ff, 0x4, 0x4, 0xffffffea, 0x2, 0x4, 0xffff, 0x874c, 0x6, 0x1, 0x0, 0xfffffff7, 0x4, 0x401, 0x7ff, 0xffffff7f, 0x400, 0xffffffff, 0x3, 0x3, 0x40, 0x1, 0xfffffff9, 0x20, 0xe0d, 0x1, 0x7fff, 0x4, 0x7f, 0x8, 0x1, 0x40, 0x6f, 0x7ff, 0xfffffffc, 0x8645, 0x2, 0x752f, 0x9, 0x9, 0x1ff, 0x6, 0x9, 0x2, 0xa1, 0x4965b18a, 0x8, 0x3aeb3214, 0x8b1, 0x4, 0xfffffff7, 0x8000, 0x1f, 0x72, 0x7, 0x5, 0x6, 0x8, 0x100, 0x0, 0x40, 0xfff, 0x6d9, 0x6, 0xa996, 0x0, 0x1, 0x7ff, 0xb85, 0x5, 0x206, 0x3, 0x8, 0x7f, 0x4, 0x200, 0xfffffe00, 0xdc32, 0x0, 0xe, 0x0, 0x80000001, 0xa96e, 0x200, 0x50000, 0xffff0000, 0x1, 0x27, 0x5, 0x800, 0xd8, 0x236e17ce, 0xc75b847, 0x5, 0x8001, 0x3d, 0xea, 0x3, 0x2, 0x5, 0x3, 0x8001, 0x3, 0x7, 0x20, 0x7fff, 0x6, 0x4, 0x7, 0x4e44455b, 0x10001, 0x5909, 0x0, 0x0, 0x9, 0xffffffff, 0x7, 0x0, 0x587e, 0xf, 0x3, 0xfffff001, 0x10000, 0x3, 0x144d50db, 0x3ff, 0x3ff, 0x6, 0x1, 0xcb, 0x8, 0x1, 0x9, 0x44a7, 0x0, 0xac, 0xfffffffa, 0x6, 0xffff0000, 0x4, 0xff, 0x1f, 0x40, 0x65e7ffce, 0x9, 0x0, 0x6, 0x2, 0x5, 0xffffffa8, 0xff, 0xd7ca, 0x4, 0x2, 0x76, 0x9, 0x200, 0x90e, 0x1, 0x6, 0x6, 0x99, 0x7, 0xb4, 0x0, 0x7fffffff, 0x7fff, 0x6a8, 0x7669, 0x0, 0x4, 0xfffffffc, 0x7fffffff, 0x4, 0x7, 0x80, 0xfffff001, 0x3bf, 0x4b815d22, 0x8, 0x4]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x3, 0x4, 0x0, 0x81, 0x4, 0x2, 0x7, 0x9, 0x1, 0x2, 0x2, 0xb5, 0x3ff, 0x6ef9, 0x10000, 0x5, 0x7581, 0x20, 0xa5c, 0xfffffffc, 0x0, 0x6, 0x2, 0xffffffc1, 0x9, 0x8001, 0x0, 0x8, 0x5, 0xfffffff7, 0x9, 0xdb5d, 0x8, 0x7ff, 0x2, 0x2, 0xeb, 0xfffffffd, 0x5, 0x40, 0x1f, 0x9, 0x2, 0x0, 0x8638, 0x10000, 0x9, 0x3f, 0x0, 0x8001, 0xe0fd242, 0x0, 0x2, 0x120, 0x3f, 0x80, 0x4, 0x2, 0x10001, 0x101, 0x744f, 0x1ff, 0x2, 0xfff, 0x6, 0xee0f, 0x6, 0x3f, 0x8, 0x6e000000, 0x6043a624, 0x80000000, 0x5395, 0x7ff, 0xff, 0x3, 0x9, 0x25b, 0x8000, 0x8, 0x9, 0x68, 0x1000, 0x0, 0x2, 0x200, 0x7fffffff, 0x5, 0x8001, 0x5e, 0x5, 0x0, 0x80000000, 0xdfd8, 0xfffffff8, 0x7, 0x101, 0x4e2, 0x2, 0x1, 0xff, 0x4, 0x55, 0xfff, 0x9, 0x6, 0x6, 0xcf, 0x20, 0x9, 0x7fffffff, 0x800, 0x4a, 0x800, 0xfffffc01, 0x1, 0x0, 0xffff, 0x8, 0x4f7, 0x9, 0x8, 0x6, 0x48b, 0x7, 0x81, 0xfffffff9, 0x7, 0x1, 0x7fff, 0x5, 0x7, 0x2, 0x81, 0x0, 0x5, 0x3, 0x4, 0x800, 0x0, 0xfffffffd, 0x0, 0x8, 0x1, 0xabc1, 0x7, 0x3, 0x5, 0x3, 0x7ff, 0x0, 0x7ff, 0x6, 0x1, 0x3a4, 0x5a43, 0x1000, 0x6, 0x1, 0x10000, 0x4, 0x1, 0x8, 0x5, 0x1, 0x559e, 0x3, 0x4, 0xa440, 0x1, 0x8, 0x3, 0x0, 0xd68, 0x9, 0x7, 0x401, 0x7, 0x7ff, 0x0, 0x2, 0x28, 0x5, 0x7f, 0x7, 0xc2, 0xfc, 0x1, 0x1, 0x80000001, 0xffe6, 0x3ff, 0x5, 0x8, 0x80, 0x7, 0x3, 0x6, 0x6, 0xf5d3, 0x5, 0xfffffbff, 0x1, 0x80, 0x80, 0x2, 0x2, 0xff, 0x1b4, 0x1, 0xfff, 0x7ff, 0x649, 0xffffb27d, 0x400, 0xcf0, 0x35be, 0x8, 0xfffffe01, 0x1400000, 0x1f, 0x6, 0x3434, 0x0, 0x3f, 0xffffffff, 0xffffffff, 0x6f2a, 0x9, 0x1ff, 0x4, 0x0, 0xffff, 0x5, 0x1, 0x5, 0x7, 0x10001, 0x2, 0x1, 0x10001, 0x1, 0x7, 0xfffffe00, 0x1, 0x5, 0x6, 0x2, 0xaeb7, 0x8, 0x7, 0x0, 0x5, 0xbb6e, 0x3]}]}]}}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x168, 0x2, [@TCA_TCINDEX_SHIFT={0x8, 0x3, 0xbb}, @TCA_TCINDEX_ACT={0x154, 0x7, [@m_vlan={0x150, 0x1, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x40, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x5a}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x1ff, 0x1, 0x4, 0x1, 0x2}, 0x2}}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x5}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}]}, {0xe5, 0x6, "be13f26900ad40cd0647ae3dff8ff69799de43b45a28e0cff70a88b2843d0eb507c50b132d1168737bea8ae8ca389cc02aed2f2ea3a746f50ac5d483e36f598edf565e7561c40968894d00bdb71f7ed9e67b47cd191930726c7a9fe54a7c51c0cd7876316fd94b0f3a353494d97c0191104825b14bbb1de77d79478f438860d3d5a196afd2f2f256a929bba56ed51927a898e1025d0bca0d1bb7a94d08b8b3b9a6a5130a4fb6fc12dd628e51e9d0485a28bd5cc05dfedbae192ae6caf447267df59ee1e14570cb6ed803a3c4c4f008672b1218623cdb63407af1acdfd8acadcbd9"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3, 0x2}}}}]}, @TCA_TCINDEX_MASK={0x6, 0x2, 0xd24}]}}]}, 0x3534}, 0x1, 0x0, 0x0, 0x20044811}, 0x48000) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000003b40)=ANY=[@ANYBLOB="20000000100001040000000000000000000000004cc9abf03c88da801d0583fc9baac563d2e54f026eb3ef570ee0b7a433d39b3c", @ANYRES32=r3, @ANYBLOB="c2728e67429365de02885f05b5ade093601e11fa41cc54ff86daefc5755a19b677eeb766ce2a0fd1bbe9e86d3aaba7554e26d1c892fdbe6d10cc227af6edfb8ad29b5c740adcb2a0d562e40f476c76e01f1cf86b3d40473f29899432175a765adc2619de83dbb3338554089e264fbabf4217174b32ac90310c5c45194bcbefaee7b172c55b6f421a07db3a91bc3b210de6c27a86cc571a52e6ecff95766c0fba81ae13459b67d3f5e5341282b98a9671bf48adf2b133a60630cb8ec622"], 0x20}}, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000003ac0)={0x0, 0xfffffffffffffffc, 0x5f, 0x3f, @buffer={0x0, 0x30, &(0x7f0000000280)=""/48}, &(0x7f0000000300)="4f07d470e97125978d579db3720cf03da5406bdbfeb73d439d16c858403b8e855145811f2bd6656e64c105732497743b665606b51925ab41420a7ca46b4f5899bfb19f3805b7f986289a976236944b298ce83c4a3dc14065a252c40c8bce5e", &(0x7f0000003a40)=""/104, 0x8, 0x10020, 0x1, &(0x7f0000000380)}) 13:12:07 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 138.949928][T10890] loop0: detected capacity change from 0 to 131456 [ 138.972538][T10890] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! 13:12:07 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 139.027089][T10890] EXT4-fs (loop0): warning: checktime reached, running e2fsck is recommended [ 139.058323][T10890] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e002c01c, mo2=0006] 13:12:07 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:12:07 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r1 = gettid() tkill(r1, 0x33) write$FUSE_DIRENT(r0, &(0x7f0000000080)={0x30, 0x0, 0x0, [{0x0, 0x0, 0x3, 0x0, '&/]'}]}, 0x30) 13:12:07 executing program 1: r0 = socket(0x15, 0x5, 0x0) getsockopt(r0, 0x200000000114, 0x5, &(0x7f0000c35fff)=""/1, &(0x7f0000000000)=0xf002) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000e00)={@in={{0x2, 0x4e20, @rand_addr=0x64010101}}, 0x0, 0x0, 0x1d, 0x0, "a861740d0c02add741420847d78a2fb8d1b2932c56862cb3e17a5b1e6c9d196e35846cc5b7e77cdde6af1ec9949387885472ed4800bb30d47a9c6731d0873fc8dd2ac431a7e3a0d663254cbd853b0ff0"}, 0xd8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r2, 0x40000000af01, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000100)=0x300000000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) getsockname$packet(r1, &(0x7f0000000000), 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) syz_emit_ethernet(0x59, &(0x7f0000001500)={@remote, @broadcast, @val={@val={0x9100, 0x6, 0x1, 0x1}, {0x8100, 0x0, 0x0, 0x2}}, {@mpls_mc={0x8848, {[{0xa5a9, 0x0, 0x1}, {0x3, 0x0, 0x1}], @llc={@snap={0x1, 0x1, "14", "194b45", 0x80f3, "6f1dfce686ce57da9a62a2859fbf82abf58a530dff1e0410149a8f8972073672f1572bcf4aa1724d6bd49dbdf46e0bfb01f117"}}}}}}, &(0x7f0000000480)={0xfb, 0x3, [0x37d, 0x3d8, 0x21f, 0xf79]}) sendmsg$NL80211_CMD_SET_MULTICAST_TO_UNICAST(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x60}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r5}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 139.092102][T10890] System zones: 1-2, 19-19, 35-38, 46-46 [ 139.103803][T10890] EXT4-fs (loop0): mounting with "discard" option, but the device does not support discard [ 139.113936][T10890] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 139.124821][T10890] ext4 filesystem being mounted at /root/syzkaller-testdir914673494/syzkaller.ktCgc0/19/file0 supports timestamps until 2038 (0x7fffffff) 13:12:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x600, 0x0) sendmsg$nl_route(r1, &(0x7f0000000600)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000005c0)={&(0x7f0000000280)=@dellinkprop={0x304, 0x6d, 0x800, 0x70bd27, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x800, 0x1000}, [@IFLA_NET_NS_PID={0x8, 0x13, 0xffffffffffffffff}, @IFLA_OPERSTATE={0x5}, @IFLA_PHYS_PORT_ID={0x18, 0x22, "edad0cb2649675bcaf773d8f03d7d73aed5809bf"}, @IFLA_XDP={0x14, 0x2b, 0x0, 0x1, [@IFLA_XDP_EXPECTED_FD={0x8}, @IFLA_XDP_EXPECTED_FD={0x8}]}, @IFLA_VFINFO_LIST={0x240, 0x16, 0x0, 0x1, [{0xd0, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0xcc, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x7f, 0x1b6, 0x1918, 0x8100}}, {0x14, 0x1, {0x0, 0xd4d, 0x80000000, 0x8100}}, {0x14, 0x1, {0x401, 0x805, 0x40, 0x88a8}}, {0x14, 0x1, {0xacf, 0x313, 0x0, 0x88a8}}, {0x14, 0x1, {0x1, 0xeac, 0x7ff, 0x8100}}, {0x14, 0x1, {0x135, 0x258, 0x0, 0x8100}}, {0x14, 0x1, {0x0, 0x3a1, 0x3ed, 0x88a8}}, {0x14, 0x1, {0x2b, 0xed8, 0x3f, 0x88a8}}, {0x14, 0x1, {0xeb8c, 0x7e2, 0x0, 0x8100}}, {0x14, 0x1, {0x8, 0x75ed, 0x8, 0x8100}}]}]}, {0x64, 0x1, 0x0, 0x1, [@IFLA_VF_SPOOFCHK={0xc, 0x4, {0x200, 0x5}}, @IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x3f, 0xd33, 0xffff, 0x88a8}}, {0x14, 0x1, {0x20, 0x773, 0x0, 0x88a8}}, {0x14, 0x1, {0x8, 0xfe9, 0x3, 0x88a8}}, {0x14, 0x1, {0x8, 0x111, 0x6, 0x88a8}}]}]}, {0xc0, 0x1, 0x0, 0x1, [@IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0xffffffff, 0x4, 0xe5c}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x400, 0xf9c3}}, @IFLA_VF_VLAN_LIST={0x68, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x5, 0x8b3, 0x5, 0x8100}}, {0x14, 0x1, {0x182a, 0x8fb, 0x3, 0x88a8}}, {0x14, 0x1, {0x0, 0xf00, 0x4, 0x8100}}, {0x14, 0x1, {0x4, 0x914, 0x1, 0x88a8}}, {0x14, 0x1, {0x4, 0x3e8, 0x1, 0x88a8}}]}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x1, 0x2}}, @IFLA_VF_VLAN={0x10, 0x2, {0x7, 0xa72, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x5, 0x9, 0x3}}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0xfffffff7, 0x3}}, @IFLA_VF_VLAN={0x10, 0x2, {0x1ff, 0xa3f, 0x6}}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x400, 0x20a1}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x2, 0x1}}, @IFLA_VF_VLAN={0x10, 0x2, {0x1, 0x992, 0x3}}]}]}, @IFLA_IFALIAS={0x14, 0x14, 'vcan0\x00'}, @IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x5}, @IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0x8}]}, 0x304}, 0x1, 0x0, 0x0, 0x4881}, 0xc000000) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@ipv4_newrule={0x38, 0x20, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@FRA_GENERIC_POLICY=@FRA_GOTO={0x8, 0x4, 0x7fff}, @FRA_GENERIC_POLICY=@FRA_IIFNAME={0x14, 0x14, 'veth1_to_bond\x00'}]}, 0x38}}, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x4e21, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000180)=[@ip_retopts={{0x30, 0x0, 0x7, {[@timestamp_addr={0x44, 0x1c, 0x10, 0x1, 0x0, [{@multicast1}, {@empty}, {@dev}]}, @ra={0x94, 0x4}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @broadcast, @broadcast}}}], 0x50}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@gettfilter={0x34, 0x2e, 0x400, 0x70bd28, 0x25dfdbfb, {0x0, 0x0, 0x0, r3, {0xa, 0x7}, {0xb}, {0x0, 0x10}}, [{0x8, 0xb, 0x4}, {0x8, 0xb, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x40000c1) 13:12:08 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:08 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r1, 0x40000000af01, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r3 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_G_AUDIO(r3, 0x80345621, &(0x7f0000001bc0)) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000100)=0x300000000) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000180)=ANY=[]) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) write$vhost_msg_v2(r1, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1, 0x2}}, 0x48) r4 = dup(r2) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000000)={0x0, r4}) ioctl$VHOST_SET_VRING_ADDR(r4, 0x4028af11, &(0x7f00000004c0)={0x2, 0x0, &(0x7f00000002c0)=""/14, &(0x7f0000000300)=""/232, &(0x7f0000000400)=""/162, 0x5000}) sendmsg$kcm(r4, &(0x7f0000000280)={&(0x7f00000000c0)=@ethernet={0x6, @remote}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000140)="08150c5ddc571dc16a7ccb16e3b41d37107ef93f60c337d14da6472f0eb1f70a24dbbe626a98675579fae7d202ee0281405a1ae0b209dcd072dd5d82ba1e6081a4efa357761c0bf594870fb7a383ed901d0e283c95013e71d1b90554df2997dcc0291f0bebadbf804422af530ef5222fd8154ea2858ae9b1fe7a1881eff029454eea36f6178245e5d8955c2c1e11bb1b655ec63158819ca6aa7b9e9d4e92f60022cb8f3b3859cd21a4ba9d2b53da9b1d28b4244c550931b70e34f27007e06342d95185f523dfd1a8ad734b58f030dcb1f3a891e914", 0xd5}], 0x1}, 0x40) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030010000505d25a80648c63940d0324fc60100016000a000400053582c143153e370848018000f01700d1bd", 0x2e}], 0x1}, 0x0) 13:12:08 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e20}, 0x6e) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000000)) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0x8) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r5, 0x40000000af01, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r5, 0x4008af00, &(0x7f0000000100)=0x300000000) ioctl$VHOST_SET_MEM_TABLE(r5, 0x4008af03, &(0x7f0000000180)=ANY=[]) write$vhost_msg_v2(r5, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1, 0x2}}, 0x48) r7 = dup(r6) ioctl$VHOST_NET_SET_BACKEND(r5, 0x4008af30, &(0x7f0000000000)={0x0, r7}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000000c0)={0x200, 0x4, 0x4, 0x20, 0x7, {}, {0x4, 0x1, 0x7, 0x1, 0x5, 0x5, "6c120919"}, 0x0, 0x4, @fd=r4, 0x9, 0x0, r7}) 13:12:08 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4c"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:12:08 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:08 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r1, 0x40000000af01, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r3 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_G_AUDIO(r3, 0x80345621, &(0x7f0000001bc0)) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000100)=0x300000000) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000180)=ANY=[]) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) write$vhost_msg_v2(r1, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1, 0x2}}, 0x48) r4 = dup(r2) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000000)={0x0, r4}) ioctl$VHOST_SET_VRING_ADDR(r4, 0x4028af11, &(0x7f00000004c0)={0x2, 0x0, &(0x7f00000002c0)=""/14, &(0x7f0000000300)=""/232, &(0x7f0000000400)=""/162, 0x5000}) sendmsg$kcm(r4, &(0x7f0000000280)={&(0x7f00000000c0)=@ethernet={0x6, @remote}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000140)="08150c5ddc571dc16a7ccb16e3b41d37107ef93f60c337d14da6472f0eb1f70a24dbbe626a98675579fae7d202ee0281405a1ae0b209dcd072dd5d82ba1e6081a4efa357761c0bf594870fb7a383ed901d0e283c95013e71d1b90554df2997dcc0291f0bebadbf804422af530ef5222fd8154ea2858ae9b1fe7a1881eff029454eea36f6178245e5d8955c2c1e11bb1b655ec63158819ca6aa7b9e9d4e92f60022cb8f3b3859cd21a4ba9d2b53da9b1d28b4244c550931b70e34f27007e06342d95185f523dfd1a8ad734b58f030dcb1f3a891e914", 0xd5}], 0x1}, 0x40) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030010000505d25a80648c63940d0324fc60100016000a000400053582c143153e370848018000f01700d1bd", 0x2e}], 0x1}, 0x0) 13:12:08 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)='\x00', 0x1, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f00000009c0)='user\x00', &(0x7f0000000a00)={'syz', 0x3}, &(0x7f0000000740)="6a1a53561fd80677d9504983468d6fbe82e04e17628f9603c8b401bd22052525bcae35a56f76a02c16d98f432e2c5daf6f099f8da2e063252c8011a16a60363ccf9381fa86230fc032cd122377597cb0edf1498bb9bd726f06303394fec8155663b73ac89fedf050404d5dd514478d7cb029ef9cdd5c4aa086a3fac3623349b11c1fc046ac0e6221ea0aac59ab1a2ec309a07b4fc000251f8e1458c1e46db196b87fb611d1d4a3368a4e2d320ddaa995f193278dcac76e681c449ac218364b5f", 0xc0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, 0x0, 0x0) add_key$fscrypt_v1(&(0x7f0000000040)='logon\x00', &(0x7f00000000c0)={'fscrypt:', @auto=[0x63, 0x38, 0x61, 0x32, 0x0, 0xced80bf23b8136d1, 0x66, 0x0, 0x30, 0x30, 0x37, 0xdeb8f35e1848285e, 0x30, 0x4, 0x33, 0x65]}, &(0x7f0000000100)={0x0, "02c7036f954453315450605a1a48628d054da48ba1868ff6a592925e416cccbecfec1d48fc257f5f50ebf5c39e6411db6fe72c5d0268d0728162cb27af6d454e", 0x15}, 0x48, r2) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r1, r1}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000800)={&(0x7f00000001c0)={'sha512-generic\x00'}}) 13:12:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = accept$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000100)=""/209, 0xd1}], 0x49, 0x0, 0x3ff) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 13:12:08 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4c"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:12:08 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r1, 0x40000000af01, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r3 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_G_AUDIO(r3, 0x80345621, &(0x7f0000001bc0)) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000100)=0x300000000) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000180)=ANY=[]) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) write$vhost_msg_v2(r1, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1, 0x2}}, 0x48) r4 = dup(r2) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000000)={0x0, r4}) ioctl$VHOST_SET_VRING_ADDR(r4, 0x4028af11, &(0x7f00000004c0)={0x2, 0x0, &(0x7f00000002c0)=""/14, &(0x7f0000000300)=""/232, &(0x7f0000000400)=""/162, 0x5000}) sendmsg$kcm(r4, &(0x7f0000000280)={&(0x7f00000000c0)=@ethernet={0x6, @remote}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000140)="08150c5ddc571dc16a7ccb16e3b41d37107ef93f60c337d14da6472f0eb1f70a24dbbe626a98675579fae7d202ee0281405a1ae0b209dcd072dd5d82ba1e6081a4efa357761c0bf594870fb7a383ed901d0e283c95013e71d1b90554df2997dcc0291f0bebadbf804422af530ef5222fd8154ea2858ae9b1fe7a1881eff029454eea36f6178245e5d8955c2c1e11bb1b655ec63158819ca6aa7b9e9d4e92f60022cb8f3b3859cd21a4ba9d2b53da9b1d28b4244c550931b70e34f27007e06342d95185f523dfd1a8ad734b58f030dcb1f3a891e914", 0xd5}], 0x1}, 0x40) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030010000505d25a80648c63940d0324fc60100016000a000400053582c143153e370848018000f01700d1bd", 0x2e}], 0x1}, 0x0) 13:12:08 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:08 executing program 1: syz_emit_ethernet(0x1a4, &(0x7f0000000300)=ANY=[@ANYBLOB="000000000000aaaaaaaaaaaa86dd6417a05b016e2100fc000000000000000000000000000001ff020000000000000000000000000001ff04023f00000000ff01000000000000000000000000000000000000000001870e00040000000000000000000000000000ffffe0000002fc020000000000000000000000000000fe8000000000000000000000000000aafe800000000000000000000000000022fc01000000000000000000000000000100000000000000000000ffff00000000fe8000000000000000000000000000aa330000000000000000010000000000004e224e2304c1907f00000000000000f9c1b5b9a0d86ac91c01565b07c02565da1b4844ee2a3244ce905411de2052d1e0a17f45e1e49bd5adc75353db3e1125ea8d15aef9424331cdcb9bad1212975ecdcd4d585e160fc06f2d88ab2e1b81264c1cf6cad0ced61a645615b37350c300d976c3c3273f09e2ea7d3cd7a5ea2bebfd1da795ece14a9166de711668996ae20a14cd4f01ae73d37c1c5edf134e642248f56c024ca9c207bdb98b418641996a0aba9025e43c6e6e31db3a8861dc1c000000000000000000099cc65a342f9629e32809f9fb15a1278e041c58aa7c8128d8f79048bfd43cf889364e832b6ee14cddbc5ab7ced23916c4ee0945247bdfcad45795985410b26a8290130e6502d7e9"], 0x0) 13:12:08 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4c"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:12:08 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r1, 0x40000000af01, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r3 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_G_AUDIO(r3, 0x80345621, &(0x7f0000001bc0)) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000100)=0x300000000) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000180)=ANY=[]) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) write$vhost_msg_v2(r1, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1, 0x2}}, 0x48) r4 = dup(r2) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000000)={0x0, r4}) ioctl$VHOST_SET_VRING_ADDR(r4, 0x4028af11, &(0x7f00000004c0)={0x2, 0x0, &(0x7f00000002c0)=""/14, &(0x7f0000000300)=""/232, &(0x7f0000000400)=""/162, 0x5000}) sendmsg$kcm(r4, &(0x7f0000000280)={&(0x7f00000000c0)=@ethernet={0x6, @remote}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000140)="08150c5ddc571dc16a7ccb16e3b41d37107ef93f60c337d14da6472f0eb1f70a24dbbe626a98675579fae7d202ee0281405a1ae0b209dcd072dd5d82ba1e6081a4efa357761c0bf594870fb7a383ed901d0e283c95013e71d1b90554df2997dcc0291f0bebadbf804422af530ef5222fd8154ea2858ae9b1fe7a1881eff029454eea36f6178245e5d8955c2c1e11bb1b655ec63158819ca6aa7b9e9d4e92f60022cb8f3b3859cd21a4ba9d2b53da9b1d28b4244c550931b70e34f27007e06342d95185f523dfd1a8ad734b58f030dcb1f3a891e914", 0xd5}], 0x1}, 0x40) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030010000505d25a80648c63940d0324fc60100016000a000400053582c143153e370848018000f01700d1bd", 0x2e}], 0x1}, 0x0) [ 139.854804][T10981] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.0'. 13:12:09 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e20}, 0x6e) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000000)) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0x8) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r4, 0x40000000af01, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r4, 0x4008af00, &(0x7f0000000100)=0x300000000) ioctl$VHOST_SET_MEM_TABLE(r4, 0x4008af03, &(0x7f0000000180)=ANY=[]) write$vhost_msg_v2(r4, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1, 0x2}}, 0x48) r6 = dup(r5) ioctl$VHOST_NET_SET_BACKEND(r4, 0x4008af30, &(0x7f0000000000)={0x0, r6}) 13:12:09 executing program 1: syz_emit_ethernet(0x88, &(0x7f0000000000)={@local, @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr=0x64010102, @local}, @source_quench={0x4, 0x0, 0x0, 0x0, {0x17, 0x4, 0x2, 0x16, 0x500c, 0x65, 0x7, 0x4b, 0x5a, 0x69a9, @multicast1, @rand_addr=0x64010101, {[@cipso={0x86, 0x1e, 0x2, [{0x5, 0x8, "258e214cf0a7"}, {0x5, 0x2}, {0x1, 0xe, "14113d58c5fe0ba29d0dde33"}]}, @rr={0x7, 0x1b, 0x8, [@loopback, @remote, @broadcast, @broadcast, @rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0xd}]}, @generic={0x89, 0xc, "61f3d76fff838d53327e"}]}}, '0 '}}}}}, 0x0) 13:12:09 executing program 5: set_mempolicy(0x0, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:09 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:12:09 executing program 3: socket$kcm(0x10, 0x2, 0x10) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_G_AUDIO(r2, 0x80345621, &(0x7f0000001bc0)) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x300000000) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000180)=ANY=[]) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) write$vhost_msg_v2(r0, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1, 0x2}}, 0x48) r3 = dup(r1) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x0, r3}) ioctl$VHOST_SET_VRING_ADDR(r3, 0x4028af11, &(0x7f00000004c0)={0x2, 0x0, &(0x7f00000002c0)=""/14, &(0x7f0000000300)=""/232, &(0x7f0000000400)=""/162, 0x5000}) sendmsg$kcm(r3, &(0x7f0000000280)={&(0x7f00000000c0)=@ethernet={0x6, @remote}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000140)="08150c5ddc571dc16a7ccb16e3b41d37107ef93f60c337d14da6472f0eb1f70a24dbbe626a98675579fae7d202ee0281405a1ae0b209dcd072dd5d82ba1e6081a4efa357761c0bf594870fb7a383ed901d0e283c95013e71d1b90554df2997dcc0291f0bebadbf804422af530ef5222fd8154ea2858ae9b1fe7a1881eff029454eea36f6178245e5d8955c2c1e11bb1b655ec63158819ca6aa7b9e9d4e92f60022cb8f3b3859cd21a4ba9d2b53da9b1d28b4244c550931b70e34f27007e06342d95185f523dfd1a8ad734b58f030dcb1f3a891e914", 0xd5}], 0x1}, 0x40) 13:12:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = accept$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000100)=""/209, 0xd1}], 0x49, 0x0, 0x3ff) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 13:12:09 executing program 1: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) set_mempolicy(0x4000, &(0x7f0000000200)=0x10000, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000000)='wlan1\x00\a\xd3~\xd4\xa2\xb8y\xe1\x04\xbe\x00\x00@\x00\x00\x00\x00\x00!\x00\xff\x8d\x00\x00\xf6\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\x18\x9f \xfa\x91\x1b\x01U\xbe\x01\x01X\xbdh\xbfjOc\xcd\x15\xc1K\xab\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\xd1\x19EI\x952\x12,\xec\x02\xffa\xad\xef,\xbc (\x02B-mF\xfa\x92\xdc\x13\x06\x1fk6=z\x8eni)\xb5i\x0f\xc7\v\x9d\x81\xb3r\xb1x\\\xdb\xcbzE\xfeO\xe7\xdf\x96\xa2\xf8EX\xe3\xbcf\x02\x98T\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh>\xa3\xd7\xc70\x92C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7[\xe3\x00\x00\x00\x00\x00\x00t\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa \x8dd\xff9\xfa\r\xbe\x16%\xde\xa2o\xa9\\%\xc8\xfa\xd9t\xe5t\x9d\aj\x16\xc4}-\xf6\xd3\x02\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\xd0\xab.\x13L8V\x1d\xa0\x02#\xb4\xea@\x1b\xd0{\x02iE\xb30\xe8\xdb[\xc8\xe5\xae\x98\xdc\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFcH\x03Q\xc1\x04|a\x97l\xd0\x9f\x82\x9d\xae\x9cyg-\x97\x81\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39\xe9yT\xc4\xf0\xef\xe0\xd8\b#\x9a\xcd\xe0\xf8q\x9a\xcd\xdeAF,\x04\"\x84\xa9O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\xcc\x13\x12\xcc@\x89\xf8F\x82OO\x99\x00\x00\x00\x00\x00\x00\\\x7f\xddW\xa22\r\x18A\xfbvp45\xa0E2\xbc\xb0\xdb\xc0+\x18\xe4\x97\xcc\xb4\x13/\xb3\xf8\x00\x9b\xc3\xb7\xdf\x05\xde\f\x80\xedm\xa4\xa4\xbd\x1d\xc5\x06\xd6\x9f\x15!\xc4\xd8\xbev\xba\xee\xb0\xfb\xc7k\xd1u\xf35\xbc0\t\xef\xcf\x9fr\xa8E\xc7\x14\x9b:u|v\x80\x8d}\x02\xb2%-\xfcD') mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000001, 0x10, r1, 0x40b1a000) 13:12:09 executing program 3: socket$kcm(0x10, 0x2, 0x10) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_G_AUDIO(r2, 0x80345621, &(0x7f0000001bc0)) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x300000000) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000180)=ANY=[]) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) write$vhost_msg_v2(r0, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1, 0x2}}, 0x48) r3 = dup(r1) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x0, r3}) ioctl$VHOST_SET_VRING_ADDR(r3, 0x4028af11, &(0x7f00000004c0)={0x2, 0x0, &(0x7f00000002c0)=""/14, &(0x7f0000000300)=""/232, &(0x7f0000000400)=""/162, 0x5000}) 13:12:09 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:12:09 executing program 5: set_mempolicy(0x0, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:09 executing program 5: set_mempolicy(0x0, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:09 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 140.794185][T11028] mac80211_hwsim hwsim3 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 140.799583][T11031] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.0'. [ 140.823847][T11037] mac80211_hwsim hwsim3 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) 13:12:10 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e20}, 0x6e) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000000)) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0x8) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r4, 0x40000000af01, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r4, 0x4008af00, &(0x7f0000000100)=0x300000000) ioctl$VHOST_SET_MEM_TABLE(r4, 0x4008af03, &(0x7f0000000180)=ANY=[]) write$vhost_msg_v2(r4, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1, 0x2}}, 0x48) dup(r5) 13:12:10 executing program 3: socket$kcm(0x10, 0x2, 0x10) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_G_AUDIO(r2, 0x80345621, &(0x7f0000001bc0)) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x300000000) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000180)=ANY=[]) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) write$vhost_msg_v2(r0, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1, 0x2}}, 0x48) r3 = dup(r1) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x0, r3}) 13:12:10 executing program 1: r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000080)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x38e3948, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x114, &(0x7f0000000300)={[{0xdf, 0x4e00, "043acedf80bb4da7296c80be9c41ae507c2c84314639ad7131d73ad2bba58b0b3f38c0a0c71132b5ae20a3f460da6b9fa6678a95b62d1cb16b9465f07fbc084a57c8e7a69edc77b6a0f9dd0a285b6aa96bad1c53623c6c417da60eb338af15fc9832e0e3324dde005b9033bb5046b22d0b5d58c93aba1a7c7708929c0b69df342edd40ec3d61ffdc3563ac8f1d7a812d57095fdd988d86b3b915d36b1d1ff905a7cf100725bcbb1b17237983ecdfbfcd960dfa7ed6aab76314d3f2925ff834293dcee3684f33ac5a98f7888074d96c4ca008fb17af26a20b978d1cc56c9776"}, {0x29, 0x4e00, "abf5e258d09d65ac9e0e5c53eed63218d74b8697b1a634f7eb9dce4b56a9163ee08d75d42bb8572487"}]}) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x8, &(0x7f0000000500)={[{0x1, 0x4e00, "99"}]}) r1 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x21, 0x5d, 0x4b, 0x40, 0x6a5, 0xd800, 0x8712, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xf9, 0x30, 0x5d}}]}}]}}, 0x0) syz_usb_control_io$printer(r1, 0x0, 0x0) syz_usb_control_io$printer(r1, 0x0, &(0x7f0000001cc0)={0x34, &(0x7f0000001d40)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r1, 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(r1, 0x82, 0x1d4, &(0x7f0000000100)={[{0xcc, 0x4e00, "90de0a66b0d8b8ad3196de75a148b7ac8219add00d04fa00401a37c653f62a3512417021c753aaad50e5cf97055488da719d86ae8d05dbfeacf1a4c66b11bfee11f47853097eb2d047a76a0c8a06df667efbe766c6eb3951e6fd25a5751d0651106be65ff9f3194d2208858da490f37e0488c3d5703fdb1a30b17854d255757cca0012c04b06d0917501eb07eed165d8759992d34901f081b960c1714bf183aabc1ee0b38437e48a4f920b64907c306c5f8ba6790365898c5888d311db27d79aa3b7b1620f3f3473bfbde0c5"}, {0xfe, 0x4e00, "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"}]}) 13:12:10 executing program 5: set_mempolicy(0x3, 0x0, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:10 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], 0x0, 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:12:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = accept$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000100)=""/209, 0xd1}], 0x49, 0x0, 0x3ff) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 13:12:10 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], 0x0, 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:12:10 executing program 3: socket$kcm(0x10, 0x2, 0x10) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_G_AUDIO(r2, 0x80345621, &(0x7f0000001bc0)) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x300000000) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000180)=ANY=[]) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) write$vhost_msg_v2(r0, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1, 0x2}}, 0x48) dup(r1) 13:12:10 executing program 5: set_mempolicy(0x3, 0x0, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:10 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], 0x0, 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:12:10 executing program 5: set_mempolicy(0x3, 0x0, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:10 executing program 3: socket$kcm(0x10, 0x2, 0x10) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_G_AUDIO(r1, 0x80345621, &(0x7f0000001bc0)) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x300000000) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000180)=ANY=[]) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) write$vhost_msg_v2(r0, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1, 0x2}}, 0x48) [ 141.721186][T11076] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.0'. [ 141.920377][ T35] usb 2-1: new high-speed USB device number 8 using dummy_hcd [ 142.221015][ T35] usb 2-1: too many configurations: 72, using maximum allowed: 8 13:12:11 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e20}, 0x6e) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000000)) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0x8) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r4, 0x40000000af01, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r4, 0x4008af00, &(0x7f0000000100)=0x300000000) ioctl$VHOST_SET_MEM_TABLE(r4, 0x4008af03, &(0x7f0000000180)=ANY=[]) write$vhost_msg_v2(r4, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1, 0x2}}, 0x48) 13:12:11 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 143.150383][ T35] usb 2-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 143.159421][ T35] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 143.168724][ T35] usb 2-1: Product: syz [ 143.172948][ T35] usb 2-1: Manufacturer: syz [ 143.177521][ T35] usb 2-1: SerialNumber: syz [ 143.231803][ T35] usb 2-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 143.350443][T10131] wlan1: Trigger new scan to find an IBSS to join [ 144.000220][ T35] usb 2-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 144.430164][ C1] usb 2-1: ath: unknown panic pattern! [ 144.621321][T11067] udc-core: couldn't find an available UDC or it's busy [ 144.628261][T11067] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 144.638464][ T9590] usb 2-1: USB disconnect, device number 8 [ 145.030145][ T35] ath9k_htc 2-1:1.0: ath9k_htc: Target is unresponsive [ 145.037087][ T35] ath9k_htc: Failed to initialize the device [ 145.043123][ T9590] usb 2-1: ath9k_htc: USB layer deinitialized [ 145.560131][ T9590] usb 2-1: new high-speed USB device number 9 using dummy_hcd [ 145.880480][ T9590] usb 2-1: too many configurations: 72, using maximum allowed: 8 13:12:14 executing program 3: socket$kcm(0x10, 0x2, 0x10) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_G_AUDIO(r1, 0x80345621, &(0x7f0000001bc0)) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x300000000) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000180)=ANY=[]) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:14 executing program 5: set_mempolicy(0x3, &(0x7f0000000140), 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = accept$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000100)=""/209, 0xd1}], 0x49, 0x0, 0x3ff) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 13:12:14 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:14 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e20}, 0x6e) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000000)) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0x8) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r4, 0x40000000af01, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r4, 0x4008af00, &(0x7f0000000100)=0x300000000) ioctl$VHOST_SET_MEM_TABLE(r4, 0x4008af03, &(0x7f0000000180)=ANY=[]) 13:12:15 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:15 executing program 3: socket$kcm(0x10, 0x2, 0x10) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_G_AUDIO(r1, 0x80345621, &(0x7f0000001bc0)) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x300000000) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:15 executing program 5: set_mempolicy(0x3, &(0x7f0000000140), 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 146.211861][ T9590] usb 2-1: unable to read config index 2 descriptor/all [ 146.219521][ T9590] usb 2-1: can't read configurations, error -71 13:12:15 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040)='NLBL_UNLBL\x00', r0) sendmsg$NLBL_UNLABEL_C_ACCEPT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x28, r2, 0x1, 0x0, 0x0, {0x7}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}]}, 0x28}}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x78, r2, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private0={0xfc, 0x0, [], 0x1}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @rand_addr=' \x01\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'macvlan0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'virt_wifi0\x00'}]}, 0x78}}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1d, 0x8, 0x209e20, 0x8000000001}, 0x40) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0xa8120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x9, 0x2, 0x2, 0x7fffffff, 0x0, 0x1, 0x101, [], r3, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x99f000, 0x0, 0x0, [0x0, 0xeca7020000000000, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x2c) 13:12:15 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:12:15 executing program 3: socket$kcm(0x10, 0x2, 0x10) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_G_AUDIO(r1, 0x80345621, &(0x7f0000001bc0)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) [ 146.269059][T11144] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.0'. 13:12:15 executing program 5: set_mempolicy(0x3, &(0x7f0000000140), 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:15 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 146.310461][ T270] wlan1: Trigger new scan to find an IBSS to join 13:12:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_getroute={0x1c, 0x1a, 0x1, 0x70bd2b, 0x25dfdbff, {0x2, 0x20, 0x20, 0x1, 0xfe, 0x1, 0xff, 0x6, 0x2080}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x200c010) tee(r0, r0, 0xf64, 0xb) sendmsg$nl_route(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2000000069000100000000000000000000000000000000000800030000000000"], 0x20}}, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r2, 0x40000000af01, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000100)=0x300000000) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f0000000180)=ANY=[]) write$vhost_msg_v2(r2, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1, 0x2}}, 0x48) r4 = dup(r3) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000000)={0x0, r4}) read(r2, &(0x7f0000000140)=""/98, 0x62) 13:12:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = accept$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000100)=""/209, 0xd1}], 0x49, 0x0, 0x3ff) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) splice(r2, 0x0, r3, 0x0, 0x4ffe0, 0x0) 13:12:15 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:12:15 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e20}, 0x6e) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000000)) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0x8) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r4, 0x40000000af01, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r4, 0x4008af00, &(0x7f0000000100)=0x300000000) 13:12:15 executing program 3: socket$kcm(0x10, 0x2, 0x10) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/video0\x00', 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:15 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:15 executing program 2 (fault-call:0 fault-nth:0): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:15 executing program 3: socket$kcm(0x10, 0x2, 0x10) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:15 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:15 executing program 3: socket$kcm(0x10, 0x2, 0x10) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) [ 147.135055][T11189] FAULT_INJECTION: forcing a failure. [ 147.135055][T11189] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 147.170022][T11189] CPU: 1 PID: 11189 Comm: syz-executor.2 Not tainted 5.12.0-rc4-syzkaller #0 [ 147.178785][T11189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 147.188882][T11189] Call Trace: [ 147.192153][T11189] dump_stack+0x137/0x19d [ 147.196488][T11189] should_fail+0x23c/0x250 [ 147.200893][T11189] should_fail_usercopy+0x16/0x20 [ 147.205913][T11189] _copy_from_user+0x1c/0xd0 [ 147.210543][T11189] __do_sys_bpf+0x143/0x99c0 [ 147.215129][T11189] ? kstrtoull+0x30e/0x350 [ 147.219573][T11189] ? kstrtouint_from_user+0x104/0x130 [ 147.224947][T11189] ? __rcu_read_unlock+0x5c/0x250 [ 147.230213][T11189] ? fsnotify_perm+0x59/0x2e0 [ 147.234980][T11189] ? __fsnotify_parent+0x32f/0x430 [ 147.240081][T11189] ? vfs_write+0x572/0x7e0 [ 147.244492][T11189] ? __fget_light+0x219/0x260 [ 147.249211][T11189] ? fput+0x2d/0x130 [ 147.253099][T11189] ? ksys_write+0x157/0x180 [ 147.257593][T11189] __x64_sys_bpf+0x3d/0x50 [ 147.262007][T11189] do_syscall_64+0x39/0x80 [ 147.266455][T11189] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 147.272387][T11189] RIP: 0033:0x466459 [ 147.276278][T11189] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 147.295864][T11189] RSP: 002b:00007f58f5ca4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 147.304253][T11189] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 147.312201][T11189] RDX: 0000000000000023 RSI: 0000000020000440 RDI: 0000000000000005 [ 147.320154][T11189] RBP: 00007f58f5ca41d0 R08: 0000000000000000 R09: 0000000000000000 [ 147.328238][T11189] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 13:12:16 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:16 executing program 1: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x2812, r0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) 13:12:16 executing program 2 (fault-call:0 fault-nth:1): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 147.336193][T11189] R13: 00007ffc14f2a3af R14: 00007f58f5ca4300 R15: 0000000000022000 [ 147.432136][T11214] FAULT_INJECTION: forcing a failure. [ 147.432136][T11214] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 147.464606][ T36] audit: type=1804 audit(1616850736.245:12): pid=11217 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir797142007/syzkaller.wR0gJ5/27/bus" dev="sda1" ino=14064 res=1 errno=0 [ 147.471879][T11214] CPU: 1 PID: 11214 Comm: syz-executor.2 Not tainted 5.12.0-rc4-syzkaller #0 [ 147.493389][ T36] audit: type=1804 audit(1616850736.275:13): pid=11220 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir797142007/syzkaller.wR0gJ5/27/bus" dev="sda1" ino=14064 res=1 errno=0 [ 147.498378][T11214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 147.532894][T11214] Call Trace: [ 147.536202][T11214] dump_stack+0x137/0x19d [ 147.540528][T11214] should_fail+0x23c/0x250 [ 147.544938][T11214] should_fail_usercopy+0x16/0x20 [ 147.549959][T11214] strncpy_from_user+0x21/0x250 [ 147.554797][T11214] ? memchr_inv+0x38/0x300 [ 147.559206][T11214] __do_sys_bpf+0xd2b/0x99c0 [ 147.563812][T11214] ? kstrtoull+0x30e/0x350 [ 147.568223][T11214] ? kstrtouint_from_user+0x104/0x130 [ 147.573594][T11214] ? __rcu_read_unlock+0x5c/0x250 [ 147.578614][T11214] ? fsnotify_perm+0x59/0x2e0 [ 147.583326][T11214] ? __fsnotify_parent+0x32f/0x430 [ 147.588448][T11214] ? vfs_write+0x572/0x7e0 [ 147.592933][T11214] ? __fget_light+0x219/0x260 [ 147.597599][T11214] ? fput+0x2d/0x130 [ 147.601520][T11214] ? ksys_write+0x157/0x180 [ 147.606021][T11214] __x64_sys_bpf+0x3d/0x50 [ 147.610463][T11214] do_syscall_64+0x39/0x80 [ 147.614897][T11214] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 147.620842][T11214] RIP: 0033:0x466459 [ 147.624800][T11214] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 147.644400][T11214] RSP: 002b:00007f58f5ca4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 147.652799][T11214] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 147.660758][T11214] RDX: 0000000000000023 RSI: 0000000020000440 RDI: 0000000000000005 [ 147.668720][T11214] RBP: 00007f58f5ca41d0 R08: 0000000000000000 R09: 0000000000000000 [ 147.676678][T11214] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 147.684638][T11214] R13: 00007ffc14f2a3af R14: 00007f58f5ca4300 R15: 0000000000022000 13:12:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = accept$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000100)=""/209, 0xd1}], 0x49, 0x0, 0x3ff) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) splice(r2, 0x0, r3, 0x0, 0x4ffe0, 0x0) 13:12:16 executing program 3: socket$kcm(0x10, 0x2, 0x10) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:16 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e20}, 0x6e) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000000)) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0x8) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r4, 0x40000000af01, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) 13:12:16 executing program 1: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x2812, r0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) 13:12:16 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(0x0, 0x0, 0x0) r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:16 executing program 2 (fault-call:0 fault-nth:2): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:16 executing program 3: socket$kcm(0x10, 0x2, 0x10) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) [ 147.983485][T11244] FAULT_INJECTION: forcing a failure. [ 147.983485][T11244] name failslab, interval 1, probability 0, space 0, times 1 [ 148.005199][T11244] CPU: 1 PID: 11244 Comm: syz-executor.2 Not tainted 5.12.0-rc4-syzkaller #0 [ 148.013970][T11244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.024007][T11244] Call Trace: [ 148.027277][T11244] dump_stack+0x137/0x19d [ 148.031663][T11244] should_fail+0x23c/0x250 [ 148.036102][T11244] __should_failslab+0x81/0x90 [ 148.040858][T11244] should_failslab+0x5/0x20 [ 148.045358][T11244] kmem_cache_alloc_node_trace+0x5b/0x310 [ 148.051073][T11244] ? __rcu_read_unlock+0x5c/0x250 [ 148.056096][T11244] ? __get_vm_area_node+0x11b/0x240 [ 148.061296][T11244] __get_vm_area_node+0x11b/0x240 [ 148.066316][T11244] __vmalloc_node_range+0xba/0x540 [ 148.071431][T11244] ? bpf_prog_alloc_no_stats+0x33/0x210 [ 148.076966][T11244] ? bpf_prog_alloc_no_stats+0x33/0x210 [ 148.082505][T11244] __vmalloc+0x5a/0x70 [ 148.086597][T11244] ? bpf_prog_alloc_no_stats+0x33/0x210 [ 148.092182][T11244] bpf_prog_alloc_no_stats+0x33/0x210 [ 148.097551][T11244] bpf_prog_alloc+0x14/0xd0 [ 148.102035][T11244] __do_sys_bpf+0x63de/0x99c0 [ 148.106766][T11244] ? kstrtoull+0x30e/0x350 [ 148.111183][T11244] ? kstrtouint_from_user+0x104/0x130 [ 148.116552][T11244] ? __rcu_read_unlock+0x5c/0x250 [ 148.121570][T11244] ? fsnotify_perm+0x59/0x2e0 [ 148.126247][T11244] ? __fsnotify_parent+0x32f/0x430 [ 148.131354][T11244] ? vfs_write+0x572/0x7e0 [ 148.135820][T11244] ? __fget_light+0x219/0x260 [ 148.140612][T11244] ? fput+0x2d/0x130 [ 148.144487][T11244] ? ksys_write+0x157/0x180 [ 148.149040][T11244] __x64_sys_bpf+0x3d/0x50 [ 148.153438][T11244] do_syscall_64+0x39/0x80 [ 148.157837][T11244] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 148.163751][T11244] RIP: 0033:0x466459 13:12:17 executing program 3: socket$kcm(0x10, 0x2, 0x10) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) [ 148.167659][T11244] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 148.187308][T11244] RSP: 002b:00007f58f5ca4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 148.195809][T11244] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 148.203757][T11244] RDX: 0000000000000023 RSI: 0000000020000440 RDI: 0000000000000005 [ 148.211708][T11244] RBP: 00007f58f5ca41d0 R08: 0000000000000000 R09: 0000000000000000 [ 148.219701][T11244] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 148.227646][T11244] R13: 00007ffc14f2a3af R14: 00007f58f5ca4300 R15: 0000000000022000 [ 148.237381][T11244] syz-executor.2: vmalloc: allocation failure: 4096 bytes, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=/,mems_allowed=0-1 [ 148.252780][T11244] CPU: 1 PID: 11244 Comm: syz-executor.2 Not tainted 5.12.0-rc4-syzkaller #0 [ 148.261536][T11244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.271581][T11244] Call Trace: [ 148.274844][T11244] dump_stack+0x137/0x19d [ 148.279216][T11244] warn_alloc+0x105/0x160 [ 148.283537][T11244] __vmalloc_node_range+0x1df/0x540 [ 148.288774][T11244] ? bpf_prog_alloc_no_stats+0x33/0x210 [ 148.294304][T11244] __vmalloc+0x5a/0x70 [ 148.298404][T11244] ? bpf_prog_alloc_no_stats+0x33/0x210 [ 148.303946][T11244] bpf_prog_alloc_no_stats+0x33/0x210 [ 148.309309][T11244] bpf_prog_alloc+0x14/0xd0 [ 148.313796][T11244] __do_sys_bpf+0x63de/0x99c0 [ 148.318504][T11244] ? kstrtoull+0x30e/0x350 [ 148.322932][T11244] ? kstrtouint_from_user+0x104/0x130 [ 148.328302][T11244] ? __rcu_read_unlock+0x5c/0x250 [ 148.333329][T11244] ? fsnotify_perm+0x59/0x2e0 [ 148.338002][T11244] ? __fsnotify_parent+0x32f/0x430 [ 148.343110][T11244] ? vfs_write+0x572/0x7e0 [ 148.347506][T11244] ? __fget_light+0x219/0x260 [ 148.352218][T11244] ? fput+0x2d/0x130 [ 148.356149][T11244] ? ksys_write+0x157/0x180 [ 148.360766][T11244] __x64_sys_bpf+0x3d/0x50 [ 148.365319][T11244] do_syscall_64+0x39/0x80 [ 148.369714][T11244] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 148.375586][T11244] RIP: 0033:0x466459 [ 148.379460][T11244] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 148.399212][T11244] RSP: 002b:00007f58f5ca4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 148.407604][T11244] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 148.415633][T11244] RDX: 0000000000000023 RSI: 0000000020000440 RDI: 0000000000000005 [ 148.423579][T11244] RBP: 00007f58f5ca41d0 R08: 0000000000000000 R09: 0000000000000000 13:12:17 executing program 3: socket$kcm(0x10, 0x2, 0x10) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) [ 148.431607][T11244] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 148.439564][T11244] R13: 00007ffc14f2a3af R14: 00007f58f5ca4300 R15: 0000000000022000 [ 148.449169][T11244] Mem-Info: [ 148.452583][T11244] active_anon:393 inactive_anon:245183 isolated_anon:0 [ 148.452583][T11244] active_file:5636 inactive_file:40729 isolated_file:0 [ 148.452583][T11244] unevictable:769 dirty:128 writeback:0 [ 148.452583][T11244] slab_reclaimable:10014 slab_unreclaimable:20678 [ 148.452583][T11244] mapped:59929 shmem:6196 pagetables:1488 bounce:0 13:12:17 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(0x0, 0x0, 0x0) r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 148.452583][T11244] free:1596834 free_pcp:1538 free_cma:0 [ 148.490909][T11244] Node 0 active_anon:1572kB inactive_anon:980264kB active_file:22416kB inactive_file:162840kB unevictable:1540kB isolated(anon):0kB isolated(file):0kB mapped:239716kB dirty:512kB writeback:0kB shmem:22780kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 659456kB writeback_tmp:0kB kernel_stack:4640kB pagetables:5848kB all_unreclaimable? no 13:12:17 executing program 3: socket$kcm(0x10, 0x2, 0x10) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:17 executing program 1: socket$kcm(0x10, 0x2, 0x10) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) [ 148.555329][T11244] Node 1 active_anon:0kB inactive_anon:468kB active_file:128kB inactive_file:76kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:2004kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:16kB pagetables:4kB all_unreclaimable? no [ 148.650021][T11244] Node 0 DMA free:15904kB min:176kB low:220kB high:264kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 148.680628][T11244] lowmem_reserve[]: 0 2862 3821 3821 3821 [ 148.696059][T11244] Node 0 DMA32 free:2294036kB min:32808kB low:41008kB high:49208kB reserved_highatomic:0KB active_anon:624kB inactive_anon:258360kB active_file:1036kB inactive_file:122352kB unevictable:0kB writepending:364kB present:3129332kB managed:2936712kB mlocked:0kB bounce:0kB free_pcp:2784kB local_pcp:1380kB free_cma:0kB [ 148.739152][T11244] lowmem_reserve[]: 0 0 959 959 959 13:12:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = accept$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000100)=""/209, 0xd1}], 0x49, 0x0, 0x3ff) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) splice(r2, 0x0, r3, 0x0, 0x4ffe0, 0x0) 13:12:17 executing program 3: socket$kcm(0x10, 0x2, 0x10) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) [ 148.750179][T11244] Node 0 Normal free:35208kB min:11000kB low:13748kB high:16496kB reserved_highatomic:0KB active_anon:948kB inactive_anon:717864kB active_file:21380kB inactive_file:40488kB unevictable:1540kB writepending:148kB present:1048576kB managed:982572kB mlocked:4kB bounce:0kB free_pcp:2100kB local_pcp:1160kB free_cma:0kB [ 148.783709][T11244] lowmem_reserve[]: 0 0 0 0 0 [ 148.788428][T11244] Node 1 Normal free:4046288kB min:46120kB low:57648kB high:69176kB reserved_highatomic:0KB active_anon:0kB inactive_anon:468kB active_file:128kB inactive_file:76kB unevictable:1536kB writepending:0kB present:4194304kB managed:4119864kB mlocked:0kB bounce:0kB free_pcp:1392kB local_pcp:624kB free_cma:0kB 13:12:17 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e20}, 0x6e) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000000)) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0x8) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r4, 0x40000000af01, 0x0) 13:12:17 executing program 1: socket$kcm(0x10, 0x2, 0x10) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:17 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(0x0, 0x0, 0x0) r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 148.844689][T11244] lowmem_reserve[]: 0 0 0 0 0 [ 148.849481][T11244] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 148.865727][T11244] Node 0 DMA32: 355*4kB (UME) 209*8kB (UME) 140*16kB (UME) 96*32kB (UME) 55*64kB (UM) 43*128kB (UM) 33*256kB (UME) 22*512kB (UM) 16*1024kB (UME) 9*2048kB (UM) 543*4096kB (UM) = 2296084kB [ 148.904284][T11244] Node 0 Normal: 758*4kB (UM) 561*8kB (UME) 340*16kB (UME) 270*32kB (UM) 103*64kB (M) 25*128kB (M) 5*256kB (M) 3*512kB (M) 1*1024kB (M) 0*2048kB 0*4096kB = 35232kB [ 148.934560][T11244] Node 1 Normal: 2*4kB (UM) 1*8kB (E) 0*16kB 2*32kB (ME) 2*64kB (UM) 2*128kB (UE) 2*256kB (ME) 1*512kB (U) 0*1024kB 1*2048kB (M) 987*4096kB (M) = 4046288kB [ 148.973818][T11244] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 148.984238][T11244] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 148.993888][T11244] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB 13:12:17 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:17 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:17 executing program 1: socket$kcm(0x10, 0x2, 0x10) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:17 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = open(0x0, 0x141042, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 149.003633][T11244] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 149.013144][T11244] 52243 total pagecache pages [ 149.017815][T11244] 0 pages in swap cache [ 149.022441][T11244] Swap cache stats: add 0, delete 0, find 0/0 [ 149.028583][T11244] Free swap = 0kB [ 149.032703][T11244] Total swap = 0kB [ 149.036441][T11244] 2097051 pages RAM [ 149.040512][T11244] 0 pages HighMem/MovableOnly [ 149.045168][T11244] 83288 pages reserved [ 149.049211][T11244] 0 pages cma reserved 13:12:17 executing program 1: socket$kcm(0x10, 0x2, 0x10) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:17 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:17 executing program 1: socket$kcm(0x10, 0x2, 0x10) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) [ 149.279977][ T24] wlan1: Creating new IBSS network, BSSID e2:84:2b:ad:93:92 13:12:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = accept$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000100)=""/209, 0xd1}], 0x49, 0x0, 0x3ff) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 13:12:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = open(0x0, 0x141042, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:18 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e20}, 0x6e) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000000)) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0x8) openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) 13:12:18 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x2, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:18 executing program 1: socket$kcm(0x10, 0x2, 0x10) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:18 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = open(0x0, 0x141042, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:18 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:18 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:18 executing program 1: socket$kcm(0x10, 0x2, 0x10) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:19 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = accept$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000100)=""/209, 0xd1}], 0x49, 0x0, 0x3ff) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 13:12:19 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:19 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:19 executing program 1: socket$kcm(0x10, 0x2, 0x10) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:19 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:19 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e20}, 0x6e) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000000)) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0x8) 13:12:19 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:19 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:19 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:19 executing program 1: socket$kcm(0x10, 0x2, 0x10) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:19 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x7, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:19 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = accept$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000100)=""/209, 0xd1}], 0x49, 0x0, 0x3ff) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 13:12:20 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:20 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x8, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:20 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:20 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:20 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e20}, 0x6e) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000000)) 13:12:20 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:20 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:20 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x9, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:20 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:20 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:20 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xa, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = accept$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000100)=""/209, 0xd1}], 0x49, 0x0, 0x3ff) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 13:12:21 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:21 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:21 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xb, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:21 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:21 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e20}, 0x6e) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:21 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:21 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:21 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xc, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:21 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:21 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xd, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:21 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = accept$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000100)=""/209, 0xd1}], 0x49, 0x0, 0x3ff) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 13:12:21 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:21 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:21 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:21 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xe, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:22 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e20}, 0x6e) listen(r1, 0x0) socket(0x15, 0x80005, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:22 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:22 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:22 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xf, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:22 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:22 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, 0x0) 13:12:22 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x10, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 153.389555][T11502] 9pnet: Insufficient options for proto=fd 13:12:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = accept$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000100)=""/209, 0xd1}], 0x49, 0x0, 0x3ff) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 13:12:22 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e20}, 0x6e) listen(r1, 0x0) socket(0x15, 0x80005, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:22 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:22 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:22 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, 0x0) 13:12:22 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x11, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:22 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:22 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e20}, 0x6e) listen(r1, 0x0) socket(0x15, 0x80005, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:22 executing program 5: socket$kcm(0x10, 0x2, 0x10) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:22 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:22 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x12, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:22 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, 0x0) [ 154.112337][T11524] 9pnet: Insufficient options for proto=fd [ 154.174949][T11533] 9pnet: Insufficient options for proto=fd 13:12:23 executing program 5 (fault-call:4 fault-nth:0): set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:23 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e20}, 0x6e) listen(r1, 0x0) r2 = dup(0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = accept$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000100)=""/209, 0xd1}], 0x49, 0x0, 0x3ff) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 13:12:23 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x13, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:23 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:23 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:23 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e20}, 0x6e) listen(r1, 0x0) r2 = dup(0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}}) [ 154.995800][T11563] 9pnet: Insufficient options for proto=fd [ 155.004560][T11560] FAULT_INJECTION: forcing a failure. [ 155.004560][T11560] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 155.030159][T11560] CPU: 1 PID: 11560 Comm: syz-executor.5 Not tainted 5.12.0-rc4-syzkaller #0 [ 155.039078][T11560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 155.049135][T11560] Call Trace: [ 155.052402][T11560] dump_stack+0x137/0x19d [ 155.056722][T11560] should_fail+0x23c/0x250 [ 155.061135][T11560] should_fail_usercopy+0x16/0x20 [ 155.066153][T11560] _copy_from_user+0x1c/0xd0 [ 155.070749][T11560] perf_copy_attr+0x14c/0x5a0 [ 155.075443][T11560] __se_sys_perf_event_open+0xb6/0x25d0 [ 155.081051][T11560] ? vfs_write+0x572/0x7e0 [ 155.085539][T11560] ? __fget_light+0x219/0x260 [ 155.090208][T11560] __x64_sys_perf_event_open+0x63/0x70 13:12:23 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e20}, 0x6e) listen(r1, 0x0) r2 = dup(0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}}) [ 155.095670][T11560] do_syscall_64+0x39/0x80 [ 155.100082][T11560] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 155.105997][T11560] RIP: 0033:0x466459 [ 155.109885][T11560] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 155.123729][T11576] 9pnet: Insufficient options for proto=fd [ 155.129475][T11560] RSP: 002b:00007f44b8ef7188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 13:12:23 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x14, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:23 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:24 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}]}) [ 155.129501][T11560] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 155.151662][T11560] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 155.159624][T11560] RBP: 00007f44b8ef71d0 R08: 0000000000000000 R09: 0000000000000000 [ 155.167587][T11560] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 155.175549][T11560] R13: 00007ffedca1055f R14: 00007f44b8ef7300 R15: 0000000000022000 13:12:24 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x15, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:24 executing program 5 (fault-call:4 fault-nth:1): set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:24 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) [ 155.224255][T11579] 9pnet: Insufficient options for proto=fd [ 155.325633][T11593] FAULT_INJECTION: forcing a failure. [ 155.325633][T11593] name failslab, interval 1, probability 0, space 0, times 0 [ 155.339923][T11593] CPU: 0 PID: 11593 Comm: syz-executor.5 Not tainted 5.12.0-rc4-syzkaller #0 [ 155.348722][T11593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 155.358768][T11593] Call Trace: [ 155.362200][T11593] dump_stack+0x137/0x19d [ 155.366521][T11593] should_fail+0x23c/0x250 [ 155.370925][T11593] __should_failslab+0x81/0x90 [ 155.375704][T11593] ? perf_event_alloc+0x99/0x1b20 [ 155.380729][T11593] should_failslab+0x5/0x20 [ 155.385304][T11593] kmem_cache_alloc_trace+0x49/0x340 [ 155.390579][T11593] ? expand_files+0x55/0x520 [ 155.395165][T11593] perf_event_alloc+0x99/0x1b20 [ 155.400014][T11593] ? _raw_spin_unlock+0x22/0x40 [ 155.404865][T11593] ? alloc_fd+0x35d/0x3b0 [ 155.409185][T11593] ? __rcu_read_unlock+0x5c/0x250 [ 155.414214][T11593] __se_sys_perf_event_open+0x5ce/0x25d0 [ 155.419843][T11593] ? __fget_light+0x219/0x260 [ 155.424515][T11593] __x64_sys_perf_event_open+0x63/0x70 [ 155.429980][T11593] do_syscall_64+0x39/0x80 [ 155.434454][T11593] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 155.440347][T11593] RIP: 0033:0x466459 [ 155.444227][T11593] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 155.463859][T11593] RSP: 002b:00007f44b8ef7188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 155.472256][T11593] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 155.480213][T11593] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 155.488171][T11593] RBP: 00007f44b8ef71d0 R08: 0000000000000000 R09: 0000000000000000 [ 155.496135][T11593] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 155.504162][T11593] R13: 00007ffedca1055f R14: 00007f44b8ef7300 R15: 0000000000022000 13:12:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = accept$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000100)=""/209, 0xd1}], 0x49, 0x0, 0x3ff) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 13:12:24 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x16, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:24 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) socket$inet6(0xa, 0x40000080806, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e20}, 0x6e) r1 = socket(0x15, 0x80005, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:24 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}]}) 13:12:24 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:24 executing program 5 (fault-call:4 fault-nth:2): set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 155.882055][T11608] FAULT_INJECTION: forcing a failure. [ 155.882055][T11608] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 155.895311][T11608] CPU: 0 PID: 11608 Comm: syz-executor.5 Not tainted 5.12.0-rc4-syzkaller #0 [ 155.904064][T11608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 155.914186][T11608] Call Trace: [ 155.917454][T11608] dump_stack+0x137/0x19d [ 155.921812][T11608] should_fail+0x23c/0x250 [ 155.926324][T11608] __alloc_pages_nodemask+0xea/0x350 [ 155.931602][T11608] ? get_page_from_freelist+0x366/0x630 [ 155.937148][T11608] kmem_getpages+0x1a/0xd0 [ 155.941611][T11608] cache_grow_begin+0x4c/0x1a0 [ 155.946406][T11608] ____cache_alloc_node+0x1ae/0x210 [ 155.951596][T11608] kmem_cache_alloc_trace+0x24d/0x340 [ 155.956958][T11608] ? perf_event_alloc+0x99/0x1b20 [ 155.962014][T11608] perf_event_alloc+0x99/0x1b20 [ 155.966861][T11608] ? _raw_spin_unlock+0x22/0x40 [ 155.971789][T11608] ? alloc_fd+0x35d/0x3b0 [ 155.976113][T11608] ? __rcu_read_unlock+0x5c/0x250 [ 155.981184][T11608] __se_sys_perf_event_open+0x5ce/0x25d0 [ 155.986862][T11608] ? __fget_light+0x219/0x260 [ 155.991531][T11608] __x64_sys_perf_event_open+0x63/0x70 [ 155.997045][T11608] do_syscall_64+0x39/0x80 [ 156.001460][T11608] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 156.007356][T11608] RIP: 0033:0x466459 [ 156.011302][T11608] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 13:12:24 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) socket$inet6(0xa, 0x40000080806, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e20}, 0x6e) r1 = socket(0x15, 0x80005, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:24 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) socket$inet6(0xa, 0x40000080806, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e20}, 0x6e) r1 = socket(0x15, 0x80005, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:24 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x17, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:24 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:24 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000001a00)={0xa, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}, {0x0, 0x33, &(0x7f00000019c0)=""/51}]}) 13:12:24 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}]}) [ 156.030973][T11608] RSP: 002b:00007f44b8ef7188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 156.039426][T11608] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 156.047397][T11608] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 156.055363][T11608] RBP: 00007f44b8ef71d0 R08: 0000000000000000 R09: 0000000000000000 [ 156.063323][T11608] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 156.071320][T11608] R13: 00007ffedca1055f R14: 00007f44b8ef7300 R15: 0000000000022000 13:12:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = accept$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000100)=""/209, 0xd1}], 0x49, 0x0, 0x3ff) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 13:12:25 executing program 5 (fault-call:4 fault-nth:3): set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:25 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x18, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:25 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, 0x0) 13:12:25 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x0, 0xef, &(0x7f00000018c0)=""/239}]}) [ 156.803429][T11652] FAULT_INJECTION: forcing a failure. [ 156.803429][T11652] name failslab, interval 1, probability 0, space 0, times 0 [ 156.816327][T11652] CPU: 1 PID: 11652 Comm: syz-executor.5 Not tainted 5.12.0-rc4-syzkaller #0 [ 156.825141][T11652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 156.835265][T11652] Call Trace: [ 156.838534][T11652] dump_stack+0x137/0x19d [ 156.842860][T11652] should_fail+0x23c/0x250 [ 156.847347][T11652] __should_failslab+0x81/0x90 [ 156.852115][T11652] ? perf_uprobe_init+0x45/0x140 [ 156.857045][T11652] should_failslab+0x5/0x20 [ 156.861549][T11652] __kmalloc_track_caller+0x64/0x380 [ 156.866830][T11652] ? strnlen_user+0x137/0x1c0 [ 156.871587][T11652] strndup_user+0x73/0x120 [ 156.876051][T11652] perf_uprobe_init+0x45/0x140 [ 156.880813][T11652] perf_uprobe_event_init+0xde/0x140 [ 156.886105][T11652] perf_try_init_event+0x21a/0x400 [ 156.891252][T11652] perf_event_alloc+0x80b/0x1b20 [ 156.896168][T11652] ? _raw_spin_unlock+0x22/0x40 [ 156.900998][T11652] ? alloc_fd+0x35d/0x3b0 [ 156.905305][T11652] __se_sys_perf_event_open+0x5ce/0x25d0 [ 156.911108][T11652] ? __fget_light+0x219/0x260 [ 156.915820][T11652] __x64_sys_perf_event_open+0x63/0x70 [ 156.921266][T11652] do_syscall_64+0x39/0x80 [ 156.925658][T11652] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 156.931534][T11652] RIP: 0033:0x466459 13:12:25 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x19, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:25 executing program 5 (fault-call:4 fault-nth:4): set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:25 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x0, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:25 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x1a, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:25 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) listen(0xffffffffffffffff, 0x0) r1 = socket(0x15, 0x80005, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:25 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, 0x0) [ 156.935403][T11652] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 156.955059][T11652] RSP: 002b:00007f44b8ef7188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 156.963455][T11652] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 156.971403][T11652] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 156.979364][T11652] RBP: 00007f44b8ef71d0 R08: 0000000000000000 R09: 0000000000000000 [ 156.987379][T11652] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 156.995394][T11652] R13: 00007ffedca1055f R14: 00007f44b8ef7300 R15: 0000000000022000 13:12:25 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x1b, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 157.080668][T11669] FAULT_INJECTION: forcing a failure. [ 157.080668][T11669] name failslab, interval 1, probability 0, space 0, times 0 [ 157.106125][T11669] CPU: 0 PID: 11669 Comm: syz-executor.5 Not tainted 5.12.0-rc4-syzkaller #0 [ 157.114901][T11669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 157.125019][T11669] Call Trace: [ 157.128292][T11669] dump_stack+0x137/0x19d [ 157.132623][T11669] should_fail+0x23c/0x250 [ 157.137038][T11669] ? getname_kernel+0x37/0x1d0 [ 157.141798][T11669] __should_failslab+0x81/0x90 [ 157.146635][T11669] should_failslab+0x5/0x20 [ 157.151235][T11669] kmem_cache_alloc+0x46/0x320 [ 157.155992][T11669] ? __list_del_entry_valid+0x54/0xc0 [ 157.161447][T11669] getname_kernel+0x37/0x1d0 [ 157.166032][T11669] kern_path+0x19/0x40 [ 157.170089][T11669] create_local_trace_uprobe+0x3f/0x3c0 [ 157.175627][T11669] perf_uprobe_init+0xbe/0x140 [ 157.180443][T11669] perf_uprobe_event_init+0xde/0x140 [ 157.185796][T11669] perf_try_init_event+0x21a/0x400 [ 157.190911][T11669] perf_event_alloc+0x80b/0x1b20 [ 157.195855][T11669] ? _raw_spin_unlock+0x22/0x40 [ 157.200688][T11669] ? alloc_fd+0x35d/0x3b0 [ 157.204998][T11669] __se_sys_perf_event_open+0x5ce/0x25d0 [ 157.210612][T11669] ? __fget_light+0x219/0x260 [ 157.215337][T11669] __x64_sys_perf_event_open+0x63/0x70 [ 157.220796][T11669] do_syscall_64+0x39/0x80 [ 157.225205][T11669] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 157.231087][T11669] RIP: 0033:0x466459 [ 157.234974][T11669] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 157.254634][T11669] RSP: 002b:00007f44b8ef7188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 157.263072][T11669] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 157.271100][T11669] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 157.279051][T11669] RBP: 00007f44b8ef71d0 R08: 0000000000000000 R09: 0000000000000000 [ 157.287006][T11669] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 157.294954][T11669] R13: 00007ffedca1055f R14: 00007f44b8ef7300 R15: 0000000000022000 13:12:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = accept$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000100)=""/209, 0xd1}], 0x49, 0x0, 0x3ff) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 13:12:26 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, 0x0) 13:12:26 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) listen(0xffffffffffffffff, 0x0) r1 = socket(0x15, 0x80005, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:26 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x0, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x1c, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:26 executing program 5 (fault-call:4 fault-nth:5): set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x1d, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:26 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x1e, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 157.759290][T11700] FAULT_INJECTION: forcing a failure. [ 157.759290][T11700] name failslab, interval 1, probability 0, space 0, times 0 [ 157.803192][T11700] CPU: 0 PID: 11700 Comm: syz-executor.5 Not tainted 5.12.0-rc4-syzkaller #0 [ 157.811969][T11700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 157.822015][T11700] Call Trace: [ 157.825284][T11700] dump_stack+0x137/0x19d [ 157.829640][T11700] should_fail+0x23c/0x250 [ 157.834055][T11700] __should_failslab+0x81/0x90 [ 157.838824][T11700] ? create_local_trace_uprobe+0xa9/0x3c0 [ 157.844543][T11700] should_failslab+0x5/0x20 13:12:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x21, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x22, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 157.849047][T11700] kmem_cache_alloc_trace+0x49/0x340 [ 157.854405][T11700] create_local_trace_uprobe+0xa9/0x3c0 [ 157.859941][T11700] perf_uprobe_init+0xbe/0x140 [ 157.864774][T11700] perf_uprobe_event_init+0xde/0x140 [ 157.870057][T11700] perf_try_init_event+0x21a/0x400 [ 157.875176][T11700] perf_event_alloc+0x80b/0x1b20 [ 157.880104][T11700] ? _raw_spin_unlock+0x22/0x40 [ 157.885020][T11700] ? alloc_fd+0x35d/0x3b0 [ 157.889340][T11700] __se_sys_perf_event_open+0x5ce/0x25d0 [ 157.894976][T11700] ? __fget_light+0x219/0x260 [ 157.899695][T11700] __x64_sys_perf_event_open+0x63/0x70 [ 157.905157][T11700] do_syscall_64+0x39/0x80 [ 157.909566][T11700] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 157.915536][T11700] RIP: 0033:0x466459 [ 157.919421][T11700] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 157.939041][T11700] RSP: 002b:00007f44b8ef7188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 13:12:26 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) [ 157.947450][T11700] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 157.955503][T11700] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 157.963515][T11700] RBP: 00007f44b8ef71d0 R08: 0000000000000000 R09: 0000000000000000 [ 157.971479][T11700] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 157.979435][T11700] R13: 00007ffedca1055f R14: 00007f44b8ef7300 R15: 0000000000022000 [ 158.035199][T11700] trace_uprobe: Failed to allocate trace_uprobe.(-12) 13:12:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = accept$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000100)=""/209, 0xd1}], 0x49, 0x0, 0x3ff) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 13:12:27 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) listen(0xffffffffffffffff, 0x0) r1 = socket(0x15, 0x80005, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:27 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:12:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x23, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:27 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}]}) 13:12:27 executing program 5 (fault-call:4 fault-nth:6): set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xf4240, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:27 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}]}) [ 158.673376][T11740] FAULT_INJECTION: forcing a failure. [ 158.673376][T11740] name failslab, interval 1, probability 0, space 0, times 0 [ 158.706510][T11740] CPU: 1 PID: 11740 Comm: syz-executor.5 Not tainted 5.12.0-rc4-syzkaller #0 [ 158.715291][T11740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 158.725330][T11740] Call Trace: [ 158.728601][T11740] dump_stack+0x137/0x19d [ 158.732932][T11740] should_fail+0x23c/0x250 [ 158.737347][T11740] __should_failslab+0x81/0x90 [ 158.742128][T11740] ? kzalloc+0x16/0x20 [ 158.746180][T11740] should_failslab+0x5/0x20 [ 158.750683][T11740] __kmalloc+0x66/0x380 [ 158.754827][T11740] ? ____cache_alloc_node+0x15d/0x210 [ 158.760195][T11740] kzalloc+0x16/0x20 [ 158.764098][T11740] trace_probe_init+0x41/0x250 13:12:27 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:27 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) [ 158.768856][T11740] create_local_trace_uprobe+0xd1/0x3c0 [ 158.774399][T11740] perf_uprobe_init+0xbe/0x140 [ 158.779158][T11740] perf_uprobe_event_init+0xde/0x140 [ 158.784441][T11740] perf_try_init_event+0x21a/0x400 [ 158.789546][T11740] perf_event_alloc+0x80b/0x1b20 [ 158.794488][T11740] ? _raw_spin_unlock+0x22/0x40 [ 158.799333][T11740] ? alloc_fd+0x35d/0x3b0 [ 158.803659][T11740] __se_sys_perf_event_open+0x5ce/0x25d0 [ 158.809312][T11740] ? __fget_light+0x219/0x260 [ 158.814042][T11740] __x64_sys_perf_event_open+0x63/0x70 [ 158.819545][T11740] do_syscall_64+0x39/0x80 [ 158.823981][T11740] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 158.829944][T11740] RIP: 0033:0x466459 [ 158.833824][T11740] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 158.853442][T11740] RSP: 002b:00007f44b8ef7188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 158.861846][T11740] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 13:12:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x2, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:27 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) [ 158.869805][T11740] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 158.877770][T11740] RBP: 00007f44b8ef71d0 R08: 0000000000000000 R09: 0000000000000000 [ 158.885787][T11740] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 158.893810][T11740] R13: 00007ffedca1055f R14: 00007f44b8ef7300 R15: 0000000000022000 [ 158.972202][T11740] trace_uprobe: Failed to allocate trace_uprobe.(-12) 13:12:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = accept$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000100)=""/209, 0xd1}], 0x49, 0x0, 0x3ff) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 13:12:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x3, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:28 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}]}) 13:12:28 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:28 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:28 executing program 5 (fault-call:4 fault-nth:7): set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:28 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x0, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x4, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:28 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:28 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) [ 159.617680][T11785] FAULT_INJECTION: forcing a failure. [ 159.617680][T11785] name failslab, interval 1, probability 0, space 0, times 0 [ 159.675597][T11785] CPU: 0 PID: 11785 Comm: syz-executor.5 Not tainted 5.12.0-rc4-syzkaller #0 [ 159.684377][T11785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 159.694429][T11785] Call Trace: [ 159.697701][T11785] dump_stack+0x137/0x19d [ 159.702018][T11785] should_fail+0x23c/0x250 [ 159.706542][T11785] __should_failslab+0x81/0x90 [ 159.711300][T11785] ? kzalloc+0x16/0x20 [ 159.715362][T11785] should_failslab+0x5/0x20 [ 159.719902][T11785] __kmalloc+0x66/0x380 13:12:28 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x0, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 159.724143][T11785] ? ____cache_alloc_node+0x15d/0x210 [ 159.729505][T11785] kzalloc+0x16/0x20 [ 159.733389][T11785] trace_probe_init+0x41/0x250 [ 159.738152][T11785] create_local_trace_uprobe+0xd1/0x3c0 [ 159.743692][T11785] perf_uprobe_init+0xbe/0x140 [ 159.748513][T11785] perf_uprobe_event_init+0xde/0x140 [ 159.753813][T11785] perf_try_init_event+0x21a/0x400 [ 159.758920][T11785] perf_event_alloc+0x80b/0x1b20 [ 159.763852][T11785] ? _raw_spin_unlock+0x22/0x40 [ 159.768733][T11785] ? alloc_fd+0x35d/0x3b0 [ 159.773059][T11785] __se_sys_perf_event_open+0x5ce/0x25d0 [ 159.778701][T11785] ? __fget_light+0x219/0x260 [ 159.783374][T11785] __x64_sys_perf_event_open+0x63/0x70 [ 159.789011][T11785] do_syscall_64+0x39/0x80 [ 159.793453][T11785] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 159.799342][T11785] RIP: 0033:0x466459 [ 159.803261][T11785] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 159.822863][T11785] RSP: 002b:00007f44b8ef7188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 159.831270][T11785] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 159.839234][T11785] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 159.847191][T11785] RBP: 00007f44b8ef71d0 R08: 0000000000000000 R09: 0000000000000000 [ 159.855248][T11785] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 159.863208][T11785] R13: 00007ffedca1055f R14: 00007f44b8ef7300 R15: 0000000000022000 [ 159.914719][T11785] trace_uprobe: Failed to allocate trace_uprobe.(-12) 13:12:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = accept$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000100)=""/209, 0xd1}], 0x49, 0x0, 0x3ff) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:12:29 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x9, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:29 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x0, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:29 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:29 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x0, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:29 executing program 5 (fault-call:4 fault-nth:8): set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:29 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x12, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:29 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:12:29 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x0, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) [ 160.519174][T11830] FAULT_INJECTION: forcing a failure. [ 160.519174][T11830] name failslab, interval 1, probability 0, space 0, times 0 [ 160.566394][T11830] CPU: 0 PID: 11830 Comm: syz-executor.5 Not tainted 5.12.0-rc4-syzkaller #0 [ 160.575173][T11830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.585223][T11830] Call Trace: [ 160.588540][T11830] dump_stack+0x137/0x19d [ 160.592873][T11830] should_fail+0x23c/0x250 [ 160.597279][T11830] __should_failslab+0x81/0x90 [ 160.602031][T11830] ? trace_probe_init+0x1e1/0x250 [ 160.607066][T11830] should_failslab+0x5/0x20 [ 160.611570][T11830] __kmalloc_track_caller+0x64/0x380 [ 160.616849][T11830] ? trace_probe_init+0x1bd/0x250 [ 160.621872][T11830] kstrdup+0x31/0x70 [ 160.625767][T11830] trace_probe_init+0x1e1/0x250 [ 160.630627][T11830] create_local_trace_uprobe+0xd1/0x3c0 [ 160.636204][T11830] perf_uprobe_init+0xbe/0x140 [ 160.641022][T11830] perf_uprobe_event_init+0xde/0x140 [ 160.646318][T11830] perf_try_init_event+0x21a/0x400 [ 160.651421][T11830] perf_event_alloc+0x80b/0x1b20 [ 160.656351][T11830] ? _raw_spin_unlock+0x22/0x40 [ 160.661270][T11830] ? alloc_fd+0x35d/0x3b0 [ 160.665722][T11830] __se_sys_perf_event_open+0x5ce/0x25d0 [ 160.671355][T11830] ? __fget_light+0x219/0x260 [ 160.676034][T11830] __x64_sys_perf_event_open+0x63/0x70 [ 160.681522][T11830] do_syscall_64+0x39/0x80 [ 160.685929][T11830] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 160.691819][T11830] RIP: 0033:0x466459 [ 160.695700][T11830] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 13:12:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = accept$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000100)=""/209, 0xd1}], 0x49, 0x0, 0x3ff) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:12:29 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) [ 160.715290][T11830] RSP: 002b:00007f44b8ef7188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 160.723695][T11830] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 160.731655][T11830] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 160.739619][T11830] RBP: 00007f44b8ef71d0 R08: 0000000000000000 R09: 0000000000000000 [ 160.747577][T11830] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 160.755544][T11830] R13: 00007ffedca1055f R14: 00007f44b8ef7300 R15: 0000000000022000 13:12:29 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x14, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:29 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:12:29 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:29 executing program 5 (fault-call:4 fault-nth:9): set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = accept$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000100)=""/209, 0xd1}], 0x49, 0x0, 0x3ff) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 160.783476][T11830] trace_uprobe: Failed to allocate trace_uprobe.(-12) 13:12:29 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x0, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:29 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x19, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:29 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:12:29 executing program 4: bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(0xffffffffffffffff) r0 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r0, 0x0) r1 = socket(0x15, 0x80005, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno'}}) [ 160.908786][T11863] FAULT_INJECTION: forcing a failure. [ 160.908786][T11863] name failslab, interval 1, probability 0, space 0, times 0 [ 160.967973][T11863] CPU: 0 PID: 11863 Comm: syz-executor.5 Not tainted 5.12.0-rc4-syzkaller #0 [ 160.976861][T11863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.986906][T11863] Call Trace: [ 160.991480][T11863] dump_stack+0x137/0x19d [ 160.995938][T11863] should_fail+0x23c/0x250 [ 161.000403][T11863] __should_failslab+0x81/0x90 [ 161.005157][T11863] ? create_local_trace_uprobe+0x235/0x3c0 [ 161.010960][T11863] should_failslab+0x5/0x20 [ 161.015520][T11863] __kmalloc_track_caller+0x64/0x380 [ 161.020887][T11863] ? kstrdup+0x4c/0x70 [ 161.024960][T11863] kstrdup+0x31/0x70 [ 161.028852][T11863] create_local_trace_uprobe+0x235/0x3c0 [ 161.034503][T11863] perf_uprobe_init+0xbe/0x140 [ 161.039263][T11863] perf_uprobe_event_init+0xde/0x140 [ 161.044574][T11863] perf_try_init_event+0x21a/0x400 [ 161.049685][T11863] perf_event_alloc+0x80b/0x1b20 [ 161.054692][T11863] ? _raw_spin_unlock+0x22/0x40 [ 161.059541][T11863] ? alloc_fd+0x35d/0x3b0 [ 161.062122][T11883] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.0'. [ 161.063918][T11863] __se_sys_perf_event_open+0x5ce/0x25d0 [ 161.078799][T11863] ? __fget_light+0x219/0x260 [ 161.083472][T11863] __x64_sys_perf_event_open+0x63/0x70 [ 161.089031][T11863] do_syscall_64+0x39/0x80 [ 161.093449][T11863] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 161.099440][T11863] RIP: 0033:0x466459 13:12:29 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x0, 0x0}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) accept$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 13:12:29 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1c, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 161.103319][T11863] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 161.123068][T11863] RSP: 002b:00007f44b8ef7188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 161.131609][T11863] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 161.139573][T11863] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 161.147540][T11863] RBP: 00007f44b8ef71d0 R08: 0000000000000000 R09: 0000000000000000 [ 161.155507][T11863] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 13:12:30 executing program 4: bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(0xffffffffffffffff) r0 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r0, 0x0) r1 = socket(0x15, 0x80005, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno'}}) 13:12:30 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x0, 0x0}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) [ 161.163500][T11863] R13: 00007ffedca1055f R14: 00007f44b8ef7300 R15: 0000000000022000 13:12:30 executing program 5 (fault-call:4 fault-nth:10): set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1e, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:30 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) [ 161.293199][T11900] FAULT_INJECTION: forcing a failure. [ 161.293199][T11900] name failslab, interval 1, probability 0, space 0, times 0 [ 161.313972][T11900] CPU: 0 PID: 11900 Comm: syz-executor.5 Not tainted 5.12.0-rc4-syzkaller #0 [ 161.322749][T11900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 161.332796][T11900] Call Trace: [ 161.336068][T11900] dump_stack+0x137/0x19d [ 161.340390][T11900] should_fail+0x23c/0x250 [ 161.344798][T11900] __should_failslab+0x81/0x90 [ 161.349554][T11900] ? traceprobe_set_print_fmt+0x45/0xa0 [ 161.355089][T11900] should_failslab+0x5/0x20 [ 161.359627][T11900] __kmalloc+0x66/0x380 [ 161.364757][T11900] traceprobe_set_print_fmt+0x45/0xa0 [ 161.370119][T11900] create_local_trace_uprobe+0x2eb/0x3c0 [ 161.375750][T11900] perf_uprobe_init+0xbe/0x140 [ 161.380511][T11900] perf_uprobe_event_init+0xde/0x140 [ 161.385799][T11900] perf_try_init_event+0x21a/0x400 [ 161.390914][T11900] perf_event_alloc+0x80b/0x1b20 [ 161.395912][T11900] ? _raw_spin_unlock+0x22/0x40 [ 161.400825][T11900] ? alloc_fd+0x35d/0x3b0 [ 161.405143][T11900] __se_sys_perf_event_open+0x5ce/0x25d0 [ 161.410772][T11900] ? __fget_light+0x219/0x260 [ 161.415449][T11900] __x64_sys_perf_event_open+0x63/0x70 [ 161.420951][T11900] do_syscall_64+0x39/0x80 [ 161.425431][T11900] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 161.431326][T11900] RIP: 0033:0x466459 13:12:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x3f7, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:30 executing program 4: bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(0xffffffffffffffff) r0 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r0, 0x0) r1 = socket(0x15, 0x80005, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno'}}) 13:12:30 executing program 4: r0 = socket$unix(0x1, 0x0, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) [ 161.435214][T11900] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 161.454837][T11900] RSP: 002b:00007f44b8ef7188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 161.463245][T11900] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 161.471209][T11900] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 161.479174][T11900] RBP: 00007f44b8ef71d0 R08: 0000000000000000 R09: 0000000000000000 13:12:30 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:30 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x0, 0x0}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) [ 161.487137][T11900] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 161.495124][T11900] R13: 00007ffedca1055f R14: 00007f44b8ef7300 R15: 0000000000022000 13:12:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 13:12:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x3b00, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:30 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:30 executing program 4: r0 = socket$unix(0x1, 0x0, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:30 executing program 5 (fault-call:4 fault-nth:11): set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:30 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:30 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x0, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x6c00, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:30 executing program 4: r0 = socket$unix(0x1, 0x0, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) [ 161.912282][T11941] FAULT_INJECTION: forcing a failure. [ 161.912282][T11941] name failslab, interval 1, probability 0, space 0, times 0 [ 161.933588][T11941] CPU: 0 PID: 11941 Comm: syz-executor.5 Not tainted 5.12.0-rc4-syzkaller #0 [ 161.942354][T11941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 161.952402][T11941] Call Trace: [ 161.955674][T11941] dump_stack+0x137/0x19d [ 161.960003][T11941] should_fail+0x23c/0x250 [ 161.964415][T11941] __should_failslab+0x81/0x90 [ 161.969204][T11941] ? traceprobe_set_print_fmt+0x45/0xa0 [ 161.974747][T11941] should_failslab+0x5/0x20 [ 161.979242][T11941] __kmalloc+0x66/0x380 [ 161.983389][T11941] traceprobe_set_print_fmt+0x45/0xa0 [ 161.988752][T11941] create_local_trace_uprobe+0x2eb/0x3c0 [ 161.994383][T11941] perf_uprobe_init+0xbe/0x140 [ 161.999189][T11941] perf_uprobe_event_init+0xde/0x140 [ 162.004463][T11941] perf_try_init_event+0x21a/0x400 [ 162.009597][T11941] perf_event_alloc+0x80b/0x1b20 [ 162.014530][T11941] ? _raw_spin_unlock+0x22/0x40 [ 162.019456][T11941] ? alloc_fd+0x35d/0x3b0 [ 162.023779][T11941] __se_sys_perf_event_open+0x5ce/0x25d0 [ 162.029463][T11941] ? __fget_light+0x219/0x260 [ 162.034140][T11941] __x64_sys_perf_event_open+0x63/0x70 [ 162.039594][T11941] do_syscall_64+0x39/0x80 [ 162.044004][T11941] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 162.049902][T11941] RIP: 0033:0x466459 13:12:30 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:30 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x0, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:30 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x0, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) [ 162.053795][T11941] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 162.073441][T11941] RSP: 002b:00007f44b8ef7188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 162.081841][T11941] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 162.089836][T11941] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 162.097879][T11941] RBP: 00007f44b8ef71d0 R08: 0000000000000000 R09: 0000000000000000 [ 162.105892][T11941] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 162.113857][T11941] R13: 00007ffedca1055f R14: 00007f44b8ef7300 R15: 0000000000022000 [ 162.133876][T11957] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.0'. 13:12:31 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:12:31 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1eba43, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:31 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x0, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:31 executing program 5 (fault-call:4 fault-nth:12): set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:31 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:31 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x0, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:31 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x2, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:31 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:31 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x0, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:31 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 162.851248][T11983] FAULT_INJECTION: forcing a failure. [ 162.851248][T11983] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 162.874914][T11983] CPU: 1 PID: 11983 Comm: syz-executor.5 Not tainted 5.12.0-rc4-syzkaller #0 [ 162.883683][T11983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.893815][T11983] Call Trace: [ 162.897101][T11983] dump_stack+0x137/0x19d 13:12:31 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 162.901432][T11983] should_fail+0x23c/0x250 [ 162.905977][T11983] __alloc_pages_nodemask+0xea/0x350 [ 162.911258][T11983] probe_event_enable+0x421/0x7d0 [ 162.916275][T11983] ? __uprobe_trace_func+0x420/0x420 [ 162.921553][T11983] trace_uprobe_register+0x88/0x410 [ 162.926824][T11983] perf_trace_event_init+0x34e/0x790 [ 162.932166][T11983] perf_uprobe_init+0xf5/0x140 [ 162.936921][T11983] perf_uprobe_event_init+0xde/0x140 [ 162.942282][T11983] perf_try_init_event+0x21a/0x400 [ 162.947459][T11983] perf_event_alloc+0x80b/0x1b20 [ 162.952414][T11983] ? _raw_spin_unlock+0x22/0x40 [ 162.957312][T11983] ? alloc_fd+0x35d/0x3b0 [ 162.961639][T11983] __se_sys_perf_event_open+0x5ce/0x25d0 [ 162.967269][T11983] ? __fget_light+0x219/0x260 [ 162.971941][T11983] __x64_sys_perf_event_open+0x63/0x70 [ 162.977410][T11983] do_syscall_64+0x39/0x80 [ 162.981830][T11983] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 162.987719][T11983] RIP: 0033:0x466459 [ 162.991643][T11983] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 163.011297][T11983] RSP: 002b:00007f44b8ef7188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 163.019697][T11983] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 163.027742][T11983] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 163.035708][T11983] RBP: 00007f44b8ef71d0 R08: 0000000000000000 R09: 0000000000000000 [ 163.043731][T11983] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 13:12:31 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x6, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 163.051695][T11983] R13: 00007ffedca1055f R14: 00007f44b8ef7300 R15: 0000000000022000 [ 163.094022][T12006] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.0'. 13:12:32 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:12:32 executing program 5 (fault-call:4 fault-nth:13): set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:32 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x0, 0x0}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:32 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, 0x0, 0x0) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:32 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x0, 0x0}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:32 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x7, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:32 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, 0x0, 0x0) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:32 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x8, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:32 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x0, 0x0}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) [ 163.728200][T12025] FAULT_INJECTION: forcing a failure. [ 163.728200][T12025] name failslab, interval 1, probability 0, space 0, times 0 [ 163.766663][T12025] CPU: 1 PID: 12025 Comm: syz-executor.5 Not tainted 5.12.0-rc4-syzkaller #0 [ 163.775437][T12025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.785498][T12025] Call Trace: [ 163.786440][T12033] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.0'. [ 163.788772][T12025] dump_stack+0x137/0x19d [ 163.802348][T12025] should_fail+0x23c/0x250 [ 163.806771][T12025] __should_failslab+0x81/0x90 [ 163.811531][T12025] ? __uprobe_register+0x107/0x8a0 [ 163.816634][T12025] should_failslab+0x5/0x20 [ 163.821135][T12025] kmem_cache_alloc_trace+0x49/0x340 [ 163.826415][T12025] ? get_page_from_freelist+0x366/0x630 [ 163.831958][T12025] __uprobe_register+0x107/0x8a0 [ 163.836889][T12025] ? __alloc_pages_nodemask+0x1a8/0x350 [ 163.842427][T12025] uprobe_register_refctr+0x29/0x40 [ 163.847644][T12025] probe_event_enable+0x2be/0x7d0 [ 163.852751][T12025] ? __uprobe_trace_func+0x420/0x420 [ 163.858102][T12025] trace_uprobe_register+0x88/0x410 [ 163.863287][T12025] perf_trace_event_init+0x34e/0x790 [ 163.868564][T12025] perf_uprobe_init+0xf5/0x140 [ 163.873322][T12025] perf_uprobe_event_init+0xde/0x140 [ 163.878707][T12025] perf_try_init_event+0x21a/0x400 [ 163.883824][T12025] perf_event_alloc+0x80b/0x1b20 [ 163.888764][T12025] ? _raw_spin_unlock+0x22/0x40 [ 163.893615][T12025] ? alloc_fd+0x35d/0x3b0 [ 163.897940][T12025] __se_sys_perf_event_open+0x5ce/0x25d0 [ 163.903573][T12025] ? __fget_light+0x219/0x260 [ 163.908342][T12025] __x64_sys_perf_event_open+0x63/0x70 [ 163.913814][T12025] do_syscall_64+0x39/0x80 [ 163.918286][T12025] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 163.924177][T12025] RIP: 0033:0x466459 13:12:32 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x0, 0x0}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) [ 163.928058][T12025] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 163.947708][T12025] RSP: 002b:00007f44b8ef7188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 163.956119][T12025] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 163.964079][T12025] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 13:12:32 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x9, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:32 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, 0x0, 0x0) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) [ 163.972043][T12025] RBP: 00007f44b8ef71d0 R08: 0000000000000000 R09: 0000000000000000 [ 163.980001][T12025] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 163.987963][T12025] R13: 00007ffedca1055f R14: 00007f44b8ef7300 R15: 0000000000022000 13:12:33 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x0, 0x0}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:33 executing program 5 (fault-call:4 fault-nth:14): set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:33 executing program 0: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x4ffe0, 0x0) 13:12:33 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x0, 0x0}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:33 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0xa, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:33 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:33 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0xb, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:33 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:33 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) [ 164.605882][T12065] FAULT_INJECTION: forcing a failure. [ 164.605882][T12065] name failslab, interval 1, probability 0, space 0, times 0 [ 164.636618][T12065] CPU: 1 PID: 12065 Comm: syz-executor.5 Not tainted 5.12.0-rc4-syzkaller #0 [ 164.645394][T12065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 13:12:33 executing program 0: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x4ffe0, 0x0) [ 164.655434][T12065] Call Trace: [ 164.658706][T12065] dump_stack+0x137/0x19d [ 164.663037][T12065] should_fail+0x23c/0x250 [ 164.667565][T12065] __should_failslab+0x81/0x90 [ 164.672325][T12065] ? alloc_perf_context+0x35/0x1b0 [ 164.677438][T12065] should_failslab+0x5/0x20 [ 164.681940][T12065] kmem_cache_alloc_trace+0x49/0x340 [ 164.687215][T12065] alloc_perf_context+0x35/0x1b0 [ 164.692153][T12065] find_get_context+0x166/0x5c0 [ 164.697079][T12065] __se_sys_perf_event_open+0x857/0x25d0 [ 164.702728][T12065] ? __fget_light+0x219/0x260 [ 164.707396][T12065] __x64_sys_perf_event_open+0x63/0x70 [ 164.712937][T12065] do_syscall_64+0x39/0x80 [ 164.717390][T12065] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 164.723278][T12065] RIP: 0033:0x466459 [ 164.727162][T12065] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 164.746756][T12065] RSP: 002b:00007f44b8ef7188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 13:12:33 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:33 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:33 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0xc, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 164.755167][T12065] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 164.763126][T12065] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 164.771085][T12065] RBP: 00007f44b8ef71d0 R08: 0000000000000000 R09: 0000000000000000 [ 164.779043][T12065] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 164.787000][T12065] R13: 00007ffedca1055f R14: 00007f44b8ef7300 R15: 0000000000022000 13:12:33 executing program 5 (fault-call:4 fault-nth:15): set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:33 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:33 executing program 0: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x4ffe0, 0x0) 13:12:33 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0xd, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:33 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:33 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x0, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:33 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(0xffffffffffffffff) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:33 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 164.958861][T12103] FAULT_INJECTION: forcing a failure. [ 164.958861][T12103] name failslab, interval 1, probability 0, space 0, times 0 [ 164.982646][T12103] CPU: 1 PID: 12103 Comm: syz-executor.5 Not tainted 5.12.0-rc4-syzkaller #0 [ 164.991428][T12103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.001476][T12103] Call Trace: [ 165.004742][T12103] dump_stack+0x137/0x19d 13:12:33 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(0xffffffffffffffff) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) [ 165.009069][T12103] should_fail+0x23c/0x250 [ 165.013532][T12103] __should_failslab+0x81/0x90 [ 165.018453][T12103] ? __uprobe_register+0x107/0x8a0 [ 165.023566][T12103] should_failslab+0x5/0x20 [ 165.028069][T12103] kmem_cache_alloc_trace+0x49/0x340 [ 165.033346][T12103] ? get_page_from_freelist+0x366/0x630 [ 165.038939][T12103] __uprobe_register+0x107/0x8a0 [ 165.043998][T12103] ? __alloc_pages_nodemask+0x1a8/0x350 [ 165.049540][T12103] uprobe_register_refctr+0x29/0x40 13:12:33 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(0xffffffffffffffff) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) [ 165.054728][T12103] probe_event_enable+0x2be/0x7d0 [ 165.059747][T12103] ? __uprobe_trace_func+0x420/0x420 [ 165.065033][T12103] trace_uprobe_register+0x88/0x410 [ 165.070228][T12103] perf_trace_event_init+0x34e/0x790 [ 165.075554][T12103] perf_uprobe_init+0xf5/0x140 [ 165.080390][T12103] perf_uprobe_event_init+0xde/0x140 [ 165.085720][T12103] perf_try_init_event+0x21a/0x400 [ 165.090825][T12103] perf_event_alloc+0x80b/0x1b20 [ 165.095835][T12103] ? _raw_spin_unlock+0x22/0x40 [ 165.100685][T12103] ? alloc_fd+0x35d/0x3b0 [ 165.105022][T12103] __se_sys_perf_event_open+0x5ce/0x25d0 [ 165.110646][T12103] ? __fget_light+0x219/0x260 [ 165.115326][T12103] __x64_sys_perf_event_open+0x63/0x70 [ 165.120786][T12103] do_syscall_64+0x39/0x80 [ 165.125234][T12103] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 165.131192][T12103] RIP: 0033:0x466459 [ 165.135116][T12103] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 13:12:34 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:34 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x0, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) [ 165.154766][T12103] RSP: 002b:00007f44b8ef7188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 165.163169][T12103] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 165.171133][T12103] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 165.179100][T12103] RBP: 00007f44b8ef71d0 R08: 0000000000000000 R09: 0000000000000000 [ 165.187060][T12103] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 165.195019][T12103] R13: 00007ffedca1055f R14: 00007f44b8ef7300 R15: 0000000000022000 13:12:34 executing program 5 (fault-call:4 fault-nth:16): set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:34 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x0, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:34 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x0, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:34 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0xf, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:34 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x0, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:34 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x0, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:34 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x10, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 165.334976][T12139] FAULT_INJECTION: forcing a failure. [ 165.334976][T12139] name failslab, interval 1, probability 0, space 0, times 0 [ 165.353696][T12139] CPU: 1 PID: 12139 Comm: syz-executor.5 Not tainted 5.12.0-rc4-syzkaller #0 [ 165.362467][T12139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.372515][T12139] Call Trace: [ 165.375789][T12139] dump_stack+0x137/0x19d [ 165.380124][T12139] should_fail+0x23c/0x250 [ 165.384530][T12139] ? __alloc_file+0x2e/0x1a0 [ 165.389110][T12139] __should_failslab+0x81/0x90 [ 165.393870][T12139] should_failslab+0x5/0x20 [ 165.398510][T12139] kmem_cache_alloc+0x46/0x320 [ 165.403268][T12139] ? __d_alloc+0x36/0x370 [ 165.407598][T12139] __alloc_file+0x2e/0x1a0 [ 165.412039][T12139] alloc_empty_file+0xcd/0x1c0 [ 165.416790][T12139] alloc_file+0x3a/0x280 [ 165.421024][T12139] alloc_file_pseudo+0xe2/0x130 [ 165.425859][T12139] anon_inode_getfile+0x9f/0x120 [ 165.430786][T12139] __se_sys_perf_event_open+0xb25/0x25d0 [ 165.436457][T12139] ? __fget_light+0x219/0x260 [ 165.441179][T12139] __x64_sys_perf_event_open+0x63/0x70 [ 165.446676][T12139] do_syscall_64+0x39/0x80 [ 165.451128][T12139] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 165.457200][T12139] RIP: 0033:0x466459 [ 165.461091][T12139] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 165.480700][T12139] RSP: 002b:00007f44b8ef7188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 165.489103][T12139] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 165.497073][T12139] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 165.505059][T12139] RBP: 00007f44b8ef71d0 R08: 0000000000000000 R09: 0000000000000000 [ 165.513015][T12139] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 165.520978][T12139] R13: 00007ffedca1055f R14: 00007f44b8ef7300 R15: 0000000000022000 13:12:34 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:12:34 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x0, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:34 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x0, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:34 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x11, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:34 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x0, 0x0}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:34 executing program 5 (fault-call:4 fault-nth:17): set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:34 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x0, 0x0}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:34 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x0, 0x0}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) [ 166.099218][T12158] FAULT_INJECTION: forcing a failure. [ 166.099218][T12158] name failslab, interval 1, probability 0, space 0, times 0 13:12:34 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x0, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:35 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) socket$inet6(0xa, 0x40000080806, 0x0) listen(0xffffffffffffffff, 0x0) r1 = socket(0x15, 0x80005, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}}) [ 166.152343][T12158] CPU: 1 PID: 12158 Comm: syz-executor.5 Not tainted 5.12.0-rc4-syzkaller #0 [ 166.161120][T12158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.171188][T12158] Call Trace: [ 166.174459][T12158] dump_stack+0x137/0x19d [ 166.178794][T12158] should_fail+0x23c/0x250 [ 166.183210][T12158] ? security_file_alloc+0x30/0x190 [ 166.188404][T12158] __should_failslab+0x81/0x90 [ 166.193253][T12158] should_failslab+0x5/0x20 [ 166.197812][T12158] kmem_cache_alloc+0x46/0x320 13:12:35 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x12, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:35 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x13, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 166.202565][T12158] ? __alloc_file+0x2e/0x1a0 [ 166.207157][T12158] security_file_alloc+0x30/0x190 [ 166.212789][T12158] __alloc_file+0x83/0x1a0 [ 166.217235][T12158] alloc_empty_file+0xcd/0x1c0 [ 166.222075][T12158] alloc_file+0x3a/0x280 [ 166.226316][T12158] alloc_file_pseudo+0xe2/0x130 [ 166.231158][T12158] anon_inode_getfile+0x9f/0x120 [ 166.236117][T12158] __se_sys_perf_event_open+0xb25/0x25d0 [ 166.241745][T12158] ? __fget_light+0x219/0x260 [ 166.246498][T12158] __x64_sys_perf_event_open+0x63/0x70 [ 166.251950][T12158] do_syscall_64+0x39/0x80 [ 166.256364][T12158] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 166.262274][T12158] RIP: 0033:0x466459 [ 166.266161][T12158] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 166.285864][T12158] RSP: 002b:00007f44b8ef7188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 166.294614][T12158] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 166.302580][T12158] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 166.310662][T12158] RBP: 00007f44b8ef71d0 R08: 0000000000000000 R09: 0000000000000000 [ 166.318621][T12158] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 166.326578][T12158] R13: 00007ffedca1055f R14: 00007f44b8ef7300 R15: 0000000000022000 13:12:35 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:12:35 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x0, 0x0}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:35 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x0, 0x0}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:35 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) socket$inet6(0xa, 0x40000080806, 0x0) listen(0xffffffffffffffff, 0x0) r1 = socket(0x15, 0x80005, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:35 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x14, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:35 executing program 5 (fault-call:4 fault-nth:18): set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:35 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x0, 0x0}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:35 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) socket$inet6(0xa, 0x40000080806, 0x0) listen(0xffffffffffffffff, 0x0) r1 = socket(0x15, 0x80005, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:35 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x15, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:36 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x16, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 167.196185][T12211] FAULT_INJECTION: forcing a failure. [ 167.196185][T12211] name failslab, interval 1, probability 0, space 0, times 0 [ 167.224813][T12211] CPU: 1 PID: 12211 Comm: syz-executor.5 Not tainted 5.12.0-rc4-syzkaller #0 [ 167.233584][T12211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.243640][T12211] Call Trace: [ 167.246910][T12211] dump_stack+0x137/0x19d [ 167.251311][T12211] should_fail+0x23c/0x250 [ 167.255716][T12211] ? security_file_alloc+0x30/0x190 [ 167.260941][T12211] __should_failslab+0x81/0x90 [ 167.265763][T12211] should_failslab+0x5/0x20 [ 167.270278][T12211] kmem_cache_alloc+0x46/0x320 [ 167.275036][T12211] ? __alloc_file+0x2e/0x1a0 [ 167.279617][T12211] security_file_alloc+0x30/0x190 [ 167.284632][T12211] __alloc_file+0x83/0x1a0 [ 167.289045][T12211] alloc_empty_file+0xcd/0x1c0 [ 167.293803][T12211] alloc_file+0x3a/0x280 [ 167.298041][T12211] alloc_file_pseudo+0xe2/0x130 [ 167.302889][T12211] anon_inode_getfile+0x9f/0x120 [ 167.307824][T12211] __se_sys_perf_event_open+0xb25/0x25d0 [ 167.313465][T12211] ? __fget_light+0x219/0x260 [ 167.318142][T12211] __x64_sys_perf_event_open+0x63/0x70 [ 167.323602][T12211] do_syscall_64+0x39/0x80 [ 167.328009][T12211] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 167.333903][T12211] RIP: 0033:0x466459 13:12:36 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:36 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) [ 167.337813][T12211] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 167.357411][T12211] RSP: 002b:00007f44b8ef7188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 167.365813][T12211] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 167.373779][T12211] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 167.381735][T12211] RBP: 00007f44b8ef71d0 R08: 0000000000000000 R09: 0000000000000000 [ 167.389752][T12211] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 167.397710][T12211] R13: 00007ffedca1055f R14: 00007f44b8ef7300 R15: 0000000000022000 13:12:36 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:12:36 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x0, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:36 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x17, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:36 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:36 executing program 5 (fault-call:4 fault-nth:19): set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:36 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:36 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:36 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x0, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:36 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x18, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 168.051213][T12247] 9pnet: Insufficient options for proto=fd [ 168.067338][T12253] FAULT_INJECTION: forcing a failure. [ 168.067338][T12253] name fail_usercopy, interval 1, probability 0, space 0, times 0 13:12:36 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x19, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 168.098241][T12253] CPU: 1 PID: 12253 Comm: syz-executor.5 Not tainted 5.12.0-rc4-syzkaller #0 [ 168.107005][T12253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.117051][T12253] Call Trace: [ 168.120320][T12253] dump_stack+0x137/0x19d [ 168.124674][T12253] should_fail+0x23c/0x250 [ 168.129101][T12253] should_fail_usercopy+0x16/0x20 [ 168.134122][T12253] _copy_to_user+0x1c/0x90 [ 168.138535][T12253] simple_read_from_buffer+0xab/0x120 [ 168.143907][T12253] proc_fail_nth_read+0xf6/0x140 13:12:37 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x1a, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 168.148879][T12253] ? rw_verify_area+0x136/0x250 [ 168.153724][T12253] ? proc_fault_inject_write+0x200/0x200 [ 168.159411][T12253] vfs_read+0x154/0x5d0 [ 168.163569][T12253] ? __fget_light+0x219/0x260 [ 168.168274][T12253] ksys_read+0xce/0x180 [ 168.172421][T12253] __x64_sys_read+0x3e/0x50 [ 168.176971][T12253] do_syscall_64+0x39/0x80 [ 168.181445][T12253] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 168.187443][T12253] RIP: 0033:0x4191dc 13:12:37 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) [ 168.191331][T12253] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 168.210954][T12253] RSP: 002b:00007f44b8ef7170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 168.219350][T12253] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00000000004191dc [ 168.227314][T12253] RDX: 000000000000000f RSI: 00007f44b8ef71e0 RDI: 0000000000000004 [ 168.235278][T12253] RBP: 00007f44b8ef71d0 R08: 0000000000000000 R09: 0000000000000000 [ 168.243239][T12253] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 168.251195][T12253] R13: 00007ffedca1055f R14: 00007f44b8ef7300 R15: 0000000000022000 13:12:37 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x0, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:37 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:12:37 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x1b, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:37 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x0, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:37 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x0, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:37 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:37 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x0, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:37 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x1c, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:37 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x0, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:37 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x0, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) [ 168.941431][T12290] 9pnet: Insufficient options for proto=fd 13:12:37 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:37 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x0, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:37 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x1d, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 169.058206][T12313] 9pnet: Insufficient options for proto=fd [ 169.090283][ T36] audit: type=1804 audit(1616850757.875:14): pid=12318 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/82/bus" dev="sda1" ino=14256 res=1 errno=0 13:12:38 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:12:38 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x0, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:38 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x0, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:38 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:38 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x0, 0x0}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:38 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x1e, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:38 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x21, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:38 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x0, 0x0}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:38 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 169.827703][ T36] audit: type=1804 audit(1616850758.605:15): pid=12339 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/83/bus" dev="sda1" ino=14286 res=1 errno=0 13:12:38 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x0, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:38 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x22, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:38 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x0, 0x0}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) [ 169.872662][T12345] 9pnet: Insufficient options for proto=fd [ 169.963822][T12358] 9pnet: Insufficient options for proto=fd [ 169.972820][ T36] audit: type=1804 audit(1616850758.755:16): pid=12359 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/84/bus" dev="sda1" ino=14286 res=1 errno=0 13:12:39 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:12:39 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x0, 0x0}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:39 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:39 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x23, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:39 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x0, 0x0}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:39 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) socket(0x15, 0x80005, 0x0) r2 = dup(0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:39 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:39 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0xf4240, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:39 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:39 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) socket(0x15, 0x80005, 0x0) r2 = dup(0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:39 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x0, 0x0}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) [ 170.776074][T12377] 9pnet: Insufficient options for proto=fd [ 170.792274][ T36] audit: type=1804 audit(1616850759.575:17): pid=12385 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/85/bus" dev="sda1" ino=14310 res=1 errno=0 13:12:39 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) [ 170.890680][T12399] 9pnet: Insufficient options for proto=fd [ 170.898098][ T36] audit: type=1804 audit(1616850759.675:18): pid=12400 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/86/bus" dev="sda1" ino=14307 res=1 errno=0 13:12:40 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:12:40 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x148, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:40 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:40 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) socket(0x15, 0x80005, 0x0) r2 = dup(0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:40 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:40 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="290000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:40 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:40 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, 0x0, &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:40 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x0, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:40 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="85ffffff0000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:40 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x348, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:40 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, 0x0, &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) [ 171.668398][T12425] 9pnet: Insufficient options for proto=fd [ 171.681867][ T36] audit: type=1804 audit(1616850760.465:19): pid=12428 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/87/bus" dev="sda1" ino=14326 res=1 errno=0 [ 171.833932][ T36] audit: type=1804 audit(1616850760.615:20): pid=12449 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/88/bus" dev="sda1" ino=14319 res=1 errno=0 13:12:41 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:12:41 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x0, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:41 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:41 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180200000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:41 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, 0x0, &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:41 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0xfe1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:41 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:41 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x20000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:41 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x0, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:41 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x0, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:41 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:41 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180300000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 172.547900][ T36] audit: type=1804 audit(1616850761.325:21): pid=12470 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/89/bus" dev="sda1" ino=14341 res=1 errno=0 [ 172.658426][ T36] audit: type=1804 audit(1616850761.435:22): pid=12488 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/90/bus" dev="sda1" ino=14333 res=1 errno=0 13:12:42 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:12:42 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180400000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:42 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x0, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:42 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x0, 0x0}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:42 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:42 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:42 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x0, 0x0}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:42 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, 0x0) 13:12:42 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180500000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:42 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x200001f0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:42 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180600000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:42 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x0, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) [ 173.510281][ T36] audit: type=1804 audit(1616850762.286:23): pid=12517 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/91/bus" dev="sda1" ino=14359 res=1 errno=0 13:12:43 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:12:43 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x0, 0x0}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:43 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, 0x0) 13:12:43 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:43 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x0, 0x0}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:43 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180700000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:43 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180800000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:43 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x0, 0x0}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:43 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, 0x0) 13:12:43 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x2, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:43 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:43 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180900000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 174.412587][ T36] kauditd_printk_skb: 1 callbacks suppressed [ 174.412596][ T36] audit: type=1804 audit(1616850763.196:25): pid=12559 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/93/bus" dev="sda1" ino=14374 res=1 errno=0 [ 174.546718][ T36] audit: type=1804 audit(1616850763.326:26): pid=12578 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/94/bus" dev="sda1" ino=14371 res=1 errno=0 13:12:44 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:12:44 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:44 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x0, 0x0}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:44 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:44 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:44 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180a00000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:44 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180b00000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:44 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:44 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:44 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x4, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:44 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x0, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:44 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180c00000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 175.342429][ T36] audit: type=1804 audit(1616850764.126:27): pid=12602 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/95/bus" dev="sda1" ino=14379 res=1 errno=0 [ 175.371548][T12604] 9pnet: Insufficient options for proto=fd [ 175.477831][ T36] audit: type=1804 audit(1616850764.256:28): pid=12624 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/96/bus" dev="sda1" ino=14377 res=1 errno=0 13:12:44 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:44 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:12:44 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:44 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x0, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:44 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180d00000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:44 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x5, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:45 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180e00000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:45 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x0, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:45 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}}) [ 176.224624][T12640] 9pnet: Insufficient options for proto=fd 13:12:45 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:45 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x6, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:45 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="181000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 176.254817][ T36] audit: type=1804 audit(1616850765.036:29): pid=12646 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/97/bus" dev="sda1" ino=13891 res=1 errno=0 13:12:45 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno'}}) [ 176.326533][T12655] 9pnet: Insufficient options for proto=fd [ 176.401008][ T36] audit: type=1804 audit(1616850765.186:30): pid=12667 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/98/bus" dev="sda1" ino=14387 res=1 errno=0 [ 176.441210][T12668] 9pnet: Insufficient options for proto=fd 13:12:45 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:12:45 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x0, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:45 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x0, 0x0}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:45 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="181100000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:45 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x7, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:45 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno'}}) 13:12:45 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x8, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:45 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x0, 0x0, 0x0}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:45 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x0, 0x0}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:45 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="181200000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:46 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno'}}) [ 177.130307][T12687] 9pnet: Insufficient options for proto=fd [ 177.140597][ T36] audit: type=1804 audit(1616850765.926:31): pid=12690 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/99/bus" dev="sda1" ino=14398 res=1 errno=0 13:12:46 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x9, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 177.238785][T12704] 9pnet: Insufficient options for proto=fd [ 177.264248][ T36] audit: type=1804 audit(1616850766.016:32): pid=12705 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/100/bus" dev="sda1" ino=14407 res=1 errno=0 [ 177.319845][ T36] audit: type=1804 audit(1616850766.106:33): pid=12709 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/101/bus" dev="sda1" ino=14378 res=1 errno=0 [ 177.345364][ T24] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) 13:12:46 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:12:46 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="182500000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:46 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x0, 0x0}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:46 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x0, 0x0, 0x0}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:46 executing program 4: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:46 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xa, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:46 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="184800000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:46 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:46 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x0, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:46 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xb, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:46 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x0, 0x0, 0x0}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:46 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="184c00000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 178.042807][ T36] audit: type=1804 audit(1616850766.826:34): pid=12736 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/102/bus" dev="sda1" ino=14382 res=1 errno=0 13:12:47 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:12:47 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:47 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x0, 0x0, 0x0}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xa, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:47 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="185800000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:47 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xc, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:47 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:47 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="186800000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:47 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x0, 0x7d, &(0x7f0000000580)=""/125}, {0x0, 0x0, 0x0}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:47 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xd, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:47 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="186c00000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:47 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x0, 0x0}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:48 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:12:48 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x0, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:48 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:48 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xe, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:48 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x0, 0x0}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="187400000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="187a00000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:48 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x0, 0x0, 0x0}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:48 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x0, 0x0}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:48 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="187c00000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:48 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x10, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 179.843453][ T36] kauditd_printk_skb: 3 callbacks suppressed [ 179.843523][ T36] audit: type=1804 audit(1616850768.626:38): pid=12819 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/106/bus" dev="sda1" ino=14376 res=1 errno=0 [ 179.987929][ T36] audit: type=1804 audit(1616850768.766:39): pid=12837 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/107/bus" dev="sda1" ino=14409 res=1 errno=0 13:12:49 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:12:49 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x0, 0x0}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:49 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x0, 0x0, 0x0}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:49 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:49 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="188a00000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:49 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x11, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:49 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x0, 0x0, 0x0}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:49 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x0, 0x0}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:49 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18d000000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:49 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:49 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x12, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:49 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x0, 0x0, 0x0}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) [ 180.742533][ T36] audit: type=1804 audit(1616850769.526:40): pid=12861 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/108/bus" dev="sda1" ino=14005 res=1 errno=0 [ 180.851096][ T36] audit: type=1804 audit(1616850769.636:41): pid=12878 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/109/bus" dev="sda1" ino=14440 res=1 errno=0 13:12:50 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a30000000007000"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:12:50 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x0, 0x0}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:50 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18fc02000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:50 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x0, 0x73, &(0x7f0000000500)=""/115}, {0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:50 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x0, 0x7d, &(0x7f0000000580)=""/125}, {0x0, 0x0, 0x0}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:50 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x14, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:50 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180003000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:50 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:50 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x0, 0x73, &(0x7f0000000500)=""/115}, {0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:50 executing program 4: ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x0, 0x0}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:50 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180005000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:50 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) [ 181.615976][ T36] audit: type=1804 audit(1616850770.396:42): pid=12903 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/110/bus" dev="sda1" ino=14467 res=1 errno=0 13:12:51 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a30000000007000"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:12:51 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x3d, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:51 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180006000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:51 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x0, 0x73, &(0x7f0000000500)=""/115}, {0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:51 executing program 4: ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x0, 0x0}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:51 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:51 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:51 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180007000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:51 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x56, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:51 executing program 4: ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x0, 0x0}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:51 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) [ 182.476936][ T36] audit: type=1804 audit(1616850771.256:43): pid=12940 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/111/bus" dev="sda1" ino=14474 res=1 errno=0 13:12:51 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180009000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 182.581858][ T36] audit: type=1804 audit(1616850771.346:44): pid=12953 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/112/bus" dev="sda1" ino=14473 res=1 errno=0 13:12:52 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a30000000007000"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:12:52 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x0, 0x73, &(0x7f0000000500)=""/115}, {0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:52 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x74, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:52 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x0, 0x0}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:52 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:52 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000a000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:52 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000b000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:52 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:52 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x0, 0x0}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:52 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x0, 0x0}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:52 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x0, 0x73, &(0x7f0000000500)=""/115}, {0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:52 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000c000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 183.443062][ T36] audit: type=1804 audit(1616850772.226:45): pid=12988 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/113/bus" dev="sda1" ino=14482 res=1 errno=0 13:12:53 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:12:53 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x7c, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:53 executing program 3: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x74, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:53 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x0, 0x0}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:53 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000d000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:53 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x0, 0x73, &(0x7f0000000500)=""/115}, {0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:53 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:53 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x0, 0x0}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:53 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:53 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:53 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000e000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 184.331705][ T36] audit: type=1804 audit(1616850773.116:46): pid=13026 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/114/bus" dev="sda1" ino=14510 res=1 errno=0 13:12:53 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x0, 0x0}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) [ 184.386055][T13028] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.0'. [ 184.465411][ T36] audit: type=1804 audit(1616850773.246:47): pid=13042 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/115/bus" dev="sda1" ino=14508 res=1 errno=0 13:12:53 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:12:53 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) socket$inet6(0xa, 0x40000080806, 0x0) listen(0xffffffffffffffff, 0x0) r1 = socket(0x15, 0x80005, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:53 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180011000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:53 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xd0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:53 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:53 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x0, 0x0}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:53 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x0, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:54 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180012000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:54 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:54 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x0, 0x0}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:54 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x0, 0x0}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:54 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xdc, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 185.236097][ T36] audit: type=1804 audit(1616850774.016:48): pid=13067 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/116/bus" dev="sda1" ino=14504 res=1 errno=0 [ 185.324572][T13072] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.0'. [ 185.346838][ T36] audit: type=1804 audit(1616850774.126:49): pid=13085 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/117/bus" dev="sda1" ino=14504 res=1 errno=0 13:12:54 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180020000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:54 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:12:54 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:12:54 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) close(r0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r1, 0x0) r2 = socket(0x15, 0x80005, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) 13:12:54 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x0, 0x0}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:54 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xe1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:54 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x0, 0x0}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:54 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:12:54 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:12:54 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180025000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:54 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xff, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 186.110476][ T36] audit: type=1804 audit(1616850774.896:50): pid=13107 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/118/bus" dev="sda1" ino=14511 res=1 errno=0 13:12:55 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x0, 0x0}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0xef, &(0x7f00000018c0)=""/239}]}) 13:12:55 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:12:55 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180040000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 186.202584][T13122] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.0'. [ 186.259069][ T36] audit: type=1804 audit(1616850775.036:51): pid=13128 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/119/bus" dev="sda1" ino=14518 res=1 errno=0 13:12:55 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:12:55 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:12:55 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:55 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:12:55 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, 0x0) 13:12:55 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180048000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:55 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18004c000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:55 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:12:55 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, 0x0) 13:12:55 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:12:55 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x2, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 187.002694][ T36] audit: type=1804 audit(1616850775.786:52): pid=13159 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/120/bus" dev="sda1" ino=14519 res=1 errno=0 13:12:55 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180058000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 187.059766][T13162] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.0'. [ 187.140027][ T36] audit: type=1804 audit(1616850775.926:53): pid=13176 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/121/bus" dev="sda1" ino=14514 res=1 errno=0 [ 187.599510][ T3236] ieee802154 phy0 wpan0: encryption failed: -22 [ 187.605813][ T3236] ieee802154 phy1 wpan1: encryption failed: -22 13:12:56 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:12:56 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:12:56 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, 0x0) 13:12:56 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:12:56 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x3, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:56 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18ff60000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:56 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180068000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:56 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x0, 0x0}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}]}) 13:12:56 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:12:56 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x6, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x0, 0x0}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}]}) 13:12:56 executing program 3: ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:12:56 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18006c000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 187.944158][ T36] audit: type=1804 audit(1616850776.726:54): pid=13206 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/122/bus" dev="sda1" ino=14518 res=1 errno=0 [ 187.983304][T13209] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.0'. 13:12:57 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:12:57 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:57 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:12:57 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x5, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x0, 0x0}]}) 13:12:57 executing program 3: ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:12:57 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180074000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:57 executing program 1: ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:12:57 executing program 3: ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:12:57 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18007a000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:57 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x4, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}]}) 13:12:57 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x5, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:57 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) [ 188.785469][ T36] audit: type=1804 audit(1616850777.566:55): pid=13238 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/123/bus" dev="sda1" ino=14547 res=1 errno=0 13:12:57 executing program 1: ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:12:57 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18007c000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 188.908507][T13254] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.0'. [ 188.931706][ T36] audit: type=1804 audit(1616850777.716:56): pid=13257 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/124/bus" dev="sda1" ino=14533 res=1 errno=0 13:12:58 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:12:58 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:12:58 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x4, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}]}) 13:12:58 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x6, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:58 executing program 1: ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:12:58 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18008a000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:58 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:12:58 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x4, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}]}) 13:12:58 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x7, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:58 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) [ 189.678251][ T36] audit: type=1804 audit(1616850778.456:57): pid=13278 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/125/bus" dev="sda1" ino=14559 res=1 errno=0 13:12:58 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:12:58 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800d0000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 189.773634][T13289] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.0'. 13:12:59 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x5, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x0, 0x0, 0x0}]}) 13:12:59 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:12:59 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:12:59 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:12:59 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:59 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1802fc000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:59 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:12:59 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800ff000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:59 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:12:59 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x5, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x0, 0x0, 0x0}]}) 13:12:59 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000200000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:12:59 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x5, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x0, 0x0, 0x0}]}) 13:12:59 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:59 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:12:59 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) [ 190.628791][ T36] kauditd_printk_skb: 1 callbacks suppressed [ 190.628802][ T36] audit: type=1804 audit(1616850779.416:59): pid=13323 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/127/bus" dev="sda1" ino=14578 res=1 errno=0 [ 190.722183][T13336] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.0'. [ 190.801648][ T36] audit: type=1804 audit(1616850779.576:60): pid=13345 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/128/bus" dev="sda1" ino=14532 res=1 errno=0 13:13:00 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:13:00 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000100000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:00 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:13:00 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:13:00 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x4, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x3000, 0x0, 0x0}]}) 13:13:00 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0xa, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:00 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000200000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:00 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:13:00 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:13:00 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0xb, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:00 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x4, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x0, 0x0, 0x0}]}) [ 191.514552][ T36] audit: type=1804 audit(1616850780.296:61): pid=13367 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/129/bus" dev="sda1" ino=14596 res=1 errno=0 13:13:00 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) [ 191.571582][T13370] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.0'. [ 191.667567][ T36] audit: type=1804 audit(1616850780.446:62): pid=13384 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/130/bus" dev="sda1" ino=14596 res=1 errno=0 13:13:01 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:13:01 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000300000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:01 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:13:01 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x4, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x0, 0x0, 0x0}]}) 13:13:01 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0xc, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:01 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:13:01 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0xd, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:01 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:13:01 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x4, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x0, 0x0, 0x0}]}) [ 192.387921][ T36] audit: type=1804 audit(1616850781.166:63): pid=13402 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/131/bus" dev="sda1" ino=14610 res=1 errno=0 13:13:01 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000400000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:01 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) [ 192.455702][T13410] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.0'. 13:13:01 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000500000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 192.500447][ T36] audit: type=1804 audit(1616850781.286:64): pid=13418 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/132/bus" dev="sda1" ino=14602 res=1 errno=0 [ 192.569672][T13410] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.0'. 13:13:02 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:13:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0xe, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:02 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:13:02 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000600000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:02 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x3, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x3000, 0x0, 0x0}]}) 13:13:02 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:13:02 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) 13:13:02 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x3, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x0, 0x0, 0x0}]}) 13:13:02 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, 0x0) 13:13:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x10, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:02 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000700000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 193.300610][ T36] audit: type=1804 audit(1616850782.086:65): pid=13452 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/133/bus" dev="sda1" ino=14608 res=1 errno=0 13:13:02 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x3000, 0x0, 0x0}]}) [ 193.353314][T13457] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.0'. [ 193.391743][T13457] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.0'. [ 193.447498][ T36] audit: type=1804 audit(1616850782.226:66): pid=13473 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/134/bus" dev="sda1" ino=14615 res=1 errno=0 13:13:02 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:13:02 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x3, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x0, 0x0, 0x0}]}) 13:13:02 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, 0x0) 13:13:02 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000800000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x11, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:02 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, 0x0) 13:13:02 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x3, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x0, 0x0, 0x0}]}) 13:13:02 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000900000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x12, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:03 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, 0x0) 13:13:03 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x2, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x3000, 0x0, 0x0}]}) [ 194.196949][ T36] audit: type=1804 audit(1616850782.976:67): pid=13497 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/135/bus" dev="sda1" ino=14624 res=1 errno=0 13:13:03 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000a00000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 194.241588][T13504] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.0'. [ 194.315144][ T36] audit: type=1804 audit(1616850783.096:68): pid=13513 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/136/bus" dev="sda1" ino=14615 res=1 errno=0 [ 194.351003][T13504] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.0'. 13:13:03 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a300000000008000300000000"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:13:03 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, 0x0) 13:13:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x14, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:03 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x2, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x0, 0x0, 0x0}]}) 13:13:03 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000b00000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:03 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}]}) 13:13:03 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000c00000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:03 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x2, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x0, 0x0, 0x0}]}) 13:13:03 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, 0x0) 13:13:03 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}]}) 13:13:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x3d, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:03 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x2, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x0, 0x0, 0x0}]}) [ 195.177275][T13554] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.0'. [ 195.230021][T13554] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.0'. 13:13:04 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a300000000008000300000000"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:13:04 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:04 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}]}) 13:13:04 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000d00000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:04 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}]}) 13:13:04 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x56, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:04 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x0, 0x0, 0x0}]}) 13:13:04 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000e00000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:04 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x74, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:04 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x0, 0x0, 0x0}]}) 13:13:04 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}]}) [ 195.962989][ T36] kauditd_printk_skb: 2 callbacks suppressed [ 195.962998][ T36] audit: type=1804 audit(1616850784.746:71): pid=13580 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/139/bus" dev="sda1" ino=14629 res=1 errno=0 13:13:04 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x0, 0x0, 0x0}]}) [ 196.084840][T13591] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.0'. [ 196.140742][ T36] audit: type=1804 audit(1616850784.926:72): pid=13607 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/140/bus" dev="sda1" ino=14618 res=1 errno=0 [ 196.143560][T13591] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.0'. 13:13:05 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a300000000008000300000000"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:13:05 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x0, 0x0, 0x0}]}) 13:13:05 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x0, 0x0, 0x0}]}) 13:13:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:05 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x7c, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:05 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}]}) 13:13:05 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x0, 0x0, 0x0}]}) 13:13:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001100000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:05 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x0, 0x0, 0x0}]}) [ 196.901093][ T36] audit: type=1804 audit(1616850785.686:73): pid=13630 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/141/bus" dev="sda1" ino=14654 res=1 errno=0 13:13:05 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0xb8, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001200000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:05 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x3000, 0x0, 0x0}]}) [ 196.957151][T13633] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.0'. [ 197.040909][T13633] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.0'. [ 197.075052][ T36] audit: type=1804 audit(1616850785.856:74): pid=13652 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/142/bus" dev="sda1" ino=14635 res=1 errno=0 13:13:06 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r1, 0x0, 0x4ffe0, 0x0) 13:13:06 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x0, 0xef, &(0x7f00000018c0)=""/239}]}) 13:13:06 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x0, 0x0, 0x0}]}) 13:13:06 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x0, 0x0, 0x0}]}) 13:13:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000002000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0xd0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000002500000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:06 executing program 4 (fault-call:2 fault-nth:0): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:06 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x9, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x4000, 0x2b, &(0x7f0000001880)=""/43}, {0x0, 0x0, 0x0}]}) 13:13:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0xdc, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:06 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x0, 0x0, 0x0}]}) [ 197.795884][ T36] audit: type=1804 audit(1616850786.576:75): pid=13674 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/143/bus" dev="sda1" ino=14666 res=1 errno=0 13:13:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000004000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 197.881836][T13684] FAULT_INJECTION: forcing a failure. [ 197.881836][T13684] name failslab, interval 1, probability 0, space 0, times 0 [ 197.904601][ T36] audit: type=1804 audit(1616850786.686:76): pid=13690 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/144/bus" dev="sda1" ino=14647 res=1 errno=0 [ 197.920362][T13684] CPU: 1 PID: 13684 Comm: syz-executor.4 Not tainted 5.12.0-rc4-syzkaller #0 [ 197.937974][T13684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.948030][T13684] Call Trace: [ 197.951332][T13684] dump_stack+0x137/0x19d [ 197.955689][T13684] should_fail+0x23c/0x250 [ 197.960102][T13684] __should_failslab+0x81/0x90 [ 197.964865][T13684] ? tomoyo_realpath_from_path+0x98/0x3b0 [ 197.970581][T13684] should_failslab+0x5/0x20 [ 197.975081][T13684] __kmalloc+0x66/0x380 [ 197.979230][T13684] ? __mod_memcg_lruvec_state+0xfa/0x260 [ 197.984863][T13684] ? __rcu_read_unlock+0x5c/0x250 [ 197.989880][T13684] tomoyo_realpath_from_path+0x98/0x3b0 [ 197.995426][T13684] tomoyo_path_number_perm+0xc1/0x2d0 [ 198.000802][T13684] ? __rcu_read_unlock+0x5c/0x250 [ 198.005873][T13684] tomoyo_file_ioctl+0x1c/0x20 [ 198.010636][T13684] security_file_ioctl+0x45/0x90 [ 198.015634][T13684] __se_sys_ioctl+0x48/0x140 [ 198.020246][T13684] __x64_sys_ioctl+0x3f/0x50 [ 198.024868][T13684] do_syscall_64+0x39/0x80 [ 198.029318][T13684] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 198.035313][T13684] RIP: 0033:0x466459 [ 198.039198][T13684] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 198.058861][T13684] RSP: 002b:00007f4f34543188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 198.067256][T13684] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 198.075212][T13684] RDX: 0000000020001a00 RSI: 000000004008af03 RDI: 0000000000000003 [ 198.083175][T13684] RBP: 00007f4f345431d0 R08: 0000000000000000 R09: 0000000000000000 [ 198.091136][T13684] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 198.099094][T13684] R13: 00007ffdbb3ec93f R14: 00007f4f34543300 R15: 0000000000022000 [ 198.120823][T13684] ERROR: Out of memory at tomoyo_realpath_from_path. 13:13:07 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r1, 0x0, 0x4ffe0, 0x0) 13:13:07 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x3000, 0x0, 0x0}]}) 13:13:07 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000004800000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:07 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0xe1, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:07 executing program 4 (fault-call:2 fault-nth:1): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:07 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x0, 0x0, 0x0}]}) [ 198.672995][T13715] FAULT_INJECTION: forcing a failure. [ 198.672995][T13715] name failslab, interval 1, probability 0, space 0, times 0 [ 198.687305][T13715] CPU: 1 PID: 13715 Comm: syz-executor.4 Not tainted 5.12.0-rc4-syzkaller #0 [ 198.696159][T13715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.700156][ T36] audit: type=1804 audit(1616850787.486:77): pid=13720 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/145/bus" dev="sda1" ino=14684 res=1 errno=0 [ 198.706452][T13715] Call Trace: [ 198.706460][T13715] dump_stack+0x137/0x19d [ 198.738577][T13715] should_fail+0x23c/0x250 [ 198.742989][T13715] __should_failslab+0x81/0x90 [ 198.747745][T13715] ? tomoyo_encode2+0x1d3/0x350 [ 198.752597][T13715] should_failslab+0x5/0x20 [ 198.757093][T13715] __kmalloc+0x66/0x380 [ 198.761244][T13715] tomoyo_encode2+0x1d3/0x350 [ 198.765992][T13715] tomoyo_realpath_from_path+0x35e/0x3b0 [ 198.771676][T13715] tomoyo_path_number_perm+0xc1/0x2d0 [ 198.777054][T13715] ? __rcu_read_unlock+0x5c/0x250 [ 198.782074][T13715] tomoyo_file_ioctl+0x1c/0x20 [ 198.786888][T13715] security_file_ioctl+0x45/0x90 [ 198.791822][T13715] __se_sys_ioctl+0x48/0x140 [ 198.796397][T13715] __x64_sys_ioctl+0x3f/0x50 [ 198.800992][T13715] do_syscall_64+0x39/0x80 [ 198.805387][T13715] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 198.811293][T13715] RIP: 0033:0x466459 13:13:07 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000004c00000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:07 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x0, 0x0, 0x0}]}) [ 198.815167][T13715] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 198.834753][T13715] RSP: 002b:00007f4f34543188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 198.843145][T13715] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 198.851101][T13715] RDX: 0000000020001a00 RSI: 000000004008af03 RDI: 0000000000000003 [ 198.859050][T13715] RBP: 00007f4f345431d0 R08: 0000000000000000 R09: 0000000000000000 13:13:07 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0xff, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:07 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000005800000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 198.866999][T13715] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 198.874948][T13715] R13: 00007ffdbb3ec93f R14: 00007f4f34543300 R15: 0000000000022000 [ 198.899919][T13715] ERROR: Out of memory at tomoyo_realpath_from_path. 13:13:07 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x0, 0x0, 0x0}]}) 13:13:07 executing program 4 (fault-call:2 fault-nth:2): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) [ 198.967207][ T36] audit: type=1804 audit(1616850787.746:78): pid=13734 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/146/bus" dev="sda1" ino=14667 res=1 errno=0 [ 199.046660][T13739] FAULT_INJECTION: forcing a failure. [ 199.046660][T13739] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 199.068705][T13739] CPU: 0 PID: 13739 Comm: syz-executor.4 Not tainted 5.12.0-rc4-syzkaller #0 [ 199.077474][T13739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.087516][T13739] Call Trace: [ 199.090784][T13739] dump_stack+0x137/0x19d [ 199.095137][T13739] should_fail+0x23c/0x250 [ 199.099539][T13739] should_fail_usercopy+0x16/0x20 [ 199.104558][T13739] _copy_from_user+0x1c/0xd0 [ 199.109250][T13739] vhost_dev_ioctl+0x17f/0xce0 [ 199.114019][T13739] vhost_net_ioctl+0x18c/0x1250 [ 199.118890][T13739] ? do_vfs_ioctl+0x4f7/0xec0 [ 199.123569][T13739] ? tomoyo_file_ioctl+0x1c/0x20 [ 199.128551][T13739] ? vhost_net_chr_poll+0x30/0x30 [ 199.133579][T13739] __se_sys_ioctl+0xcb/0x140 [ 199.138240][T13739] __x64_sys_ioctl+0x3f/0x50 [ 199.142878][T13739] do_syscall_64+0x39/0x80 [ 199.147295][T13739] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 199.153245][T13739] RIP: 0033:0x466459 [ 199.157148][T13739] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 199.176813][T13739] RSP: 002b:00007f4f34543188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 199.185211][T13739] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 199.193172][T13739] RDX: 0000000020001a00 RSI: 000000004008af03 RDI: 0000000000000003 [ 199.201130][T13739] RBP: 00007f4f345431d0 R08: 0000000000000000 R09: 0000000000000000 [ 199.209090][T13739] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 199.217097][T13739] R13: 00007ffdbb3ec93f R14: 00007f4f34543300 R15: 0000000000022000 13:13:08 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r1, 0x0, 0x4ffe0, 0x0) 13:13:08 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x3000, 0x0, 0x0}]}) 13:13:08 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:08 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000006800000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:08 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x100000, 0x3c, &(0x7f0000001840)=""/60}, {0x0, 0x0, 0x0}]}) 13:13:08 executing program 4 (fault-call:2 fault-nth:3): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:08 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x3000, 0x0, 0x0}]}) 13:13:08 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x0, 0x0, 0x0}]}) [ 199.557330][T13757] FAULT_INJECTION: forcing a failure. [ 199.557330][T13757] name failslab, interval 1, probability 0, space 0, times 0 [ 199.577987][ T36] audit: type=1804 audit(1616850788.356:79): pid=13765 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/147/bus" dev="sda1" ino=14695 res=1 errno=0 [ 199.621909][T13757] CPU: 1 PID: 13757 Comm: syz-executor.4 Not tainted 5.12.0-rc4-syzkaller #0 [ 199.630678][T13757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.640724][T13757] Call Trace: [ 199.643998][T13757] dump_stack+0x137/0x19d [ 199.648322][T13757] should_fail+0x23c/0x250 [ 199.652831][T13757] __should_failslab+0x81/0x90 [ 199.657586][T13757] should_failslab+0x5/0x20 [ 199.662155][T13757] kmem_cache_alloc_node_trace+0x5b/0x310 [ 199.667877][T13757] ? tomoyo_path_number_perm+0x286/0x2d0 [ 199.673514][T13757] ? __kmalloc_node+0x30/0x40 [ 199.678186][T13757] __kmalloc_node+0x30/0x40 [ 199.682676][T13757] kvmalloc_node+0x81/0xf0 [ 199.687177][T13757] vhost_dev_ioctl+0x751/0xce0 [ 199.691933][T13757] vhost_net_ioctl+0x18c/0x1250 [ 199.696812][T13757] ? do_vfs_ioctl+0x4f7/0xec0 [ 199.701549][T13757] ? tomoyo_file_ioctl+0x1c/0x20 [ 199.706484][T13757] ? vhost_net_chr_poll+0x30/0x30 [ 199.711496][T13757] __se_sys_ioctl+0xcb/0x140 [ 199.716083][T13757] __x64_sys_ioctl+0x3f/0x50 13:13:08 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000006c00000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 199.720671][T13757] do_syscall_64+0x39/0x80 [ 199.725153][T13757] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 199.731037][T13757] RIP: 0033:0x466459 [ 199.734918][T13757] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 199.754644][T13757] RSP: 002b:00007f4f34543188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 199.763051][T13757] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 13:13:08 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x2, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:08 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000007400000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:08 executing program 4 (fault-call:2 fault-nth:4): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) [ 199.771040][T13757] RDX: 0000000020001a00 RSI: 000000004008af03 RDI: 0000000000000003 [ 199.779006][T13757] RBP: 00007f4f345431d0 R08: 0000000000000000 R09: 0000000000000000 [ 199.786968][T13757] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 199.794926][T13757] R13: 00007ffdbb3ec93f R14: 00007f4f34543300 R15: 0000000000022000 [ 199.895656][ T36] audit: type=1804 audit(1616850788.676:80): pid=13790 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/148/bus" dev="sda1" ino=14687 res=1 errno=0 [ 199.937418][T13791] FAULT_INJECTION: forcing a failure. [ 199.937418][T13791] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 199.950890][T13791] CPU: 1 PID: 13791 Comm: syz-executor.4 Not tainted 5.12.0-rc4-syzkaller #0 [ 199.959643][T13791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.969693][T13791] Call Trace: [ 199.972967][T13791] dump_stack+0x137/0x19d [ 199.977289][T13791] should_fail+0x23c/0x250 [ 199.981695][T13791] should_fail_usercopy+0x16/0x20 [ 199.986726][T13791] _copy_from_user+0x1c/0xd0 [ 199.991436][T13791] vhost_dev_ioctl+0x7c2/0xce0 [ 199.996192][T13791] vhost_net_ioctl+0x18c/0x1250 [ 200.001145][T13791] ? do_vfs_ioctl+0x4f7/0xec0 [ 200.005819][T13791] ? tomoyo_file_ioctl+0x1c/0x20 [ 200.010749][T13791] ? vhost_net_chr_poll+0x30/0x30 [ 200.015785][T13791] __se_sys_ioctl+0xcb/0x140 [ 200.020364][T13791] __x64_sys_ioctl+0x3f/0x50 [ 200.024950][T13791] do_syscall_64+0x39/0x80 [ 200.029354][T13791] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 200.035277][T13791] RIP: 0033:0x466459 [ 200.039153][T13791] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 200.058816][T13791] RSP: 002b:00007f4f34543188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 200.067221][T13791] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 200.075179][T13791] RDX: 0000000020001a00 RSI: 000000004008af03 RDI: 0000000000000003 [ 200.083143][T13791] RBP: 00007f4f345431d0 R08: 0000000000000000 R09: 0000000000000000 [ 200.091105][T13791] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 200.099064][T13791] R13: 00007ffdbb3ec93f R14: 00007f4f34543300 R15: 0000000000022000 13:13:09 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x0, 0x0, 0x0}]}) 13:13:09 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(r1, 0x0, 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:13:09 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x0, 0x0, 0x0}]}) 13:13:09 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000007a00000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:09 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:09 executing program 4 (fault-call:2 fault-nth:5): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:09 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000007c00000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:09 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x0, 0x0, 0x0}]}) [ 200.453934][T13811] FAULT_INJECTION: forcing a failure. [ 200.453934][T13811] name failslab, interval 1, probability 0, space 0, times 0 [ 200.505227][T13811] CPU: 1 PID: 13811 Comm: syz-executor.4 Not tainted 5.12.0-rc4-syzkaller #0 [ 200.514005][T13811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.524059][T13811] Call Trace: [ 200.527338][T13811] dump_stack+0x137/0x19d [ 200.531682][T13811] should_fail+0x23c/0x250 [ 200.536095][T13811] __should_failslab+0x81/0x90 [ 200.540850][T13811] ? vhost_iotlb_alloc+0x33/0xb0 [ 200.545788][T13811] should_failslab+0x5/0x20 [ 200.550313][T13811] kmem_cache_alloc_trace+0x49/0x340 [ 200.555597][T13811] ? should_fail+0xd6/0x250 [ 200.560088][T13811] vhost_iotlb_alloc+0x33/0xb0 [ 200.564851][T13811] vhost_dev_ioctl+0x80e/0xce0 [ 200.569613][T13811] vhost_net_ioctl+0x18c/0x1250 [ 200.574526][T13811] ? do_vfs_ioctl+0x4f7/0xec0 [ 200.579201][T13811] ? tomoyo_file_ioctl+0x1c/0x20 [ 200.584145][T13811] ? vhost_net_chr_poll+0x30/0x30 [ 200.590090][T13811] __se_sys_ioctl+0xcb/0x140 [ 200.594680][T13811] __x64_sys_ioctl+0x3f/0x50 [ 200.599266][T13811] do_syscall_64+0x39/0x80 13:13:09 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x0, 0x0, 0x0}]}) 13:13:09 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x4, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 200.603731][T13811] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 200.609755][T13811] RIP: 0033:0x466459 [ 200.613640][T13811] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 200.633241][T13811] RSP: 002b:00007f4f34543188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 200.641642][T13811] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 13:13:09 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x7, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x6000, 0x1000, &(0x7f0000000840)=""/4096}, {0x0, 0x0, 0x0}]}) 13:13:09 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18ffffff8500000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:09 executing program 4 (fault-call:2 fault-nth:6): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) [ 200.649608][T13811] RDX: 0000000020001a00 RSI: 000000004008af03 RDI: 0000000000000003 [ 200.657571][T13811] RBP: 00007f4f345431d0 R08: 0000000000000000 R09: 0000000000000000 [ 200.665530][T13811] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 200.673484][T13811] R13: 00007ffdbb3ec93f R14: 00007f4f34543300 R15: 0000000000022000 [ 200.796854][T13842] FAULT_INJECTION: forcing a failure. [ 200.796854][T13842] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 200.809946][T13842] CPU: 1 PID: 13842 Comm: syz-executor.4 Not tainted 5.12.0-rc4-syzkaller #0 [ 200.818699][T13842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.828740][T13842] Call Trace: [ 200.832037][T13842] dump_stack+0x137/0x19d [ 200.836358][T13842] should_fail+0x23c/0x250 [ 200.840762][T13842] should_fail_usercopy+0x16/0x20 [ 200.845789][T13842] _copy_to_user+0x1c/0x90 [ 200.850245][T13842] simple_read_from_buffer+0xab/0x120 [ 200.855617][T13842] proc_fail_nth_read+0xf6/0x140 [ 200.860553][T13842] ? rw_verify_area+0x136/0x250 [ 200.865450][T13842] ? proc_fault_inject_write+0x200/0x200 [ 200.871127][T13842] vfs_read+0x154/0x5d0 [ 200.875330][T13842] ? __fget_light+0x219/0x260 [ 200.879998][T13842] ksys_read+0xce/0x180 [ 200.884198][T13842] __x64_sys_read+0x3e/0x50 [ 200.888706][T13842] do_syscall_64+0x39/0x80 [ 200.893110][T13842] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 200.898994][T13842] RIP: 0033:0x4191dc [ 200.902914][T13842] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 200.922511][T13842] RSP: 002b:00007f4f34543170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 200.930907][T13842] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00000000004191dc [ 200.938872][T13842] RDX: 000000000000000f RSI: 00007f4f345431e0 RDI: 0000000000000004 [ 200.946870][T13842] RBP: 00007f4f345431d0 R08: 0000000000000000 R09: 0000000000000000 [ 200.954934][T13842] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 200.962918][T13842] R13: 00007ffdbb3ec93f R14: 00007f4f34543300 R15: 0000000000022000 13:13:10 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(r1, 0x0, 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:13:10 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000008a00000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:10 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x5, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:10 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x6, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x3000, 0x0, 0x0}]}) 13:13:10 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x6, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x3000, 0x0, 0x0}]}) 13:13:10 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:10 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18ffffff9500000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:10 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x6, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x0, 0x0, 0x0}]}) 13:13:10 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x2, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:10 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x6, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x0, 0x0, 0x0}]}) 13:13:10 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x6, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:10 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x10, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) [ 201.390162][ T36] kauditd_printk_skb: 2 callbacks suppressed [ 201.390173][ T36] audit: type=1804 audit(1616850790.176:83): pid=13873 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/151/bus" dev="sda1" ino=14725 res=1 errno=0 [ 201.521112][ T36] audit: type=1804 audit(1616850790.286:84): pid=13888 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/152/bus" dev="sda1" ino=14719 res=1 errno=0 13:13:10 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(r1, 0x0, 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:13:10 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000d000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:10 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x6, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x0, 0x0, 0x0}]}) 13:13:10 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x7, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:10 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4c01, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:10 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x6, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x0, 0x0, 0x0}]}) 13:13:11 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000002fc00000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:11 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x6, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x0, 0x0, 0x0}]}) 13:13:11 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x6, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x92, &(0x7f0000000780)=""/146}, {0x0, 0x0, 0x0}]}) 13:13:11 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000ff00000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:11 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x541b, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:11 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 202.261798][ T36] audit: type=1804 audit(1616850791.046:85): pid=13916 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/153/bus" dev="sda1" ino=14746 res=1 errno=0 [ 202.417949][ T36] audit: type=1804 audit(1616850791.196:86): pid=13938 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/154/bus" dev="sda1" ino=14728 res=1 errno=0 13:13:11 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffe0, 0x0) 13:13:11 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x5, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x0, 0x0}]}) 13:13:11 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x5, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x3000, 0x0, 0x0}]}) 13:13:11 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000060ff00000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:11 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x5421, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:11 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x9, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:11 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1885ffffff00000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:11 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0xa, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:12 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x5450, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:12 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x5, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x0, 0x0, 0x0}]}) [ 203.136132][ T36] audit: type=1804 audit(1616850791.916:87): pid=13963 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/155/bus" dev="sda1" ino=14746 res=1 errno=0 13:13:12 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x5, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x0, 0x0, 0x0}]}) 13:13:12 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1895ffffff00000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 203.269206][ T36] audit: type=1804 audit(1616850792.056:88): pid=13984 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/156/bus" dev="sda1" ino=14750 res=1 errno=0 13:13:12 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffe0, 0x0) 13:13:12 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x5, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x0, 0x0, 0x0}]}) 13:13:12 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x5451, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:12 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0xb, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:12 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x5, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x0, 0x0, 0x0}]}) 13:13:12 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18ffffffffff600000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:12 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000100000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:12 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x5452, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:12 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x5, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x0, 0x0, 0x0}]}) 13:13:12 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x5, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x10000, 0x98, &(0x7f00000006c0)=""/152}, {0x0, 0x0, 0x0}]}) 13:13:12 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0xc, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 204.062927][ T36] audit: type=1804 audit(1616850792.846:89): pid=14015 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/157/bus" dev="sda1" ino=14751 res=1 errno=0 13:13:12 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000002000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 204.205969][ T36] audit: type=1804 audit(1616850792.987:90): pid=14036 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/158/bus" dev="sda1" ino=14742 res=1 errno=0 13:13:13 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffe0, 0x0) 13:13:13 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x5460, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:13 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x4, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x3000, 0x0, 0x0}]}) 13:13:13 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x4, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x3000, 0x0, 0x0}]}) 13:13:13 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:13 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0xd, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:13 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x4, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x0, 0x0, 0x0}]}) 13:13:13 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000002000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:13 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x6364, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:13 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x4, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x0, 0x0, 0x0}]}) 13:13:13 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0xe, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 204.967514][ T36] audit: type=1804 audit(1616850793.747:91): pid=14059 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/159/bus" dev="sda1" ino=14765 res=1 errno=0 13:13:13 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x4, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x0, 0x0, 0x0}]}) [ 205.152525][ T36] audit: type=1804 audit(1616850793.927:92): pid=14083 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/160/bus" dev="sda1" ino=14742 res=1 errno=0 13:13:14 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 13:13:14 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000003000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:14 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x4, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x0, 0x0, 0x0}]}) 13:13:14 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x4, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x0, 0x0, 0x0}]}) 13:13:14 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x8913, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:14 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x10, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:14 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x4, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x1, 0xa1, &(0x7f0000000600)=""/161}, {0x0, 0x0, 0x0}]}) 13:13:14 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x3, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x3000, 0x0, 0x0}]}) 13:13:14 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000004000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:14 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x8914, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:14 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000005000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:14 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x11, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:15 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 13:13:15 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x3, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x3000, 0x0, 0x0}]}) 13:13:15 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x3, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x0, 0x0, 0x0}]}) 13:13:15 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000006000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:15 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x8933, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:15 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x12, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:15 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000007000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:15 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000008000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:15 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x3, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x0, 0x0, 0x0}]}) 13:13:15 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x3, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x0, 0x0, 0x0}]}) 13:13:15 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000009000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:15 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x14, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 206.767595][ T36] kauditd_printk_skb: 2 callbacks suppressed [ 206.767607][ T36] audit: type=1804 audit(1616850795.547:95): pid=14152 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/163/bus" dev="sda1" ino=14795 res=1 errno=0 [ 206.902246][ T36] audit: type=1804 audit(1616850795.687:96): pid=14172 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/164/bus" dev="sda1" ino=14780 res=1 errno=0 13:13:16 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 13:13:16 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xae41, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:16 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x3, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x0, 0x0, 0x0}]}) 13:13:16 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x3, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x0, 0x0, 0x0}]}) 13:13:16 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000a000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:16 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x3d, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:16 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000b000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:16 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf01, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:16 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x2, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x3000, 0x0, 0x0}]}) 13:13:16 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x56, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:16 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x3, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x2, 0x7d, &(0x7f0000000580)=""/125}, {0x0, 0x0, 0x0}]}) [ 207.654817][ T36] audit: type=1804 audit(1616850796.437:97): pid=14199 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/165/bus" dev="sda1" ino=14808 res=1 errno=0 13:13:16 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000c000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 207.785010][ T36] audit: type=1804 audit(1616850796.567:98): pid=14218 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/166/bus" dev="sda1" ino=14792 res=1 errno=0 [ 208.262730][T10131] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) 13:13:17 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 13:13:17 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x2, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x0, 0x0, 0x0}]}) 13:13:17 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x2, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x3000, 0x0, 0x0}]}) 13:13:17 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:17 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000d000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:17 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x74, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:17 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000e000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:17 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x400448c9, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:17 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x2, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x0, 0x0, 0x0}]}) 13:13:17 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x2, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x0, 0x0, 0x0}]}) 13:13:17 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x400448dd, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:17 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x7c, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 208.591501][ T36] audit: type=1804 audit(1616850797.377:99): pid=14251 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/167/bus" dev="sda1" ino=14796 res=1 errno=0 [ 208.714562][ T36] audit: type=1804 audit(1616850797.497:100): pid=14272 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/168/bus" dev="sda1" ino=14813 res=1 errno=0 13:13:18 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000010000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:18 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 13:13:18 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x2, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x0, 0x0, 0x0}]}) 13:13:18 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x400454ca, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0xb8, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:18 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x2, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x0, 0x0, 0x0}]}) 13:13:18 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000011000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:18 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:18 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x2, 0x0, [{0x100000, 0x73, &(0x7f0000000500)=""/115}, {0x0, 0x0, 0x0}]}) 13:13:18 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x40049409, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0xd0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:18 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000012000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:18 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) [ 209.461560][ T36] audit: type=1804 audit(1616850798.247:101): pid=14296 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/169/bus" dev="sda1" ino=14794 res=1 errno=0 [ 209.604723][ T36] audit: type=1804 audit(1616850798.387:102): pid=14318 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/170/bus" dev="sda1" ino=14834 res=1 errno=0 13:13:19 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000020000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:19 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000070000000120a0100000000000000000000000000040004800900020073797a30000000000900010073797a30000000000800030000000004"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 13:13:19 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4004af07, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:19 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x0, 0x0, 0x0}]}) 13:13:19 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x0, 0x0, 0x0}]}) 13:13:19 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0xdc, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:19 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x0, 0x0, 0x0}]}) 13:13:19 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000025000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:19 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000040000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:19 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x0, 0x0, 0x0}]}) 13:13:19 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0xe1, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 210.357160][ T36] audit: type=1804 audit(1616850799.137:103): pid=14341 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/171/bus" dev="sda1" ino=14853 res=1 errno=0 13:13:19 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af00, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:19 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x0, 0x0, 0x0}]}) [ 210.485399][ T36] audit: type=1804 audit(1616850799.268:104): pid=14364 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/172/bus" dev="sda1" ino=14848 res=1 errno=0 13:13:19 executing program 3: syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0xad, 0x43, 0x6e, 0x20, 0xbb4, 0xa06, 0xbcca, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0xbb, 0x0, 0x0, 0xa8, 0x69, 0x1f}}]}}]}}, 0x0) 13:13:20 executing program 0: syz_usb_connect$uac1(0x0, 0x8d, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x7b, 0x3, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{}, [@input_terminal={0xc}, @mixer_unit={0x5}, @feature_unit={0xb, 0x24, 0x6, 0x0, 0x0, 0x2, [0x0, 0x0]}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) 13:13:20 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000048000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:20 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x0, 0x0, 0x0}]}) 13:13:20 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0xff, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:20 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af02, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:20 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000004c000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:20 executing program 1: syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0x0, 0x107080) 13:13:20 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:20 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:20 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000024c0)='/dev/input/event#\x00', 0x20, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000080)=""/14) 13:13:20 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000058000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 211.540326][ T9590] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 211.548000][ T3783] usb 1-1: new high-speed USB device number 9 using dummy_hcd [ 211.806957][ T3783] usb 1-1: Using ep0 maxpacket: 8 [ 211.812100][ T9590] usb 4-1: Using ep0 maxpacket: 32 [ 211.937091][ T3783] usb 1-1: config 1 contains an unexpected descriptor of type 0x2, skipping [ 211.946212][ T3783] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x1 has an invalid bInterval 0, changing to 7 [ 211.957362][ T9590] usb 4-1: config 0 has an invalid interface number: 187 but max is 0 [ 211.965535][ T9590] usb 4-1: config 0 has no interface number 0 [ 211.971773][ T3783] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x1 has invalid wMaxPacketSize 0 [ 211.981527][ T3783] usb 1-1: config 1 interface 2 altsetting 1 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 211.992471][ T3783] usb 1-1: config 1 interface 2 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 212.002215][ T3783] usb 1-1: config 1 interface 1 has no altsetting 0 [ 212.156913][ T9590] usb 4-1: New USB device found, idVendor=0bb4, idProduct=0a06, bcdDevice=bc.ca [ 212.166051][ T9590] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 212.174603][ T9590] usb 4-1: Product: syz [ 212.179023][ T3783] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 212.188335][ T9590] usb 4-1: Manufacturer: syz [ 212.193016][ T9590] usb 4-1: SerialNumber: syz [ 212.198168][ T3783] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 212.206264][ T3783] usb 1-1: Product: syz [ 212.211146][ T3783] usb 1-1: Manufacturer: syz [ 212.216185][ T9590] usb 4-1: config 0 descriptor?? [ 212.223950][ T3783] usb 1-1: SerialNumber: syz [ 212.469765][ T3582] usb 4-1: USB disconnect, device number 2 [ 212.603492][ T3783] usb 1-1: USB disconnect, device number 9 [ 213.236741][ T3582] usb 4-1: new high-speed USB device number 3 using dummy_hcd [ 213.246818][ T5] usb 1-1: new high-speed USB device number 10 using dummy_hcd [ 213.476726][ T3582] usb 4-1: Using ep0 maxpacket: 32 [ 213.487031][ T5] usb 1-1: Using ep0 maxpacket: 8 [ 213.596919][ T3582] usb 4-1: config 0 has an invalid interface number: 187 but max is 0 [ 213.605317][ T3582] usb 4-1: config 0 has no interface number 0 [ 213.611626][ T5] usb 1-1: config 1 contains an unexpected descriptor of type 0x2, skipping [ 213.620381][ T5] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x1 has an invalid bInterval 0, changing to 7 [ 213.631403][ T5] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x1 has invalid wMaxPacketSize 0 [ 213.641672][ T5] usb 1-1: config 1 interface 2 altsetting 1 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 213.652644][ T5] usb 1-1: config 1 interface 2 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 213.662879][ T5] usb 1-1: config 1 interface 1 has no altsetting 0 [ 213.776659][ T3582] usb 4-1: New USB device found, idVendor=0bb4, idProduct=0a06, bcdDevice=bc.ca [ 213.786057][ T3582] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 213.794626][ T3582] usb 4-1: Product: syz [ 213.798853][ T3582] usb 4-1: Manufacturer: syz [ 213.803526][ T3582] usb 4-1: SerialNumber: syz [ 213.810081][ T3582] usb 4-1: config 0 descriptor?? [ 213.828648][ T5] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 213.837750][ T5] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 213.845928][ T5] usb 1-1: Product: syz [ 213.852601][ T5] usb 1-1: Manufacturer: syz [ 213.864866][ T5] usb 1-1: SerialNumber: syz 13:13:22 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x2, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:22 executing program 0: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x141040) 13:13:22 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af25, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:22 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000068000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:22 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000001600)=""/188) [ 214.061667][ T3582] usb 4-1: USB disconnect, device number 3 [ 214.091130][ T36] kauditd_printk_skb: 2 callbacks suppressed 13:13:22 executing program 1: syz_usb_connect$cdc_ecm(0x2, 0x4d, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}, {[], {{0x9, 0x5, 0x82, 0x2, 0x8, 0xd0}}, {{0x9, 0x5, 0x3, 0x2, 0x40}}}}}]}}]}}, 0x0) 13:13:22 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x3, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 214.091139][ T36] audit: type=1804 audit(1616850802.878:107): pid=14482 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/175/bus" dev="sda1" ino=14869 res=1 errno=0 13:13:23 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 13:13:23 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x4, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:23 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0xa0202, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000280)={0x2a0, 0x0, 0x0, [{{0x4, 0x0, 0x0, 0x0, 0xc, 0x0, {0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00, 0x8}}, {0x0, 0x0, 0xa, 0x0, '/dev/vcsa\x00'}}, {{0x0, 0x3, 0xfffffffffffff2d7, 0x0, 0x1, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xee01}}, {0x0, 0x0, 0x1, 0x0, '-'}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x0, 0x6, 0x0, 0x0, 0x81}}, {0x0, 0x0, 0x7, 0x0, '+!#&{#}'}}, {{}, {0x0, 0x0, 0xa, 0x0, '[\x05ev/vcs\xd5\x80'}}]}, 0x2a0) 13:13:23 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000006c000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:23 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af30, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) [ 214.221939][ T5] usb 1-1: USB disconnect, device number 10 [ 214.228072][ T36] audit: type=1804 audit(1616850803.008:108): pid=14505 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/176/bus" dev="sda1" ino=14883 res=1 errno=0 13:13:23 executing program 0: sendmsg$NL80211_CMD_AUTHENTICATE(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000008c40)) 13:13:23 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getitimer(0x0, &(0x7f0000000040)) 13:13:23 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x40186366, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:23 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x5, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 214.321875][ T36] audit: type=1804 audit(1616850803.108:109): pid=14531 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/177/bus" dev="sda1" ino=14878 res=1 errno=0 13:13:23 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000074000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 214.476675][ T3783] usb 2-1: new full-speed USB device number 11 using dummy_hcd [ 214.488525][ T36] audit: type=1804 audit(1616850803.278:110): pid=14555 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/178/bus" dev="sda1" ino=14830 res=1 errno=0 [ 214.909435][ T3783] usb 2-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 215.086513][ T3783] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 215.095566][ T3783] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 215.103891][ T3783] usb 2-1: Product: syz [ 215.108137][ T3783] usb 2-1: Manufacturer: syz [ 215.112722][ T3783] usb 2-1: SerialNumber: syz [ 215.386491][ T3783] cdc_ether: probe of 2-1:1.0 failed with error -71 [ 215.395677][ T3783] usb 2-1: USB disconnect, device number 11 [ 216.136282][ T5] usb 2-1: new full-speed USB device number 12 using dummy_hcd [ 216.496321][ T5] usb 2-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 216.666308][ T5] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 216.675494][ T5] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 216.683869][ T5] usb 2-1: Product: syz [ 216.688156][ T5] usb 2-1: Manufacturer: syz [ 216.692870][ T5] usb 2-1: SerialNumber: syz 13:13:25 executing program 1: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) sendto$l2tp6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$VIDIOC_G_JPEGCOMP(0xffffffffffffffff, 0x808c563d, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) openat$vimc1(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_G_FBUF(0xffffffffffffffff, 0x8030560a, 0x0) openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) 13:13:25 executing program 0: socketpair(0x1a, 0x0, 0x0, 0x0) 13:13:25 executing program 3: getresgid(&(0x7f00000002c0), 0xfffffffffffffffc, 0x0) 13:13:25 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4020940d, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:25 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x6, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:25 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000007a000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:25 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000021c0)='/dev/vcsa\x00', 0x202, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x9}, 0xffffff34) [ 216.956172][ T5] cdc_ether: probe of 2-1:1.0 failed with error -71 [ 216.975686][ T5] usb 2-1: USB disconnect, device number 12 13:13:25 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, &(0x7f0000000180)=[0x0], 0x0, 0x0) 13:13:25 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000007c000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 217.019781][ T36] audit: type=1804 audit(1616850805.808:111): pid=14603 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/179/bus" dev="sda1" ino=14897 res=1 errno=0 13:13:25 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x7, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:25 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4020ae46, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) [ 217.060892][T14606] vivid-002: ================= START STATUS ================= [ 217.070834][T14606] v4l2-ctrls: vivid-002: Radio HW Seek Mode: Bounded [ 217.081069][T14606] v4l2-ctrls: vivid-002: Radio Programmable HW Seek: false [ 217.108877][T14606] v4l2-ctrls: vivid-002: RDS Rx I/O Mode: Block I/O 13:13:25 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000ffffff85000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:25 executing program 1: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f00000001c0)=""/7) shmctl$IPC_RMID(0x0, 0x0) shmget$private(0x0, 0x2000, 0x2, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x4}, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x2) sched_setscheduler(0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) shmctl$SHM_UNLOCK(0x0, 0xc) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x0) shmat(0x0, &(0x7f00008a7000/0x1000)=nil, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) shmctl$IPC_RMID(0x0, 0x0) 13:13:25 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) close(r0) [ 217.133664][T14606] v4l2-ctrls: vivid-002: Generate RBDS Instead of RDS: false [ 217.133682][T14606] v4l2-ctrls: vivid-002: RDS Reception: true 13:13:26 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x80086301, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:26 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x8, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000008a000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 217.133693][T14606] v4l2-ctrls: vivid-002: RDS Program Type: 0 inactive [ 217.133707][T14606] v4l2-ctrls: vivid-002: RDS PS Name: inactive [ 217.133721][T14606] v4l2-ctrls: vivid-002: RDS Radio Text: inactive 13:13:26 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x2, 0x4, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 217.133772][T14606] v4l2-ctrls: vivid-002: RDS Traffic Announcement: false inactive [ 217.133889][T14606] v4l2-ctrls: vivid-002: RDS Traffic Program: false inactive [ 217.133903][T14606] v4l2-ctrls: vivid-002: RDS Music: false inactive [ 217.133918][T14606] vivid-002: ================== END STATUS ================== [ 217.144828][T14614] vivid-002: ================= START STATUS ================= [ 217.144840][T14614] v4l2-ctrls: vivid-002: Radio HW Seek Mode: Bounded [ 217.144856][T14614] v4l2-ctrls: vivid-002: Radio Programmable HW Seek: false [ 217.144870][T14614] v4l2-ctrls: vivid-002: RDS Rx I/O Mode: Block I/O [ 217.144885][T14614] v4l2-ctrls: vivid-002: Generate RBDS Instead of RDS: false [ 217.144913][T14614] v4l2-ctrls: vivid-002: RDS Reception: true [ 217.144926][T14614] v4l2-ctrls: vivid-002: RDS Program Type: 0 inactive [ 217.144958][T14614] v4l2-ctrls: vivid-002: RDS PS Name: inactive [ 217.144975][T14614] v4l2-ctrls: vivid-002: RDS Radio Text: inactive [ 217.144994][T14614] v4l2-ctrls: vivid-002: RDS Traffic Announcement: false inactive [ 217.145012][T14614] v4l2-ctrls: vivid-002: RDS Traffic Program: false inactive [ 217.145027][T14614] v4l2-ctrls: vivid-002: RDS Music: false inactive [ 217.145041][T14614] vivid-002: ================== END STATUS ================== 13:13:26 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 13:13:26 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) close(r0) 13:13:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000ffffff95000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:26 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x8008af00, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:26 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x9, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:26 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000000), 0x10) getsockname$llc(r0, 0x0, &(0x7f00000001c0)) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, 0x0) [ 217.191278][ T36] audit: type=1804 audit(1616850805.979:112): pid=14622 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/180/bus" dev="sda1" ino=14897 res=1 errno=0 [ 217.333178][ T36] audit: type=1804 audit(1616850806.119:113): pid=14643 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/181/bus" dev="sda1" ino=14887 res=1 errno=0 13:13:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000d0000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:26 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0xa, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:26 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x8008af26, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:26 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000100)) [ 217.667289][ T36] audit: type=1804 audit(1616850806.459:114): pid=14673 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/182/bus" dev="sda1" ino=14902 res=1 errno=0 13:13:26 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) close(r0) 13:13:26 executing program 3: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) 13:13:26 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, 0x0, 0x0) 13:13:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000002fc000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:26 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xc0045878, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:26 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={0x0, @l2tp, @ethernet, @xdp={0x2c, 0x0, 0x0}, 0xffff, 0x0, 0x0, 0x0, 0x5, &(0x7f00000001c0)='vlan1\x00', 0x2, 0x7, 0x9}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCADDRT(r2, 0x890b, &(0x7f00000002c0)={0x0, @ax25={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x9}, @rc={0x1f, @fixed={[], 0x10}, 0xff}, @l2={0x1f, 0xfffd, @any, 0x9, 0x1}, 0x8, 0x0, 0x0, 0x0, 0x800, &(0x7f0000000280)='vlan1\x00', 0x2, 0x9, 0xffc0}) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000f40)='/dev/vcsa\x00', 0x200100, 0x0) sendmmsg$alg(r3, 0x0, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_DEL(r4, &(0x7f0000000180)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x4, 0x70bd27, 0x25dfdbfb, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x2c}}, 0x40019) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'erspan0\x00', r1, 0x97, 0x8, 0xff, 0x9, {{0xd, 0x4, 0x2, 0x6, 0x34, 0x68, 0x0, 0xfe, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, {[@timestamp_addr={0x44, 0xc, 0xb1, 0x1, 0xc, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x800}]}, @lsrr={0x83, 0x13, 0x3a, [@empty, @local, @local, @multicast2]}]}}}}}) [ 217.808165][ T36] audit: type=1804 audit(1616850806.599:115): pid=14688 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/183/bus" dev="sda1" ino=14890 res=1 errno=0 13:13:26 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000003ec0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0x0, r1}, 0x10) 13:13:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000ff000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:26 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) close(r0) 13:13:26 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0xb, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:26 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xc0045878, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000ffffffff000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:26 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000080)=""/110) 13:13:26 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x7fffffff) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) 13:13:26 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file1\x00', 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2]) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000080)='autofs\x00', 0x0, &(0x7f0000000400)) lchown(&(0x7f00000000c0)='./file1\x00', 0xee00, 0x0) sendfile(r0, r1, 0x0, 0x800000080004103) 13:13:26 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xc0189436, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000060ffffffffff000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 218.044772][ T36] audit: type=1804 audit(1616850806.829:116): pid=14718 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/184/bus" dev="sda1" ino=14893 res=1 errno=0 13:13:26 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0xc, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:26 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000007b80)=[{{0x0, 0x0, &(0x7f0000000780)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000029c0)=""/4096, 0x1000}, {&(0x7f0000000500)=""/42, 0x2a}], 0x5, &(0x7f0000000800)=""/139, 0x8b}, 0x20}, {{0x0, 0x0, &(0x7f0000003f00)=[{&(0x7f0000005880)=""/53, 0x35}, {&(0x7f00000039c0)=""/212, 0xd4}, {&(0x7f0000003ac0)=""/168, 0xa8}, {0x0}, {0x0}, {&(0x7f0000003e00)=""/157, 0x9d}, {&(0x7f0000003ec0)=""/4, 0x4}], 0x7, &(0x7f0000003f80)=""/159, 0x9f}}, {{&(0x7f0000004040)=@nl=@proc, 0x80, 0x0, 0x0, &(0x7f0000004180)=""/93, 0x5d}}, {{&(0x7f0000004200)=@caif=@util, 0x80, &(0x7f00000044c0)=[{&(0x7f0000004340)=""/71, 0x47}], 0x1, &(0x7f0000004500)=""/13, 0xd}, 0x9}, {{&(0x7f0000004540)=@tipc, 0x80, &(0x7f0000005b80)=[{0x0}, {&(0x7f0000005640)=""/72, 0x48}, {0x0}, {0x0}, {&(0x7f0000005900)=""/213, 0xd5}, {0x0}, {0x0}], 0x7}, 0x5}, {{&(0x7f0000005d00), 0x80, &(0x7f0000005e40)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000007340), 0x0, &(0x7f00000073c0)=""/4, 0x4}, 0x5}, {{&(0x7f0000007400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, &(0x7f0000007540)=""/183, 0xb7}, 0x6}, {{0x0, 0x0, 0x0}, 0xfffffffd}], 0x9, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1, 0x1}, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) r5 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6800) lseek(r5, 0x4200, 0x2) r6 = creat(&(0x7f0000000000)='./bus\x00', 0xda) io_setup(0x1ff, &(0x7f0000000400)=0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000001}) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f00000002c0)="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", 0xa9f9, 0x7}]) r8 = open(&(0x7f0000000140)='./bus\x00', 0x28000, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100)=0x9, 0x8080ffffff80) 13:13:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180002000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:27 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file1\x00', 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2]) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000080)='autofs\x00', 0x0, &(0x7f0000000400)) lchown(&(0x7f00000000c0)='./file1\x00', 0xee00, 0x0) sendfile(r0, r1, 0x0, 0x800000080004103) 13:13:27 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x7fffffff) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) [ 218.151274][T14729] autofs4:pid:14729:autofs_fill_super: pipe file descriptor does not contain proper ops 13:13:27 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xc020660b, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:27 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0xd, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180003000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:27 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file1\x00', 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2]) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000080)='autofs\x00', 0x0, &(0x7f0000000400)) lchown(&(0x7f00000000c0)='./file1\x00', 0xee00, 0x0) sendfile(r0, r1, 0x0, 0x800000080004103) 13:13:27 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xc0404309, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180004000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:27 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x7fffffff) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) 13:13:27 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0xe, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:27 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000007b80)=[{{0x0, 0x0, &(0x7f0000000780)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000029c0)=""/4096, 0x1000}, {&(0x7f0000000500)=""/42, 0x2a}], 0x5, &(0x7f0000000800)=""/139, 0x8b}, 0x20}, {{0x0, 0x0, &(0x7f0000003f00)=[{&(0x7f0000005880)=""/53, 0x35}, {&(0x7f00000039c0)=""/212, 0xd4}, {&(0x7f0000003ac0)=""/168, 0xa8}, {0x0}, {0x0}, {&(0x7f0000003e00)=""/157, 0x9d}, {&(0x7f0000003ec0)=""/4, 0x4}], 0x7, &(0x7f0000003f80)=""/159, 0x9f}}, {{&(0x7f0000004040)=@nl=@proc, 0x80, 0x0, 0x0, &(0x7f0000004180)=""/93, 0x5d}}, {{&(0x7f0000004200)=@caif=@util, 0x80, &(0x7f00000044c0)=[{&(0x7f0000004340)=""/71, 0x47}], 0x1, &(0x7f0000004500)=""/13, 0xd}, 0x9}, {{&(0x7f0000004540)=@tipc, 0x80, &(0x7f0000005b80)=[{0x0}, {&(0x7f0000005640)=""/72, 0x48}, {0x0}, {0x0}, {&(0x7f0000005900)=""/213, 0xd5}, {0x0}, {0x0}], 0x7}, 0x5}, {{&(0x7f0000005d00), 0x80, &(0x7f0000005e40)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000007340), 0x0, &(0x7f00000073c0)=""/4, 0x4}, 0x5}, {{&(0x7f0000007400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, &(0x7f0000007540)=""/183, 0xb7}, 0x6}, {{0x0, 0x0, 0x0}, 0xfffffffd}], 0x9, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1, 0x1}, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) r5 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6800) lseek(r5, 0x4200, 0x2) r6 = creat(&(0x7f0000000000)='./bus\x00', 0xda) io_setup(0x1ff, &(0x7f0000000400)=0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000001}) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f00000002c0)="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", 0xa9f9, 0x7}]) r8 = open(&(0x7f0000000140)='./bus\x00', 0x28000, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100)=0x9, 0x8080ffffff80) 13:13:27 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xc4089434, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180005000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:27 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:27 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file1\x00', 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2]) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000080)='autofs\x00', 0x0, &(0x7f0000000400)) lchown(&(0x7f00000000c0)='./file1\x00', 0xee00, 0x0) sendfile(r0, r1, 0x0, 0x800000080004103) 13:13:27 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x7fffffff) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) 13:13:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180006000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:28 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file1\x00', 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2]) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000080)='autofs\x00', 0x0, &(0x7f0000000400)) lchown(&(0x7f00000000c0)='./file1\x00', 0xee00, 0x0) sendfile(r0, r1, 0x0, 0x800000080004103) 13:13:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180007000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:28 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x11, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:28 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x3, 0x0, [{0x3000, 0x0, 0x0}]}) [ 219.231313][ T36] kauditd_printk_skb: 4 callbacks suppressed [ 219.231323][ T36] audit: type=1804 audit(1616850808.019:121): pid=14801 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/188/bus" dev="sda1" ino=14177 res=1 errno=0 13:13:28 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000cf8000/0x4000)=nil) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000280)=""/187) [ 219.382816][ T36] audit: type=1804 audit(1616850808.159:122): pid=14817 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir797142007/syzkaller.wR0gJ5/201/bus" dev="sda1" ino=14906 res=1 errno=0 [ 219.422780][ T36] audit: type=1804 audit(1616850808.209:123): pid=14822 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/189/bus" dev="sda1" ino=14893 res=1 errno=0 13:13:28 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000007b80)=[{{0x0, 0x0, &(0x7f0000000780)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000029c0)=""/4096, 0x1000}, {&(0x7f0000000500)=""/42, 0x2a}], 0x5, &(0x7f0000000800)=""/139, 0x8b}, 0x20}, {{0x0, 0x0, &(0x7f0000003f00)=[{&(0x7f0000005880)=""/53, 0x35}, {&(0x7f00000039c0)=""/212, 0xd4}, {&(0x7f0000003ac0)=""/168, 0xa8}, {0x0}, {0x0}, {&(0x7f0000003e00)=""/157, 0x9d}, {&(0x7f0000003ec0)=""/4, 0x4}], 0x7, &(0x7f0000003f80)=""/159, 0x9f}}, {{&(0x7f0000004040)=@nl=@proc, 0x80, 0x0, 0x0, &(0x7f0000004180)=""/93, 0x5d}}, {{&(0x7f0000004200)=@caif=@util, 0x80, &(0x7f00000044c0)=[{&(0x7f0000004340)=""/71, 0x47}], 0x1, &(0x7f0000004500)=""/13, 0xd}, 0x9}, {{&(0x7f0000004540)=@tipc, 0x80, &(0x7f0000005b80)=[{0x0}, {&(0x7f0000005640)=""/72, 0x48}, {0x0}, {0x0}, {&(0x7f0000005900)=""/213, 0xd5}, {0x0}, {0x0}], 0x7}, 0x5}, {{&(0x7f0000005d00), 0x80, &(0x7f0000005e40)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000007340), 0x0, &(0x7f00000073c0)=""/4, 0x4}, 0x5}, {{&(0x7f0000007400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, &(0x7f0000007540)=""/183, 0xb7}, 0x6}, {{0x0, 0x0, 0x0}, 0xfffffffd}], 0x9, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1, 0x1}, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) r5 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6800) lseek(r5, 0x4200, 0x2) r6 = creat(&(0x7f0000000000)='./bus\x00', 0xda) io_setup(0x1ff, &(0x7f0000000400)=0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000001}) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f00000002c0)="da455864eeb9167c1ec76189e57e50c68e739ea84e4043521453c701ff8f874b7856a5a7434f6091814e0c7f4f80d24902643c3d4076752752ef6d2b215fa2a85b69f7e26f3abbc9a62fa52d09fd1f96d8ef9bb84710faa5b92bf6c168c6c46c66ee6c8e3fe567dd749027291261984989f79cee47a0d6f29044bbb70ef418a052f1dfe9aab165af7d3b7f7cd5e21cd5b2b3e62b7223290a2aaa95a4045fc2e6247ff36502396ca21c18a60fe6f4699dc563d8b40c84269a24486af086b392ce38e2c573d683282f3a9a345c8dcc7483eda3a26183108d8b16b0c4c651625c833462f9b5ad5e6b276ef0f6b2dadc5e48bc2f736a1e97e4496b770d515271e0c1a32713988e3e6086ca4694973913d27316b6e1d324b155314b217f991a23e3c04cdc00b1e6bf2a912d88", 0xa9f9, 0x7}]) r8 = open(&(0x7f0000000140)='./bus\x00', 0x28000, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100)=0x9, 0x8080ffffff80) 13:13:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180008000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:28 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file1\x00', 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2]) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000080)='autofs\x00', 0x0, &(0x7f0000000400)) lchown(&(0x7f00000000c0)='./file1\x00', 0xee00, 0x0) sendfile(r0, r1, 0x0, 0x800000080004103) 13:13:28 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x12, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:28 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x7, &(0x7f00000000c0), 0x4) 13:13:28 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x5, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:29 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x0, 0x0, &(0x7f0000000340)) 13:13:29 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file1\x00', 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2]) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000080)='autofs\x00', 0x0, &(0x7f0000000400)) lchown(&(0x7f00000000c0)='./file1\x00', 0xee00, 0x0) sendfile(r0, r1, 0x0, 0x800000080004103) 13:13:29 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xb90}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, 0x0) pipe2(0x0, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000100)) 13:13:29 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180009000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:29 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x8, 0x0, [{0x3000, 0x0, 0x0}]}) [ 220.267056][ T36] audit: type=1804 audit(1616850809.059:124): pid=14849 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/190/bus" dev="sda1" ino=14928 res=1 errno=0 13:13:29 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x14, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 220.413036][ T36] audit: type=1804 audit(1616850809.199:125): pid=14868 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/191/bus" dev="sda1" ino=13896 res=1 errno=0 [ 220.473212][ T36] audit: type=1804 audit(1616850809.239:126): pid=14870 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir797142007/syzkaller.wR0gJ5/202/bus" dev="sda1" ino=14196 res=1 errno=0 13:13:30 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000007b80)=[{{0x0, 0x0, &(0x7f0000000780)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000029c0)=""/4096, 0x1000}, {&(0x7f0000000500)=""/42, 0x2a}], 0x5, &(0x7f0000000800)=""/139, 0x8b}, 0x20}, {{0x0, 0x0, &(0x7f0000003f00)=[{&(0x7f0000005880)=""/53, 0x35}, {&(0x7f00000039c0)=""/212, 0xd4}, {&(0x7f0000003ac0)=""/168, 0xa8}, {0x0}, {0x0}, {&(0x7f0000003e00)=""/157, 0x9d}, {&(0x7f0000003ec0)=""/4, 0x4}], 0x7, &(0x7f0000003f80)=""/159, 0x9f}}, {{&(0x7f0000004040)=@nl=@proc, 0x80, 0x0, 0x0, &(0x7f0000004180)=""/93, 0x5d}}, {{&(0x7f0000004200)=@caif=@util, 0x80, &(0x7f00000044c0)=[{&(0x7f0000004340)=""/71, 0x47}], 0x1, &(0x7f0000004500)=""/13, 0xd}, 0x9}, {{&(0x7f0000004540)=@tipc, 0x80, &(0x7f0000005b80)=[{0x0}, {&(0x7f0000005640)=""/72, 0x48}, {0x0}, {0x0}, {&(0x7f0000005900)=""/213, 0xd5}, {0x0}, {0x0}], 0x7}, 0x5}, {{&(0x7f0000005d00), 0x80, &(0x7f0000005e40)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000007340), 0x0, &(0x7f00000073c0)=""/4, 0x4}, 0x5}, {{&(0x7f0000007400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, &(0x7f0000007540)=""/183, 0xb7}, 0x6}, {{0x0, 0x0, 0x0}, 0xfffffffd}], 0x9, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1, 0x1}, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) r5 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6800) lseek(r5, 0x4200, 0x2) r6 = creat(&(0x7f0000000000)='./bus\x00', 0xda) io_setup(0x1ff, &(0x7f0000000400)=0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000001}) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f00000002c0)="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", 0xa9f9, 0x7}]) r8 = open(&(0x7f0000000140)='./bus\x00', 0x28000, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100)=0x9, 0x8080ffffff80) 13:13:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000a000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:30 executing program 3: syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) pipe2(&(0x7f00000001c0), 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000100)) 13:13:30 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() capget(&(0x7f0000000080)={0x19980330, r0}, &(0x7f00000000c0)) 13:13:30 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x3d, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:30 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x300, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000b000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:30 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmctl$IPC_SET(r0, 0x1, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 13:13:30 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0xa0202, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000280)={0x2a0, 0x0, 0x0, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}, {0x0, 0x0, 0xa, 0x0, '/dev/vcsa\x00'}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}, {0x0, 0x0, 0x1, 0x0, '-'}}, {{0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}}, {0x0, 0x0, 0x7, 0x0, '+!#&{#}'}}, {{}, {0x0, 0x0, 0xa, 0x0, '[\x05ev/vcs\xd5\x80'}}]}, 0x2a0) [ 221.231627][T14884] capability: warning: `syz-executor.0' uses 32-bit capabilities (legacy support in use) 13:13:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000c000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:30 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x56, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:30 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000007b80)=[{{0x0, 0x0, &(0x7f0000000780)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000029c0)=""/4096, 0x1000}, {&(0x7f0000000500)=""/42, 0x2a}], 0x5, &(0x7f0000000800)=""/139, 0x8b}, 0x20}, {{0x0, 0x0, &(0x7f0000003f00)=[{&(0x7f0000005880)=""/53, 0x35}, {&(0x7f00000039c0)=""/212, 0xd4}, {&(0x7f0000003ac0)=""/168, 0xa8}, {0x0}, {0x0}, {&(0x7f0000003e00)=""/157, 0x9d}, {&(0x7f0000003ec0)=""/4, 0x4}], 0x7, &(0x7f0000003f80)=""/159, 0x9f}}, {{&(0x7f0000004040)=@nl=@proc, 0x80, 0x0, 0x0, &(0x7f0000004180)=""/93, 0x5d}}, {{&(0x7f0000004200)=@caif=@util, 0x80, &(0x7f00000044c0)=[{0x0}, {&(0x7f0000004340)=""/71, 0x47}], 0x2, &(0x7f0000004500)=""/13, 0xd}, 0x9}, {{&(0x7f0000004540)=@tipc, 0x80, &(0x7f0000005b80)=[{0x0}, {&(0x7f0000005640)=""/72, 0x48}, {0x0}, {0x0}, {&(0x7f0000005900)=""/213, 0xd5}, {0x0}, {0x0}], 0x7}, 0x5}, {{&(0x7f0000005d00), 0x80, &(0x7f0000005e40)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000007340), 0x0, &(0x7f00000073c0)=""/4, 0x4}, 0x5}, {{0x0, 0x0, 0x0}, 0xfffffffd}], 0x8, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1, 0x1}, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) r5 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6800) lseek(r5, 0x4200, 0x2) r6 = creat(&(0x7f0000000000)='./bus\x00', 0xda) io_setup(0x1ff, &(0x7f0000000400)=0x0) r8 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000001}) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f00000002c0)="da455864eeb9167c1ec76189e57e50c68e739ea84e4043521453c701ff8f874b7856a5a7434f6091814e0c7f4f80d24902643c3d4076752752ef6d2b215fa2a85b69f7e26f3abbc9a62fa52d09fd1f96d8ef9bb84710faa5b92bf6c168c6c46c66ee6c8e3fe567dd749027291261984989f79cee47a0d6f29044bbb70ef418a052f1dfe9aab165af7d3b7f7cd5e21cd5b2b3e62b7223290a2aaa95a4045fc2e6247ff36502396ca21c18a60fe6f4699dc563d8b40c84269a24486af086b392ce38e2c573d683282f3a9a345c8dcc7483eda3a26183108d8b16b0c4c651625c833462f9b5ad5e6b276ef0f6b2dadc5e48bc2f736a1e97e4496b770d515271e0c1a32713988e3e6086ca4694973913d27316b6e1d324b155314b217f991a23e3c04cdc00b1e6bf2a912d88", 0xa9f9, 0x7}]) r9 = open(&(0x7f0000000140)='./bus\x00', 0x28000, 0x0) sendfile(r5, r9, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100)=0x9, 0x8080ffffff80) [ 221.311916][ T36] audit: type=1804 audit(1616850810.099:127): pid=14898 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/192/bus" dev="sda1" ino=14938 res=1 errno=0 [ 221.438939][ T36] audit: type=1804 audit(1616850810.229:128): pid=14915 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/193/bus" dev="sda1" ino=14177 res=1 errno=0 [ 221.479298][ T36] audit: type=1804 audit(1616850810.269:129): pid=14918 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir797142007/syzkaller.wR0gJ5/203/bus" dev="sda1" ino=14193 res=1 errno=0 [ 221.569332][ T36] audit: type=1804 audit(1616850810.359:130): pid=14925 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir914673494/syzkaller.ktCgc0/120/bus" dev="sda1" ino=14177 res=1 errno=0 13:13:31 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x74, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:31 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000002c0)={'tunl0\x00', &(0x7f0000000280)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @loopback, @broadcast}}}}) 13:13:31 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x3ffffff, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:31 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000d000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:31 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000001e80)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000340)={0x10, 0x0, r2}, 0x10) msgget(0x3, 0x200) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, &(0x7f0000001540)={0x16, 0x1}) 13:13:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect$netlink(r0, &(0x7f0000000140), 0xc) 13:13:31 executing program 3: r0 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x7, 0x0, "f3a8e738d6709856"}) 13:13:31 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000e000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:31 executing program 1: perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:31 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x7c, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:31 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x0, 0x0}]}) 13:13:31 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000007b80)=[{{0x0, 0x0, &(0x7f0000000780)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000029c0)=""/4096, 0x1000}, {&(0x7f0000000500)=""/42, 0x2a}], 0x5, &(0x7f0000000800)=""/139, 0x8b}, 0x20}, {{0x0, 0x0, &(0x7f0000003f00)=[{&(0x7f0000005880)=""/53, 0x35}, {&(0x7f00000039c0)=""/212, 0xd4}, {&(0x7f0000003ac0)=""/168, 0xa8}, {0x0}, {0x0}, {&(0x7f0000003e00)=""/157, 0x9d}, {&(0x7f0000003ec0)=""/4, 0x4}], 0x7, &(0x7f0000003f80)=""/159, 0x9f}}, {{&(0x7f0000004040)=@nl=@proc, 0x80, 0x0, 0x0, &(0x7f0000004180)=""/93, 0x5d}}, {{&(0x7f0000004200)=@caif=@util, 0x80, &(0x7f00000044c0)=[{0x0}, {&(0x7f0000004340)=""/71, 0x47}], 0x2, &(0x7f0000004500)=""/13, 0xd}, 0x9}, {{&(0x7f0000004540)=@tipc, 0x80, &(0x7f0000005b80)=[{0x0}, {&(0x7f0000005640)=""/72, 0x48}, {0x0}, {0x0}, {&(0x7f0000005900)=""/213, 0xd5}, {0x0}, {0x0}], 0x7}, 0x5}, {{&(0x7f0000005d00), 0x80, &(0x7f0000005e40)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000007340), 0x0, &(0x7f00000073c0)=""/4, 0x4}, 0x5}, {{0x0, 0x0, 0x0}, 0xfffffffd}], 0x8, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1, 0x1}, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) r5 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6800) lseek(r5, 0x4200, 0x2) r6 = creat(&(0x7f0000000000)='./bus\x00', 0xda) io_setup(0x1ff, &(0x7f0000000400)=0x0) r8 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000001}) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f00000002c0)="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", 0xa9f9, 0x7}]) r9 = open(&(0x7f0000000140)='./bus\x00', 0x28000, 0x0) sendfile(r5, r9, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100)=0x9, 0x8080ffffff80) 13:13:31 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000007b80)=[{{0x0, 0x0, &(0x7f0000000780)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000029c0)=""/4096, 0x1000}, {&(0x7f0000000500)=""/42, 0x2a}], 0x5, &(0x7f0000000800)=""/139, 0x8b}, 0x20}, {{0x0, 0x0, &(0x7f0000003f00)=[{&(0x7f0000005880)=""/53, 0x35}, {&(0x7f00000039c0)=""/212, 0xd4}, {&(0x7f0000003ac0)=""/168, 0xa8}, {0x0}, {0x0}, {&(0x7f0000003e00)=""/157, 0x9d}, {&(0x7f0000003ec0)=""/4, 0x4}], 0x7, &(0x7f0000003f80)=""/159, 0x9f}}, {{&(0x7f0000004040)=@nl=@proc, 0x80, 0x0, 0x0, &(0x7f0000004180)=""/93, 0x5d}}, {{&(0x7f0000004200)=@caif=@util, 0x80, &(0x7f00000044c0)=[{0x0}, {&(0x7f0000004340)=""/71, 0x47}], 0x2, &(0x7f0000004500)=""/13, 0xd}, 0x9}, {{&(0x7f0000004540)=@tipc, 0x80, &(0x7f0000005b80)=[{0x0}, {&(0x7f0000005640)=""/72, 0x48}, {0x0}, {0x0}, {&(0x7f0000005900)=""/213, 0xd5}, {0x0}, {0x0}], 0x7}, 0x5}, {{&(0x7f0000005d00), 0x80, &(0x7f0000005e40)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000007340), 0x0, &(0x7f00000073c0)=""/4, 0x4}, 0x5}, {{0x0, 0x0, 0x0}, 0xfffffffd}], 0x8, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1, 0x1}, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) r5 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6800) lseek(r5, 0x4200, 0x2) r6 = creat(&(0x7f0000000000)='./bus\x00', 0xda) io_setup(0x1ff, &(0x7f0000000400)=0x0) r8 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000001}) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f00000002c0)="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", 0xa9f9, 0x7}]) r9 = open(&(0x7f0000000140)='./bus\x00', 0x28000, 0x0) sendfile(r5, r9, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100)=0x9, 0x8080ffffff80) 13:13:31 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180010000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:31 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000007b80)=[{{0x0, 0x0, &(0x7f0000000780)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000029c0)=""/4096, 0x1000}, {&(0x7f0000000500)=""/42, 0x2a}], 0x5, &(0x7f0000000800)=""/139, 0x8b}, 0x20}, {{0x0, 0x0, &(0x7f0000003f00)=[{&(0x7f0000005880)=""/53, 0x35}, {&(0x7f00000039c0)=""/212, 0xd4}, {&(0x7f0000003ac0)=""/168, 0xa8}, {0x0}, {0x0}, {&(0x7f0000003e00)=""/157, 0x9d}, {&(0x7f0000003ec0)=""/4, 0x4}], 0x7, &(0x7f0000003f80)=""/159, 0x9f}}, {{&(0x7f0000004040)=@nl=@proc, 0x80, 0x0, 0x0, &(0x7f0000004180)=""/93, 0x5d}}, {{&(0x7f0000004200)=@caif=@util, 0x80, &(0x7f00000044c0)=[{0x0}, {&(0x7f0000004340)=""/71, 0x47}], 0x2, &(0x7f0000004500)=""/13, 0xd}, 0x9}, {{&(0x7f0000004540)=@tipc, 0x80, &(0x7f0000005b80)=[{0x0}, {&(0x7f0000005640)=""/72, 0x48}, {0x0}, {0x0}, {&(0x7f0000005900)=""/213, 0xd5}, {0x0}, {0x0}], 0x7}, 0x5}, {{&(0x7f0000005d00), 0x80, &(0x7f0000005e40)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000007340), 0x0, &(0x7f00000073c0)=""/4, 0x4}, 0x5}, {{0x0, 0x0, 0x0}, 0xfffffffd}], 0x8, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1, 0x1}, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) r5 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6800) lseek(r5, 0x4200, 0x2) r6 = creat(&(0x7f0000000000)='./bus\x00', 0xda) io_setup(0x1ff, &(0x7f0000000400)=0x0) r8 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000001}) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f00000002c0)="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", 0xa9f9, 0x7}]) r9 = open(&(0x7f0000000140)='./bus\x00', 0x28000, 0x0) sendfile(r5, r9, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100)=0x9, 0x8080ffffff80) 13:13:31 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0xb8, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:31 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x2, [{0x3000, 0x0, 0x0}]}) 13:13:31 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180011000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:31 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0xd0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:31 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0xdc, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:31 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x3, [{0x3000, 0x0, 0x0}]}) 13:13:31 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180012000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:31 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x4, [{0x3000, 0x0, 0x0}]}) 13:13:32 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000007b80)=[{{0x0, 0x0, &(0x7f0000000780)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000029c0)=""/4096, 0x1000}, {&(0x7f0000000500)=""/42, 0x2a}], 0x5, &(0x7f0000000800)=""/139, 0x8b}, 0x20}, {{0x0, 0x0, &(0x7f0000003f00)=[{&(0x7f0000005880)=""/53, 0x35}, {&(0x7f00000039c0)=""/212, 0xd4}, {&(0x7f0000003ac0)=""/168, 0xa8}, {0x0}, {0x0}, {&(0x7f0000003e00)=""/157, 0x9d}, {&(0x7f0000003ec0)=""/4, 0x4}], 0x7, &(0x7f0000003f80)=""/159, 0x9f}}, {{&(0x7f0000004040)=@nl=@proc, 0x80, 0x0, 0x0, &(0x7f0000004180)=""/93, 0x5d}}, {{&(0x7f0000004200)=@caif=@util, 0x80, &(0x7f00000044c0)=[{0x0}, {&(0x7f0000004340)=""/71, 0x47}], 0x2, &(0x7f0000004500)=""/13, 0xd}, 0x9}, {{&(0x7f0000004540)=@tipc, 0x80, &(0x7f0000005b80)=[{0x0}, {&(0x7f0000005640)=""/72, 0x48}, {0x0}, {0x0}, {&(0x7f0000005900)=""/213, 0xd5}, {0x0}, {0x0}], 0x7}, 0x5}, {{&(0x7f0000005d00), 0x80, &(0x7f0000005e40)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000007340), 0x0, &(0x7f00000073c0)=""/4, 0x4}, 0x5}, {{0x0, 0x0, 0x0}, 0xfffffffd}], 0x8, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1, 0x1}, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) r5 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6800) lseek(r5, 0x4200, 0x2) r6 = creat(&(0x7f0000000000)='./bus\x00', 0xda) io_setup(0x1ff, &(0x7f0000000400)=0x0) r8 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000001}) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f00000002c0)="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", 0xa9f9, 0x7}]) r9 = open(&(0x7f0000000140)='./bus\x00', 0x28000, 0x0) sendfile(r5, r9, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100)=0x9, 0x8080ffffff80) 13:13:32 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000007b80)=[{{0x0, 0x0, &(0x7f0000000780)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000029c0)=""/4096, 0x1000}, {&(0x7f0000000500)=""/42, 0x2a}], 0x5, &(0x7f0000000800)=""/139, 0x8b}, 0x20}, {{0x0, 0x0, &(0x7f0000003f00)=[{&(0x7f0000005880)=""/53, 0x35}, {&(0x7f00000039c0)=""/212, 0xd4}, {&(0x7f0000003ac0)=""/168, 0xa8}, {0x0}, {0x0}, {&(0x7f0000003e00)=""/157, 0x9d}, {&(0x7f0000003ec0)=""/4, 0x4}], 0x7, &(0x7f0000003f80)=""/159, 0x9f}}, {{&(0x7f0000004040)=@nl=@proc, 0x80, 0x0, 0x0, &(0x7f0000004180)=""/93, 0x5d}}, {{&(0x7f0000004200)=@caif=@util, 0x80, &(0x7f00000044c0)=[{0x0}, {&(0x7f0000004340)=""/71, 0x47}], 0x2, &(0x7f0000004500)=""/13, 0xd}, 0x9}, {{&(0x7f0000004540)=@tipc, 0x80, &(0x7f0000005b80)=[{0x0}, {&(0x7f0000005640)=""/72, 0x48}, {0x0}, {0x0}, {&(0x7f0000005900)=""/213, 0xd5}, {0x0}, {0x0}], 0x7}, 0x5}, {{&(0x7f0000005d00), 0x80, &(0x7f0000005e40)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000007340), 0x0, &(0x7f00000073c0)=""/4, 0x4}, 0x5}, {{0x0, 0x0, 0x0}, 0xfffffffd}], 0x8, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1, 0x1}, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) r5 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6800) lseek(r5, 0x4200, 0x2) r6 = creat(&(0x7f0000000000)='./bus\x00', 0xda) io_setup(0x1ff, &(0x7f0000000400)=0x0) r8 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000001}) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f00000002c0)="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", 0xa9f9, 0x7}]) r9 = open(&(0x7f0000000140)='./bus\x00', 0x28000, 0x0) sendfile(r5, r9, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100)=0x9, 0x8080ffffff80) 13:13:32 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0xe1, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:32 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000007b80)=[{{0x0, 0x0, &(0x7f0000000780)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000029c0)=""/4096, 0x1000}, {&(0x7f0000000500)=""/42, 0x2a}], 0x5, &(0x7f0000000800)=""/139, 0x8b}, 0x20}, {{0x0, 0x0, &(0x7f0000003f00)=[{&(0x7f0000005880)=""/53, 0x35}, {&(0x7f00000039c0)=""/212, 0xd4}, {&(0x7f0000003ac0)=""/168, 0xa8}, {0x0}, {0x0}, {&(0x7f0000003e00)=""/157, 0x9d}, {&(0x7f0000003ec0)=""/4, 0x4}], 0x7, &(0x7f0000003f80)=""/159, 0x9f}}, {{&(0x7f0000004040)=@nl=@proc, 0x80, 0x0, 0x0, &(0x7f0000004180)=""/93, 0x5d}}, {{&(0x7f0000004200)=@caif=@util, 0x80, &(0x7f00000044c0)=[{0x0}, {&(0x7f0000004340)=""/71, 0x47}], 0x2, &(0x7f0000004500)=""/13, 0xd}, 0x9}, {{&(0x7f0000004540)=@tipc, 0x80, &(0x7f0000005b80)=[{0x0}, {&(0x7f0000005640)=""/72, 0x48}, {0x0}, {0x0}, {&(0x7f0000005900)=""/213, 0xd5}, {0x0}, {0x0}], 0x7}, 0x5}, {{&(0x7f0000005d00), 0x80, &(0x7f0000005e40)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000007340), 0x0, &(0x7f00000073c0)=""/4, 0x4}, 0x5}, {{0x0, 0x0, 0x0}, 0xfffffffd}], 0x8, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1, 0x1}, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) r5 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6800) lseek(r5, 0x4200, 0x2) r6 = creat(&(0x7f0000000000)='./bus\x00', 0xda) io_setup(0x1ff, &(0x7f0000000400)=0x0) r8 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000001}) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f00000002c0)="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", 0xa9f9, 0x7}]) r9 = open(&(0x7f0000000140)='./bus\x00', 0x28000, 0x0) sendfile(r5, r9, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100)=0x9, 0x8080ffffff80) 13:13:32 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180025000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:32 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x5, [{0x3000, 0x0, 0x0}]}) 13:13:32 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180048000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:32 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x6, [{0x3000, 0x0, 0x0}]}) 13:13:32 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0xff, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:32 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18004c000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:32 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x7, [{0x3000, 0x0, 0x0}]}) 13:13:32 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180058000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:33 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000007b80)=[{{0x0, 0x0, &(0x7f0000000780)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000029c0)=""/4096, 0x1000}, {&(0x7f0000000500)=""/42, 0x2a}], 0x5, &(0x7f0000000800)=""/139, 0x8b}, 0x20}, {{0x0, 0x0, &(0x7f0000003f00)=[{&(0x7f0000005880)=""/53, 0x35}, {&(0x7f00000039c0)=""/212, 0xd4}, {&(0x7f0000003ac0)=""/168, 0xa8}, {0x0}, {0x0}, {&(0x7f0000003e00)=""/157, 0x9d}, {&(0x7f0000003ec0)=""/4, 0x4}], 0x7, &(0x7f0000003f80)=""/159, 0x9f}}, {{&(0x7f0000004040)=@nl=@proc, 0x80, 0x0, 0x0, &(0x7f0000004180)=""/93, 0x5d}}, {{&(0x7f0000004200)=@caif=@util, 0x80, &(0x7f00000044c0)=[{0x0}, {&(0x7f0000004340)=""/71, 0x47}], 0x2, &(0x7f0000004500)=""/13, 0xd}, 0x9}, {{&(0x7f0000004540)=@tipc, 0x80, &(0x7f0000005b80)=[{0x0}, {&(0x7f0000005640)=""/72, 0x48}, {0x0}, {0x0}, {&(0x7f0000005900)=""/213, 0xd5}, {0x0}, {0x0}], 0x7}, 0x5}, {{&(0x7f0000005d00), 0x80, &(0x7f0000005e40)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000007340), 0x0, &(0x7f00000073c0)=""/4, 0x4}, 0x5}, {{0x0, 0x0, 0x0}, 0xfffffffd}], 0x8, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1, 0x1}, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) r5 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6800) lseek(r5, 0x4200, 0x2) r6 = creat(&(0x7f0000000000)='./bus\x00', 0xda) io_setup(0x1ff, &(0x7f0000000400)=0x0) r8 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000001}) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f00000002c0)="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", 0xa9f9, 0x7}]) r9 = open(&(0x7f0000000140)='./bus\x00', 0x28000, 0x0) sendfile(r5, r9, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100)=0x9, 0x8080ffffff80) 13:13:33 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000007b80)=[{{0x0, 0x0, &(0x7f0000000780)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000029c0)=""/4096, 0x1000}, {&(0x7f0000000500)=""/42, 0x2a}], 0x5, &(0x7f0000000800)=""/139, 0x8b}, 0x20}, {{0x0, 0x0, &(0x7f0000003f00)=[{&(0x7f0000005880)=""/53, 0x35}, {&(0x7f00000039c0)=""/212, 0xd4}, {&(0x7f0000003ac0)=""/168, 0xa8}, {0x0}, {0x0}, {&(0x7f0000003e00)=""/157, 0x9d}, {&(0x7f0000003ec0)=""/4, 0x4}], 0x7, &(0x7f0000003f80)=""/159, 0x9f}}, {{&(0x7f0000004040)=@nl=@proc, 0x80, 0x0, 0x0, &(0x7f0000004180)=""/93, 0x5d}}, {{&(0x7f0000004200)=@caif=@util, 0x80, &(0x7f00000044c0)=[{0x0}, {&(0x7f0000004340)=""/71, 0x47}], 0x2, &(0x7f0000004500)=""/13, 0xd}, 0x9}, {{&(0x7f0000004540)=@tipc, 0x80, &(0x7f0000005b80)=[{0x0}, {&(0x7f0000005640)=""/72, 0x48}, {0x0}, {0x0}, {&(0x7f0000005900)=""/213, 0xd5}, {0x0}, {0x0}], 0x7}, 0x5}, {{&(0x7f0000005d00), 0x80, &(0x7f0000005e40)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000007340), 0x0, &(0x7f00000073c0)=""/4, 0x4}, 0x5}, {{0x0, 0x0, 0x0}, 0xfffffffd}], 0x8, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1, 0x1}, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) r5 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6800) lseek(r5, 0x4200, 0x2) r6 = creat(&(0x7f0000000000)='./bus\x00', 0xda) io_setup(0x1ff, &(0x7f0000000400)=0x0) r8 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000001}) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f00000002c0)="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", 0xa9f9, 0x7}]) r9 = open(&(0x7f0000000140)='./bus\x00', 0x28000, 0x0) sendfile(r5, r9, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100)=0x9, 0x8080ffffff80) 13:13:33 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:33 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000007b80)=[{{0x0, 0x0, &(0x7f0000000780)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000029c0)=""/4096, 0x1000}, {&(0x7f0000000500)=""/42, 0x2a}], 0x5, &(0x7f0000000800)=""/139, 0x8b}, 0x20}, {{0x0, 0x0, &(0x7f0000003f00)=[{&(0x7f0000005880)=""/53, 0x35}, {&(0x7f00000039c0)=""/212, 0xd4}, {&(0x7f0000003ac0)=""/168, 0xa8}, {0x0}, {0x0}, {&(0x7f0000003e00)=""/157, 0x9d}, {&(0x7f0000003ec0)=""/4, 0x4}], 0x7, &(0x7f0000003f80)=""/159, 0x9f}}, {{&(0x7f0000004040)=@nl=@proc, 0x80, 0x0, 0x0, &(0x7f0000004180)=""/93, 0x5d}}, {{&(0x7f0000004200)=@caif=@util, 0x80, &(0x7f00000044c0)=[{0x0}, {&(0x7f0000004340)=""/71, 0x47}], 0x2, &(0x7f0000004500)=""/13, 0xd}, 0x9}, {{&(0x7f0000004540)=@tipc, 0x80, &(0x7f0000005b80)=[{0x0}, {&(0x7f0000005640)=""/72, 0x48}, {0x0}, {0x0}, {&(0x7f0000005900)=""/213, 0xd5}, {0x0}, {0x0}], 0x7}, 0x5}, {{&(0x7f0000005d00), 0x80, &(0x7f0000005e40)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000007340), 0x0, &(0x7f00000073c0)=""/4, 0x4}, 0x5}, {{0x0, 0x0, 0x0}, 0xfffffffd}], 0x8, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1, 0x1}, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) r5 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6800) lseek(r5, 0x4200, 0x2) r6 = creat(&(0x7f0000000000)='./bus\x00', 0xda) io_setup(0x1ff, &(0x7f0000000400)=0x0) r8 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000001}) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f00000002c0)="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", 0xa9f9, 0x7}]) r9 = open(&(0x7f0000000140)='./bus\x00', 0x28000, 0x0) sendfile(r5, r9, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100)=0x9, 0x8080ffffff80) 13:13:33 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x8, [{0x3000, 0x0, 0x0}]}) 13:13:33 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180068000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:33 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 224.445559][ T36] kauditd_printk_skb: 13 callbacks suppressed [ 224.445577][ T36] audit: type=1804 audit(1616850813.240:144): pid=15077 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/201/bus" dev="sda1" ino=14953 res=1 errno=0 13:13:33 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18006c000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:33 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x9, [{0x3000, 0x0, 0x0}]}) [ 224.545328][ T36] audit: type=1804 audit(1616850813.330:145): pid=15086 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir914673494/syzkaller.ktCgc0/123/bus" dev="sda1" ino=14961 res=1 errno=0 13:13:33 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180074000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 224.636688][ T36] audit: type=1804 audit(1616850813.380:146): pid=15093 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir170259973/syzkaller.DfBZup/218/bus" dev="sda1" ino=14225 res=1 errno=0 13:13:33 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 224.686975][ T36] audit: type=1804 audit(1616850813.430:147): pid=15100 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/202/bus" dev="sda1" ino=14968 res=1 errno=0 13:13:33 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 224.721170][ T36] audit: type=1804 audit(1616850813.470:148): pid=15103 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir797142007/syzkaller.wR0gJ5/208/bus" dev="sda1" ino=14241 res=1 errno=0 [ 224.800355][ T36] audit: type=1804 audit(1616850813.590:149): pid=15115 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/203/bus" dev="sda1" ino=14230 res=1 errno=0 [ 224.901671][ T36] audit: type=1804 audit(1616850813.690:150): pid=15120 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/204/bus" dev="sda1" ino=14231 res=1 errno=0 13:13:34 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:34 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0xa, [{0x3000, 0x0, 0x0}]}) 13:13:34 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18007a000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:34 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:34 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000007b80)=[{{0x0, 0x0, &(0x7f0000000780)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000029c0)=""/4096, 0x1000}, {&(0x7f0000000500)=""/42, 0x2a}], 0x5, &(0x7f0000000800)=""/139, 0x8b}, 0x20}, {{0x0, 0x0, &(0x7f0000003f00)=[{&(0x7f0000005880)=""/53, 0x35}, {&(0x7f00000039c0)=""/212, 0xd4}, {&(0x7f0000003ac0)=""/168, 0xa8}, {0x0}, {0x0}, {&(0x7f0000003e00)=""/157, 0x9d}, {&(0x7f0000003ec0)=""/4, 0x4}], 0x7, &(0x7f0000003f80)=""/159, 0x9f}}, {{&(0x7f0000004040)=@nl=@proc, 0x80, 0x0, 0x0, &(0x7f0000004180)=""/93, 0x5d}}, {{&(0x7f0000004200)=@caif=@util, 0x80, &(0x7f00000044c0)=[{0x0}, {&(0x7f0000004340)=""/71, 0x47}], 0x2, &(0x7f0000004500)=""/13, 0xd}, 0x9}, {{&(0x7f0000004540)=@tipc, 0x80, &(0x7f0000005b80)=[{0x0}, {&(0x7f0000005640)=""/72, 0x48}, {0x0}, {0x0}, {&(0x7f0000005900)=""/213, 0xd5}, {0x0}, {0x0}], 0x7}, 0x5}, {{&(0x7f0000005d00), 0x80, &(0x7f0000005e40)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000007340), 0x0, &(0x7f00000073c0)=""/4, 0x4}, 0x5}, {{0x0, 0x0, 0x0}, 0xfffffffd}], 0x8, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1, 0x1}, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) r5 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6800) lseek(r5, 0x4200, 0x2) r6 = creat(&(0x7f0000000000)='./bus\x00', 0xda) io_setup(0x1ff, &(0x7f0000000400)=0x0) r8 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000001}) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f00000002c0)="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", 0xa9f9, 0x7}]) r9 = open(&(0x7f0000000140)='./bus\x00', 0x28000, 0x0) sendfile(r5, r9, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100)=0x9, 0x8080ffffff80) 13:13:34 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, 0x0, 0xfffffe21) 13:13:34 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}}}, 0x48) 13:13:34 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18007c000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:34 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0xb, [{0x3000, 0x0, 0x0}]}) [ 225.426335][ T36] audit: type=1804 audit(1616850814.220:151): pid=15128 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/205/bus" dev="sda1" ino=14941 res=1 errno=0 13:13:34 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000100)) 13:13:34 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18008a000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:34 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:34 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x2, 0xb, 0x0, 0x5, 0x2}, 0x10}}, 0x0) [ 225.559362][ T36] audit: type=1804 audit(1616850814.350:152): pid=15148 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/206/bus" dev="sda1" ino=14974 res=1 errno=0 13:13:34 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0xc, [{0x3000, 0x0, 0x0}]}) 13:13:34 executing program 0: perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:34 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800d0000000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 225.685131][ T36] audit: type=1804 audit(1616850814.450:153): pid=15160 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir170259973/syzkaller.DfBZup/219/bus" dev="sda1" ino=14961 res=1 errno=0 13:13:35 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000007b80)=[{{0x0, 0x0, &(0x7f0000000780)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000029c0)=""/4096, 0x1000}, {&(0x7f0000000500)=""/42, 0x2a}], 0x5, &(0x7f0000000800)=""/139, 0x8b}, 0x20}, {{0x0, 0x0, &(0x7f0000003f00)=[{&(0x7f0000005880)=""/53, 0x35}, {&(0x7f00000039c0)=""/212, 0xd4}, {&(0x7f0000003ac0)=""/168, 0xa8}, {0x0}, {0x0}, {&(0x7f0000003e00)=""/157, 0x9d}, {&(0x7f0000003ec0)=""/4, 0x4}], 0x7, &(0x7f0000003f80)=""/159, 0x9f}}, {{&(0x7f0000004040)=@nl=@proc, 0x80, 0x0, 0x0, &(0x7f0000004180)=""/93, 0x5d}}, {{&(0x7f0000004200)=@caif=@util, 0x80, &(0x7f00000044c0)=[{0x0}, {&(0x7f0000004340)=""/71, 0x47}], 0x2, &(0x7f0000004500)=""/13, 0xd}, 0x9}, {{&(0x7f0000004540)=@tipc, 0x80, &(0x7f0000005b80)=[{0x0}, {&(0x7f0000005640)=""/72, 0x48}, {0x0}, {0x0}, {&(0x7f0000005900)=""/213, 0xd5}, {0x0}, {0x0}], 0x7}, 0x5}, {{&(0x7f0000005d00), 0x80, &(0x7f0000005e40)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000007340), 0x0, &(0x7f00000073c0)=""/4, 0x4}, 0x5}, {{0x0, 0x0, 0x0}, 0xfffffffd}], 0x8, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1, 0x1}, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) r5 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6800) lseek(r5, 0x4200, 0x2) r6 = creat(&(0x7f0000000000)='./bus\x00', 0xda) io_setup(0x1ff, &(0x7f0000000400)=0x0) r8 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000001}) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f00000002c0)="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", 0xa9f9, 0x7}]) r9 = open(&(0x7f0000000140)='./bus\x00', 0x28000, 0x0) sendfile(r5, r9, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100)=0x9, 0x8080ffffff80) 13:13:35 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0xd, [{0x3000, 0x0, 0x0}]}) 13:13:35 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000000)=""/50) 13:13:35 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:35 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0xa0202, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000280)={0x2a0, 0x0, 0x0, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}, {0x0, 0x0, 0xa, 0x0, '/dev/vcsa\x00'}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}, {0x0, 0x0, 0x1, 0x0, '-'}}, {{}, {0x0, 0x0, 0x7, 0x0, '+!#&{#}'}}, {{}, {0x0, 0x0, 0xa, 0x0, '[\x05ev/vcs\xd5\x80'}}]}, 0x2a0) 13:13:35 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800fc020000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:35 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000030000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:35 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000040)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x0, @broadcast}}}, 0x90) 13:13:35 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:35 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0xe, [{0x3000, 0x0, 0x0}]}) 13:13:35 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000021c0)='/dev/vcsa\x00', 0x202, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0xfffffffffffffff5}, 0xfffffe6c) 13:13:35 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000003c40)='/dev/net/tun\x00', 0x0, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001580)) ioctl$SIOCSIFHWADDR(r0, 0x8922, &(0x7f0000000000)={'caif0\x00', @link_local}) 13:13:36 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:36 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000050000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:36 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x10, [{0x3000, 0x0, 0x0}]}) 13:13:36 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="0201000007"], 0x38}}, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={0x0, 0x0, 0x0}, 0x0) 13:13:36 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000007b80)=[{{0x0, 0x0, &(0x7f0000000780)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000029c0)=""/4096, 0x1000}, {&(0x7f0000000500)=""/42, 0x2a}], 0x5, &(0x7f0000000800)=""/139, 0x8b}, 0x20}, {{0x0, 0x0, &(0x7f0000003f00)=[{&(0x7f0000005880)=""/53, 0x35}, {&(0x7f00000039c0)=""/212, 0xd4}, {&(0x7f0000003ac0)=""/168, 0xa8}, {0x0}, {0x0}, {&(0x7f0000003e00)=""/157, 0x9d}, {&(0x7f0000003ec0)=""/4, 0x4}], 0x7, &(0x7f0000003f80)=""/159, 0x9f}}, {{&(0x7f0000004040)=@nl=@proc, 0x80, 0x0, 0x0, &(0x7f0000004180)=""/93, 0x5d}}, {{&(0x7f0000004200)=@caif=@util, 0x80, &(0x7f00000044c0)=[{0x0}, {&(0x7f0000004340)=""/71, 0x47}], 0x2, &(0x7f0000004500)=""/13, 0xd}, 0x9}, {{&(0x7f0000004540)=@tipc, 0x80, &(0x7f0000005b80)=[{0x0}, {&(0x7f0000005640)=""/72, 0x48}, {0x0}, {0x0}, {&(0x7f0000005900)=""/213, 0xd5}, {0x0}, {0x0}], 0x7}, 0x5}, {{&(0x7f0000005d00), 0x80, &(0x7f0000005e40)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000007340), 0x0, &(0x7f00000073c0)=""/4, 0x4}, 0x5}, {{0x0, 0x0, 0x0}, 0xfffffffd}], 0x8, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1, 0x1}, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) r5 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6800) lseek(r5, 0x4200, 0x2) r6 = creat(&(0x7f0000000000)='./bus\x00', 0xda) io_setup(0x1ff, &(0x7f0000000400)=0x0) r8 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000001}) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f00000002c0)="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", 0xa9f9, 0x7}]) r9 = open(&(0x7f0000000140)='./bus\x00', 0x28000, 0x0) sendfile(r5, r9, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100)=0x9, 0x8080ffffff80) 13:13:36 executing program 1: perf_event_open(&(0x7f0000000380)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:36 executing program 1: syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000100)) 13:13:36 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000060000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:36 executing program 0: perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 13:13:36 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x11, [{0x3000, 0x0, 0x0}]}) 13:13:36 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:36 executing program 0: r0 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000100)) 13:13:37 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) 13:13:37 executing program 1: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f00000001c0)=""/7) shmctl$IPC_RMID(0x0, 0x0) shmget$private(0x0, 0x2000, 0x2, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x4}, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x2) sched_setscheduler(0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) shmctl$SHM_UNLOCK(0x0, 0xc) shmctl$IPC_RMID(r1, 0x0) 13:13:37 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000070000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:37 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x12, [{0x3000, 0x0, 0x0}]}) 13:13:37 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = add_key$user(&(0x7f0000000380)='user\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='r', 0x1, 0xfffffffffffffffc) r2 = add_key$user(&(0x7f0000000540)='user\x00', &(0x7f0000000580)={'syz', 0x1}, &(0x7f0000000740)="8c58fd7dbae76947ef59b7442e96e8ad1e59e5c25d2f3412ce68efe18b5b784564f69509669bf95fc01e07a449dc4864a843cb84bc16bce5e2127331cbfeb76bde6a7977ee3ae818d7cc8e10257a6e55bc9c479ee94f0779a2c1d4726e032f5c4f66a76c33e9e3d2c246b08f3ec85aa1bce38e0b435ac444633c38de43a10f6b4d6921a136be55a52394dadfd0c867e300ff9f7f78c95ede423fd0387e4f4dd136e9e7393d23fb82bddbad8a66d6d835a47aafafbb758df0ddccef24ad9ee79f", 0xc0, 0xffffffffffffffff) r3 = add_key$user(&(0x7f0000000380)='user\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='r', 0x1, 0xfffffffffffffffc) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r1}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'crc32-generic\x00'}}) 13:13:37 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000090000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:37 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x25, [{0x3000, 0x0, 0x0}]}) 13:13:37 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000100)) 13:13:37 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000400)={0xa, 0x4}, 0xc) 13:13:37 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:37 executing program 1: socketpair(0x0, 0xc31aed66faedeac7, 0x0, 0x0) 13:13:37 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000a0000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:37 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, 0x0, 0x0) 13:13:37 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x5c, [{0x3000, 0x0, 0x0}]}) 13:13:37 executing program 3: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f00000001c0)=""/7) shmctl$IPC_RMID(0x0, 0x0) shmget$private(0x0, 0x2000, 0x2, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x4}, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x2) sched_setscheduler(0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) shmat(r1, &(0x7f0000000000/0x13000)=nil, 0x4000) 13:13:37 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:37 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000007b80)=[{{0x0, 0x0, &(0x7f0000000780)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000029c0)=""/4096, 0x1000}, {&(0x7f0000000500)=""/42, 0x2a}], 0x5, &(0x7f0000000800)=""/139, 0x8b}, 0x20}, {{0x0, 0x0, &(0x7f0000003f00)=[{&(0x7f0000005880)=""/53, 0x35}, {&(0x7f00000039c0)=""/212, 0xd4}, {&(0x7f0000003ac0)=""/168, 0xa8}, {0x0}, {0x0}, {&(0x7f0000003e00)=""/157, 0x9d}, {&(0x7f0000003ec0)=""/4, 0x4}], 0x7, &(0x7f0000003f80)=""/159, 0x9f}}, {{&(0x7f0000004040)=@nl=@proc, 0x80, 0x0, 0x0, &(0x7f0000004180)=""/93, 0x5d}}, {{&(0x7f0000004200)=@caif=@util, 0x80, &(0x7f00000044c0)=[{0x0}, {&(0x7f0000004340)=""/71, 0x47}], 0x2, &(0x7f0000004500)=""/13, 0xd}, 0x9}, {{&(0x7f0000004540)=@tipc, 0x80, &(0x7f0000005b80)=[{0x0}, {&(0x7f0000005640)=""/72, 0x48}, {0x0}, {0x0}, {&(0x7f0000005900)=""/213, 0xd5}, {0x0}, {0x0}], 0x7}, 0x5}, {{&(0x7f0000005d00), 0x80, &(0x7f0000005e40)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000007340), 0x0, &(0x7f00000073c0)=""/4, 0x4}, 0x5}, {{&(0x7f0000007400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, &(0x7f0000007540)=""/183, 0xb7}, 0x6}, {{0x0, 0x0, 0x0}, 0xfffffffd}], 0x9, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1, 0x1}, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) r5 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6800) lseek(r5, 0x4200, 0x2) r6 = creat(&(0x7f0000000000)='./bus\x00', 0xda) io_setup(0x1ff, &(0x7f0000000400)=0x0) r8 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000001}) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f00000002c0)="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", 0xa9f9, 0x7}]) r9 = open(&(0x7f0000000140)='./bus\x00', 0x28000, 0x0) sendfile(r5, r9, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100)=0x9, 0x8080ffffff80) 13:13:37 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000b0000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:37 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000c0000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:37 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000004c0)={0x66, 0x0, &(0x7f00000000c0)="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"}) 13:13:37 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) 13:13:37 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x300, [{0x3000, 0x0, 0x0}]}) 13:13:37 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:37 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000d0000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:37 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x2, 0x16, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, [@sadb_key={0x1, 0x3a46f0f6f77e6691}]}, 0x18}}, 0x0) 13:13:37 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003880)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @remote}, @dev={0xfe, 0x80, [0xb, 0x14, 0xa, 0xe, 0x2, 0x2, 0x7, 0x14, 0x4, 0xb, 0x3, 0x8, 0x8]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r3}) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private2}, 0x1c) 13:13:37 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000e0000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:37 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x28}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:38 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000110000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:38 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x500, [{0x3000, 0x0, 0x0}]}) 13:13:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, @l2tp, @in={0x2, 0x0, @empty}, @can, 0x6}) 13:13:38 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003880)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @remote}, @dev={0xfe, 0x80, [0xb, 0x14, 0xa, 0xe, 0x2, 0x2, 0x7, 0x14, 0x4, 0xb, 0x3, 0x8, 0x8]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r3}) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private2}, 0x1c) 13:13:38 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000007b80)=[{{0x0, 0x0, &(0x7f0000000780)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000029c0)=""/4096, 0x1000}, {&(0x7f0000000500)=""/42, 0x2a}], 0x5, &(0x7f0000000800)=""/139, 0x8b}, 0x20}, {{0x0, 0x0, &(0x7f0000003f00)=[{&(0x7f0000005880)=""/53, 0x35}, {&(0x7f00000039c0)=""/212, 0xd4}, {&(0x7f0000003ac0)=""/168, 0xa8}, {0x0}, {0x0}, {&(0x7f0000003e00)=""/157, 0x9d}, {&(0x7f0000003ec0)=""/4, 0x4}], 0x7, &(0x7f0000003f80)=""/159, 0x9f}}, {{&(0x7f0000004040)=@nl=@proc, 0x80, 0x0, 0x0, &(0x7f0000004180)=""/93, 0x5d}}, {{&(0x7f0000004200)=@caif=@util, 0x80, &(0x7f00000044c0)=[{0x0}, {&(0x7f0000004340)=""/71, 0x47}], 0x2, &(0x7f0000004500)=""/13, 0xd}, 0x9}, {{&(0x7f0000004540)=@tipc, 0x80, &(0x7f0000005b80)=[{0x0}, {&(0x7f0000005640)=""/72, 0x48}, {0x0}, {0x0}, {&(0x7f0000005900)=""/213, 0xd5}, {0x0}, {0x0}], 0x7}, 0x5}, {{&(0x7f0000005d00), 0x80, &(0x7f0000005e40)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000007340), 0x0, &(0x7f00000073c0)=""/4, 0x4}, 0x5}, {{&(0x7f0000007400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, &(0x7f0000007540)=""/183, 0xb7}, 0x6}, {{0x0, 0x0, 0x0}, 0xfffffffd}], 0x9, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1, 0x1}, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) r5 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6800) lseek(r5, 0x4200, 0x2) r6 = creat(&(0x7f0000000000)='./bus\x00', 0xda) io_setup(0x1ff, &(0x7f0000000400)=0x0) r8 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000001}) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f00000002c0)="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", 0xa9f9, 0x7}]) r9 = open(&(0x7f0000000140)='./bus\x00', 0x28000, 0x0) sendfile(r5, r9, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100)=0x9, 0x8080ffffff80) 13:13:38 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x102}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:38 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000120000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:38 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003880)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @remote}, @dev={0xfe, 0x80, [0xb, 0x14, 0xa, 0xe, 0x2, 0x2, 0x7, 0x14, 0x4, 0xb, 0x3, 0x8, 0x8]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r3}) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private2}, 0x1c) 13:13:38 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x20, 0x0, 0x0, 0x0, 0x0, @dev}, 0x10) 13:13:38 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x104}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:38 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x600, [{0x3000, 0x0, 0x0}]}) [ 229.910949][ T36] kauditd_printk_skb: 13 callbacks suppressed [ 229.911000][ T36] audit: type=1804 audit(1616850818.700:167): pid=15399 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/217/bus" dev="sda1" ino=14114 res=1 errno=0 13:13:38 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000200000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:38 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003880)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @remote}, @dev={0xfe, 0x80, [0xb, 0x14, 0xa, 0xe, 0x2, 0x2, 0x7, 0x14, 0x4, 0xb, 0x3, 0x8, 0x8]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r3}) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private2}, 0x1c) 13:13:38 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000000), 0x10) getsockname$llc(r0, 0x0, 0x0) 13:13:38 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x3001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 230.050597][ T36] audit: type=1804 audit(1616850818.830:168): pid=15417 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/218/bus" dev="sda1" ino=13896 res=1 errno=0 [ 230.158025][ T36] audit: type=1804 audit(1616850818.890:169): pid=15420 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir797142007/syzkaller.wR0gJ5/220/bus" dev="sda1" ino=13939 res=1 errno=0 [ 230.202182][ T36] audit: type=1804 audit(1616850818.990:170): pid=15437 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/219/bus" dev="sda1" ino=13896 res=1 errno=0 13:13:39 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000007b80)=[{{0x0, 0x0, &(0x7f0000000780)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000029c0)=""/4096, 0x1000}, {&(0x7f0000000500)=""/42, 0x2a}], 0x5, &(0x7f0000000800)=""/139, 0x8b}, 0x20}, {{0x0, 0x0, &(0x7f0000003f00)=[{&(0x7f0000005880)=""/53, 0x35}, {&(0x7f00000039c0)=""/212, 0xd4}, {&(0x7f0000003ac0)=""/168, 0xa8}, {0x0}, {0x0}, {&(0x7f0000003e00)=""/157, 0x9d}, {&(0x7f0000003ec0)=""/4, 0x4}], 0x7, &(0x7f0000003f80)=""/159, 0x9f}}, {{&(0x7f0000004040)=@nl=@proc, 0x80, 0x0, 0x0, &(0x7f0000004180)=""/93, 0x5d}}, {{&(0x7f0000004200)=@caif=@util, 0x80, &(0x7f00000044c0)=[{0x0}, {&(0x7f0000004340)=""/71, 0x47}], 0x2, &(0x7f0000004500)=""/13, 0xd}, 0x9}, {{&(0x7f0000004540)=@tipc, 0x80, &(0x7f0000005b80)=[{0x0}, {&(0x7f0000005640)=""/72, 0x48}, {0x0}, {0x0}, {&(0x7f0000005900)=""/213, 0xd5}, {0x0}, {0x0}], 0x7}, 0x5}, {{&(0x7f0000005d00), 0x80, &(0x7f0000005e40)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000007340), 0x0, &(0x7f00000073c0)=""/4, 0x4}, 0x5}, {{&(0x7f0000007400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, &(0x7f0000007540)=""/183, 0xb7}, 0x6}, {{0x0, 0x0, 0x0}, 0xfffffffd}], 0x9, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1, 0x1}, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) r5 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6800) lseek(r5, 0x4200, 0x2) r6 = creat(&(0x7f0000000000)='./bus\x00', 0xda) io_setup(0x1ff, &(0x7f0000000400)=0x0) r8 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000001}) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f00000002c0)="da455864eeb9167c1ec76189e57e50c68e739ea84e4043521453c701ff8f874b7856a5a7434f6091814e0c7f4f80d24902643c3d4076752752ef6d2b215fa2a85b69f7e26f3abbc9a62fa52d09fd1f96d8ef9bb84710faa5b92bf6c168c6c46c66ee6c8e3fe567dd749027291261984989f79cee47a0d6f29044bbb70ef418a052f1dfe9aab165af7d3b7f7cd5e21cd5b2b3e62b7223290a2aaa95a4045fc2e6247ff36502396ca21c18a60fe6f4699dc563d8b40c84269a24486af086b392ce38e2c573d683282f3a9a345c8dcc7483eda3a26183108d8b16b0c4c651625c833462f9b5ad5e6b276ef0f6b2dadc5e48bc2f736a1e97e4496b770d515271e0c1a32713988e3e6086ca4694973913d27316b6e1d324b155314b217f991a23e3c04cdc00b1e6bf2a912d88", 0xa9f9, 0x7}]) r9 = open(&(0x7f0000000140)='./bus\x00', 0x28000, 0x0) sendfile(r5, r9, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100)=0x9, 0x8080ffffff80) 13:13:39 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000250000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:39 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x700, [{0x3000, 0x0, 0x0}]}) 13:13:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x48, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}]}, 0x48}}, 0x0) 13:13:39 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r3, r1, 0x0, 0x800100020001) 13:13:39 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x3101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:39 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000400000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:39 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x900, [{0x3000, 0x0, 0x0}]}) 13:13:39 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:39 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000480000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:39 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) [ 230.946210][ T36] audit: type=1804 audit(1616850819.740:171): pid=15450 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir170259973/syzkaller.DfBZup/230/bus" dev="sda1" ino=15019 res=1 errno=0 [ 230.973564][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:13:39 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0xa00, [{0x3000, 0x0, 0x0}]}) [ 231.019610][ T36] audit: type=1804 audit(1616850819.800:172): pid=15459 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/220/bus" dev="sda1" ino=14002 res=1 errno=0 [ 231.101720][ T36] audit: type=1804 audit(1616850819.870:173): pid=15473 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/221/bus" dev="sda1" ino=15017 res=1 errno=0 [ 231.191254][ T36] audit: type=1804 audit(1616850819.980:174): pid=15484 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir797142007/syzkaller.wR0gJ5/221/bus" dev="sda1" ino=14002 res=1 errno=0 [ 231.765833][ T36] audit: type=1804 audit(1616850820.560:175): pid=15489 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir170259973/syzkaller.DfBZup/230/bus" dev="sda1" ino=15019 res=1 errno=0 [ 231.817012][ T36] audit: type=1804 audit(1616850820.610:176): pid=15491 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir170259973/syzkaller.DfBZup/230/bus" dev="sda1" ino=15019 res=1 errno=0 [ 231.867249][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:13:40 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000007b80)=[{{0x0, 0x0, &(0x7f0000000780)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000029c0)=""/4096, 0x1000}, {&(0x7f0000000500)=""/42, 0x2a}], 0x5, &(0x7f0000000800)=""/139, 0x8b}, 0x20}, {{0x0, 0x0, &(0x7f0000003f00)=[{&(0x7f0000005880)=""/53, 0x35}, {&(0x7f00000039c0)=""/212, 0xd4}, {&(0x7f0000003ac0)=""/168, 0xa8}, {0x0}, {0x0}, {&(0x7f0000003e00)=""/157, 0x9d}, {&(0x7f0000003ec0)=""/4, 0x4}], 0x7, &(0x7f0000003f80)=""/159, 0x9f}}, {{&(0x7f0000004040)=@nl=@proc, 0x80, 0x0, 0x0, &(0x7f0000004180)=""/93, 0x5d}}, {{&(0x7f0000004200)=@caif=@util, 0x80, &(0x7f00000044c0)=[{0x0}, {&(0x7f0000004340)=""/71, 0x47}], 0x2, &(0x7f0000004500)=""/13, 0xd}, 0x9}, {{&(0x7f0000004540)=@tipc, 0x80, &(0x7f0000005b80)=[{0x0}, {&(0x7f0000005640)=""/72, 0x48}, {0x0}, {0x0}, {&(0x7f0000005900)=""/213, 0xd5}, {0x0}, {0x0}], 0x7}, 0x5}, {{&(0x7f0000005d00), 0x80, &(0x7f0000005e40)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000007340), 0x0, &(0x7f00000073c0)=""/4, 0x4}, 0x5}, {{&(0x7f0000007400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, &(0x7f0000007540)=""/183, 0xb7}, 0x6}, {{0x0, 0x0, 0x0}, 0xfffffffd}], 0x9, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1, 0x1}, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) r5 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6800) lseek(r5, 0x4200, 0x2) r6 = creat(&(0x7f0000000000)='./bus\x00', 0xda) io_setup(0x1ff, &(0x7f0000000400)=0x0) r8 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000001}) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f00000002c0)="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", 0xa9f9, 0x7}]) r9 = open(&(0x7f0000000140)='./bus\x00', 0x28000, 0x0) sendfile(r5, r9, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100)=0x9, 0x8080ffffff80) 13:13:40 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800004c0000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:40 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:40 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0xb00, [{0x3000, 0x0, 0x0}]}) 13:13:40 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x3d, 0x0, 0x1}, {}, {0x6, 0x0, 0x0, 0x7ffffff8}]}) socket(0x10, 0x80002, 0x0) 13:13:40 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000080004103) 13:13:40 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000580000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:40 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xb90}, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000100)) 13:13:40 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:40 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0xc00, [{0x3000, 0x0, 0x0}]}) 13:13:40 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r1 = shmat(r0, &(0x7f000000b000/0x2000)=nil, 0x5000) shmdt(r1) 13:13:40 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800ff600000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:41 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000680000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:41 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x7400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = userfaultfd(0x0) close(r1) 13:13:41 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0xd00, [{0x3000, 0x0, 0x0}]}) 13:13:41 executing program 3: syslog(0x3, &(0x7f0000000000)=""/198, 0xc6) 13:13:41 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4}, 0x22) 13:13:41 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0xe00, [{0x3000, 0x0, 0x0}]}) 13:13:41 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800006c0000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 233.032433][T15551] uffd: Set unprivileged_userfaultfd sysctl knob to 1 if kernel faults must be handled without obtaining CAP_SYS_PTRACE capability 13:13:41 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x8002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:41 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000740000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:42 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)={0x2, 0x10, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@local}}]}, 0x50}}, 0x0) 13:13:42 executing program 0: openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x280, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000040)={@rand_addr=0x64010102, @rand_addr=0x64010101}, 0x8) r1 = socket(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) 13:13:42 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x1, 0x0, 0x0, 0x2}, 0x10}}, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) 13:13:42 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800007a0000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:42 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x1100, [{0x3000, 0x0, 0x0}]}) 13:13:42 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000100)) 13:13:42 executing program 3: mkdir(&(0x7f0000000000)='./file1\x00', 0x0) getgroups(0x2, &(0x7f0000000100)=[0x0, 0xee00]) setgroups(0x3, &(0x7f0000000140)=[0x0, 0x0, 0x0]) lchown(&(0x7f00000000c0)='./file1\x00', 0xffffffffffffffff, r0) 13:13:42 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x8003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:42 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 13:13:42 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800007c0000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:42 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x9e00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:42 executing program 3: mkdir(&(0x7f0000000000)='./file1\x00', 0x0) getgroups(0x2, &(0x7f0000000100)=[0x0, 0xee00]) setgroups(0x3, &(0x7f0000000140)=[0x0, 0x0, 0x0]) lchown(&(0x7f00000000c0)='./file1\x00', 0xffffffffffffffff, r0) 13:13:42 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800008a0000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) read$midi(r1, &(0x7f0000002040)=""/4097, 0x1001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x220fff) 13:13:42 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x1200, [{0x3000, 0x0, 0x0}]}) [ 233.393104][T15599] loop1: detected capacity change from 0 to 128 [ 233.452991][T15599] jfs_mount: Mount Failure: superblock is corrupt! [ 233.469405][T15599] Mount JFS Failure: -22 [ 233.473677][T15599] jfs_mount failed w/return code = -22 13:13:42 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000d00000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:42 executing program 3: mkdir(&(0x7f0000000000)='./file1\x00', 0x0) getgroups(0x2, &(0x7f0000000100)=[0x0, 0xee00]) setgroups(0x3, &(0x7f0000000140)=[0x0, 0x0, 0x0]) lchown(&(0x7f00000000c0)='./file1\x00', 0xffffffffffffffff, r0) 13:13:42 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xa003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 233.528372][T15599] loop1: detected capacity change from 0 to 128 [ 233.539026][T15599] jfs_mount: Mount Failure: superblock is corrupt! [ 233.578592][T15599] Mount JFS Failure: -22 13:13:42 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x2500, [{0x3000, 0x0, 0x0}]}) 13:13:42 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000007b80)=[{{0x0, 0x0, &(0x7f0000000780)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000029c0)=""/4096, 0x1000}, {&(0x7f0000000500)=""/42, 0x2a}], 0x5, &(0x7f0000000800)=""/139, 0x8b}, 0x20}, {{0x0, 0x0, &(0x7f0000003f00)=[{&(0x7f0000005880)=""/53, 0x35}, {&(0x7f00000039c0)=""/212, 0xd4}, {&(0x7f0000003ac0)=""/168, 0xa8}, {0x0}, {0x0}, {&(0x7f0000003e00)=""/157, 0x9d}, {&(0x7f0000003ec0)=""/4, 0x4}], 0x7, &(0x7f0000003f80)=""/159, 0x9f}}, {{&(0x7f0000004040)=@nl=@proc, 0x80, 0x0, 0x0, &(0x7f0000004180)=""/93, 0x5d}}, {{&(0x7f0000004200)=@caif=@util, 0x80, &(0x7f00000044c0)=[{&(0x7f0000004340)=""/71, 0x47}], 0x1, &(0x7f0000004500)=""/13, 0xd}, 0x9}, {{&(0x7f0000004540)=@tipc, 0x80, &(0x7f0000005b80)=[{0x0}, {&(0x7f0000005640)=""/72, 0x48}, {0x0}, {0x0}, {&(0x7f0000005900)=""/213, 0xd5}, {0x0}, {0x0}], 0x7}, 0x5}, {{&(0x7f0000005d00), 0x80, &(0x7f0000005e40)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000007340), 0x0, &(0x7f00000073c0)=""/4, 0x4}, 0x5}, {{&(0x7f0000007400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, &(0x7f0000007540)=""/183, 0xb7}, 0x6}, {{0x0, 0x0, 0x0}, 0xfffffffd}], 0x9, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1, 0x1}, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) r5 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6800) lseek(r5, 0x4200, 0x2) r6 = creat(&(0x7f0000000000)='./bus\x00', 0xda) io_setup(0x1ff, &(0x7f0000000400)=0x0) r8 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000001}) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f00000002c0)="da455864eeb9167c1ec76189e57e50c68e739ea84e4043521453c701ff8f874b7856a5a7434f6091814e0c7f4f80d24902643c3d4076752752ef6d2b215fa2a85b69f7e26f3abbc9a62fa52d09fd1f96d8ef9bb84710faa5b92bf6c168c6c46c66ee6c8e3fe567dd749027291261984989f79cee47a0d6f29044bbb70ef418a052f1dfe9aab165af7d3b7f7cd5e21cd5b2b3e62b7223290a2aaa95a4045fc2e6247ff36502396ca21c18a60fe6f4699dc563d8b40c84269a24486af086b392ce38e2c573d683282f3a9a345c8dcc7483eda3a26183108d8b16b0c4c651625c833462f9b5ad5e6b276ef0f6b2dadc5e48bc2f736a1e97e4496b770d515271e0c1a32713988e3e6086ca4694973913d27316b6e1d324b155314b217f991a23e3c04cdc00b1e6bf2a912d88", 0xa9f9, 0x7}]) r9 = open(&(0x7f0000000140)='./bus\x00', 0x28000, 0x0) sendfile(r5, r9, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100)=0x9, 0x8080ffffff80) [ 233.646276][T15599] jfs_mount failed w/return code = -22 13:13:42 executing program 1: pselect6(0x40, &(0x7f0000000000)={0x5}, &(0x7f0000000040)={0x5}, &(0x7f0000000080)={0x6}, 0x0, &(0x7f0000000140)={0x0}) 13:13:42 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180002fc0000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:42 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xa200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:42 executing program 3: mkdir(&(0x7f0000000000)='./file1\x00', 0x0) getgroups(0x2, &(0x7f0000000100)=[0x0, 0xee00]) setgroups(0x3, &(0x7f0000000140)=[0x0, 0x0, 0x0]) lchown(&(0x7f00000000c0)='./file1\x00', 0xffffffffffffffff, r0) 13:13:42 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x5c00, [{0x3000, 0x0, 0x0}]}) 13:13:42 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xa300}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:42 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000ff0000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:42 executing program 1: socket(0x28, 0x0, 0x7fffffff) 13:13:42 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x1000000, [{0x3000, 0x0, 0x0}]}) 13:13:42 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000001100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, 0x10) 13:13:42 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xa400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:43 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000007b80)=[{{0x0, 0x0, &(0x7f0000000780)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000029c0)=""/4096, 0x1000}, {&(0x7f0000000500)=""/42, 0x2a}], 0x5, &(0x7f0000000800)=""/139, 0x8b}, 0x20}, {{0x0, 0x0, &(0x7f0000003f00)=[{&(0x7f0000005880)=""/53, 0x35}, {&(0x7f00000039c0)=""/212, 0xd4}, {&(0x7f0000003ac0)=""/168, 0xa8}, {0x0}, {0x0}, {&(0x7f0000003e00)=""/157, 0x9d}, {&(0x7f0000003ec0)=""/4, 0x4}], 0x7, &(0x7f0000003f80)=""/159, 0x9f}}, {{&(0x7f0000004040)=@nl=@proc, 0x80, 0x0, 0x0, &(0x7f0000004180)=""/93, 0x5d}}, {{&(0x7f0000004200)=@caif=@util, 0x80, &(0x7f00000044c0)=[{&(0x7f0000004340)=""/71, 0x47}], 0x1, &(0x7f0000004500)=""/13, 0xd}, 0x9}, {{&(0x7f0000004540)=@tipc, 0x80, &(0x7f0000005b80)=[{0x0}, {&(0x7f0000005640)=""/72, 0x48}, {0x0}, {0x0}, {&(0x7f0000005900)=""/213, 0xd5}, {0x0}, {0x0}], 0x7}, 0x5}, {{&(0x7f0000005d00), 0x80, &(0x7f0000005e40)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000007340), 0x0, &(0x7f00000073c0)=""/4, 0x4}, 0x5}, {{&(0x7f0000007400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, &(0x7f0000007540)=""/183, 0xb7}, 0x6}, {{0x0, 0x0, 0x0}, 0xfffffffd}], 0x9, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1, 0x1}, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) r5 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6800) lseek(r5, 0x4200, 0x2) r6 = creat(&(0x7f0000000000)='./bus\x00', 0xda) io_setup(0x1ff, &(0x7f0000000400)=0x0) r8 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000001}) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f00000002c0)="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", 0xa9f9, 0x7}]) r9 = open(&(0x7f0000000140)='./bus\x00', 0x28000, 0x0) sendfile(r5, r9, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100)=0x9, 0x8080ffffff80) 13:13:43 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000002000000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:43 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)) 13:13:43 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x2000000, [{0x3000, 0x0, 0x0}]}) 13:13:43 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xa500}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:43 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000001000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:43 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xb90}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x3768, 0x0, 0xfffc, 0xfbff, 0xf}) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000100)) 13:13:43 executing program 1: sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FBIOGETCMAP(0xffffffffffffffff, 0x4604, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x91021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:43 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xb800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:43 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x3000000, [{0x3000, 0x0, 0x0}]}) 13:13:43 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000002000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:43 executing program 3: pselect6(0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000380), &(0x7f0000000400)={&(0x7f00000003c0)={[0x4]}, 0x8}) [ 234.998959][ T36] kauditd_printk_skb: 16 callbacks suppressed [ 234.998969][ T36] audit: type=1804 audit(1616850823.781:193): pid=15719 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/233/bus" dev="sda1" ino=15048 res=1 errno=0 [ 235.098299][ T36] audit: type=1804 audit(1616850823.881:194): pid=15728 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir914673494/syzkaller.ktCgc0/148/bus" dev="sda1" ino=15039 res=1 errno=0 13:13:44 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000007b80)=[{{0x0, 0x0, &(0x7f0000000780)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000029c0)=""/4096, 0x1000}, {&(0x7f0000000500)=""/42, 0x2a}], 0x5, &(0x7f0000000800)=""/139, 0x8b}, 0x20}, {{0x0, 0x0, &(0x7f0000003f00)=[{&(0x7f0000005880)=""/53, 0x35}, {&(0x7f00000039c0)=""/212, 0xd4}, {&(0x7f0000003ac0)=""/168, 0xa8}, {0x0}, {0x0}, {&(0x7f0000003e00)=""/157, 0x9d}, {&(0x7f0000003ec0)=""/4, 0x4}], 0x7, &(0x7f0000003f80)=""/159, 0x9f}}, {{&(0x7f0000004040)=@nl=@proc, 0x80, 0x0, 0x0, &(0x7f0000004180)=""/93, 0x5d}}, {{&(0x7f0000004200)=@caif=@util, 0x80, &(0x7f00000044c0)=[{&(0x7f0000004340)=""/71, 0x47}], 0x1, &(0x7f0000004500)=""/13, 0xd}, 0x9}, {{&(0x7f0000004540)=@tipc, 0x80, &(0x7f0000005b80)=[{0x0}, {&(0x7f0000005640)=""/72, 0x48}, {0x0}, {0x0}, {&(0x7f0000005900)=""/213, 0xd5}, {0x0}, {0x0}], 0x7}, 0x5}, {{&(0x7f0000005d00), 0x80, &(0x7f0000005e40)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000007340), 0x0, &(0x7f00000073c0)=""/4, 0x4}, 0x5}, {{&(0x7f0000007400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, &(0x7f0000007540)=""/183, 0xb7}, 0x6}, {{0x0, 0x0, 0x0}, 0xfffffffd}], 0x9, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1, 0x1}, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) r5 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6800) lseek(r5, 0x4200, 0x2) r6 = creat(&(0x7f0000000000)='./bus\x00', 0xda) io_setup(0x1ff, &(0x7f0000000400)=0x0) r8 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000001}) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f00000002c0)="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", 0xa9f9, 0x7}]) r9 = open(&(0x7f0000000140)='./bus\x00', 0x28000, 0x0) sendfile(r5, r9, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100)=0x9, 0x8080ffffff80) 13:13:44 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xb802}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:44 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0xa0202, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000280)={0x2a0, 0x0, 0x0, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}, {0x0, 0x0, 0xa, 0x0, '/dev/vcsa\x00'}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}, {0x0, 0x0, 0x1, 0x0, '-'}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2}}, {0x0, 0x0, 0x7, 0x2, '+!#&{#}'}}, {{}, {0x0, 0x0, 0xa, 0x0, '[\x05ev/vcs\xd5\x80'}}]}, 0x2a0) 13:13:44 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000003000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:44 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x4000000, [{0x3000, 0x0, 0x0}]}) 13:13:44 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, @l2tp, @in={0x2, 0x0, @local}, @can, 0xd4}) 13:13:44 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000004000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:44 executing program 3: sched_setattr(0x0, &(0x7f0000000000)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x57cf}, 0x0) 13:13:44 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xb902}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 235.908638][ T36] audit: type=1804 audit(1616850824.691:195): pid=15743 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/234/bus" dev="sda1" ino=15057 res=1 errno=0 13:13:44 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x5000000, [{0x3000, 0x0, 0x0}]}) 13:13:44 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}]}, 0x54}}, 0x0) 13:13:44 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000005000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 236.063373][ T36] audit: type=1804 audit(1616850824.841:196): pid=15769 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/235/bus" dev="sda1" ino=15055 res=1 errno=0 [ 236.130368][ T36] audit: type=1804 audit(1616850824.901:197): pid=15770 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir914673494/syzkaller.ktCgc0/149/bus" dev="sda1" ino=15058 res=1 errno=0 [ 236.549333][T15770] ================================================================== [ 236.557496][T15770] BUG: KCSAN: data-race in __writeback_single_inode / ext4_set_iomap [ 236.565540][T15770] [ 236.567844][T15770] write to 0xffff88810dcd6838 of 8 bytes by task 15776 on cpu 0: [ 236.575620][T15770] __writeback_single_inode+0x1e9/0x4d0 [ 236.581143][T15770] writeback_single_inode+0x122/0x580 [ 236.586488][T15770] sync_inode_metadata+0x52/0x70 [ 236.591400][T15770] ext4_sync_file+0x359/0x6e0 [ 236.596104][T15770] vfs_fsync_range+0x107/0x120 [ 236.600844][T15770] ext4_buffered_write_iter+0x38f/0x3e0 [ 236.606416][T15770] ext4_file_write_iter+0x48a/0x10b0 [ 236.611722][T15770] do_iter_readv_writev+0x2cb/0x360 [ 236.616941][T15770] do_iter_write+0x112/0x4c0 [ 236.621507][T15770] vfs_iter_write+0x4c/0x70 [ 236.625989][T15770] iter_file_splice_write+0x40a/0x750 [ 236.631347][T15770] direct_splice_actor+0x80/0xa0 [ 236.636259][T15770] splice_direct_to_actor+0x345/0x650 [ 236.641607][T15770] do_splice_direct+0xf5/0x170 [ 236.646344][T15770] do_sendfile+0x7a6/0xe20 [ 236.650737][T15770] __x64_sys_sendfile64+0xa9/0x130 [ 236.655826][T15770] do_syscall_64+0x39/0x80 [ 236.660219][T15770] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 236.666090][T15770] [ 236.668396][T15770] read to 0xffff88810dcd6838 of 8 bytes by task 15770 on cpu 1: [ 236.676016][T15770] ext4_set_iomap+0x17c/0x460 [ 236.680667][T15770] ext4_iomap_begin+0x64b/0x6a0 [ 236.685491][T15770] iomap_apply+0x8d/0x4a0 [ 236.689797][T15770] __iomap_dio_rw+0x4c4/0xa30 [ 236.694451][T15770] iomap_dio_rw+0x30/0x70 [ 236.698755][T15770] ext4_file_write_iter+0xe5d/0x10b0 [ 236.704016][T15770] do_iter_readv_writev+0x2cb/0x360 [ 236.709215][T15770] do_iter_write+0x112/0x4c0 [ 236.713781][T15770] vfs_iter_write+0x4c/0x70 [ 236.718260][T15770] iter_file_splice_write+0x40a/0x750 [ 236.723612][T15770] direct_splice_actor+0x80/0xa0 [ 236.728535][T15770] splice_direct_to_actor+0x345/0x650 [ 236.733883][T15770] do_splice_direct+0xf5/0x170 [ 236.738638][T15770] do_sendfile+0x7a6/0xe20 [ 236.743028][T15770] __x64_sys_sendfile64+0xf2/0x130 [ 236.748111][T15770] do_syscall_64+0x39/0x80 [ 236.752502][T15770] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 236.758373][T15770] [ 236.760672][T15770] Reported by Kernel Concurrency Sanitizer on: [ 236.766822][T15770] CPU: 1 PID: 15770 Comm: syz-executor.0 Not tainted 5.12.0-rc4-syzkaller #0 [ 236.775559][T15770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 236.785588][T15770] ================================================================== 13:13:45 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000007b80)=[{{0x0, 0x0, &(0x7f0000000780)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000029c0)=""/4096, 0x1000}, {&(0x7f0000000500)=""/42, 0x2a}], 0x5, &(0x7f0000000800)=""/139, 0x8b}, 0x20}, {{0x0, 0x0, &(0x7f0000003f00)=[{&(0x7f0000005880)=""/53, 0x35}, {&(0x7f00000039c0)=""/212, 0xd4}, {&(0x7f0000003ac0)=""/168, 0xa8}, {0x0}, {0x0}, {&(0x7f0000003e00)=""/157, 0x9d}, {&(0x7f0000003ec0)=""/4, 0x4}], 0x7, &(0x7f0000003f80)=""/159, 0x9f}}, {{&(0x7f0000004040)=@nl=@proc, 0x80, 0x0, 0x0, &(0x7f0000004180)=""/93, 0x5d}}, {{&(0x7f0000004200)=@caif=@util, 0x80, &(0x7f00000044c0)=[{&(0x7f0000004340)=""/71, 0x47}], 0x1, &(0x7f0000004500)=""/13, 0xd}, 0x9}, {{&(0x7f0000004540)=@tipc, 0x80, &(0x7f0000005b80)=[{0x0}, {&(0x7f0000005640)=""/72, 0x48}, {0x0}, {0x0}, {&(0x7f0000005900)=""/213, 0xd5}, {0x0}, {0x0}], 0x7}, 0x5}, {{&(0x7f0000005d00), 0x80, &(0x7f0000005e40)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000007340), 0x0, &(0x7f00000073c0)=""/4, 0x4}, 0x5}, {{&(0x7f0000007400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, &(0x7f0000007540)=""/183, 0xb7}, 0x6}, {{0x0, 0x0, 0x0}, 0xfffffffd}], 0x9, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1, 0x1}, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) r5 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6800) lseek(r5, 0x4200, 0x2) r6 = creat(&(0x7f0000000000)='./bus\x00', 0xda) io_setup(0x1ff, &(0x7f0000000400)=0x0) r8 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000001}) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f00000002c0)="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", 0xa9f9, 0x7}]) r9 = open(&(0x7f0000000140)='./bus\x00', 0x28000, 0x0) sendfile(r5, r9, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100)=0x9, 0x8080ffffff80) 13:13:45 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @l2tp={0x2, 0x0, @remote}, @ethernet={0x0, @remote}, @ax25={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x7}) 13:13:45 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000006000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:45 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:45 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = eventfd(0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[], 0x885) 13:13:45 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x6000000, [{0x3000, 0x0, 0x0}]}) 13:13:45 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000007000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:45 executing program 3: perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80018, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:13:45 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x7000000, [{0x3000, 0x0, 0x0}]}) 13:13:45 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) gettid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='pids.events\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7a6}, 0x1c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xf) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r0) 13:13:45 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:45 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000001100)={0x1a, 0x0, 0x0, 0x0, 0x9, 0x1, @multicast}, 0x10) [ 237.015488][ T36] audit: type=1804 audit(1616850825.801:198): pid=15797 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/236/bus" dev="sda1" ino=15060 res=1 errno=0 [ 237.160032][ T36] audit: type=1804 audit(1616850825.941:199): pid=15815 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir914673494/syzkaller.ktCgc0/150/bus" dev="sda1" ino=15066 res=1 errno=0 [ 237.206111][ T36] audit: type=1804 audit(1616850825.961:200): pid=15816 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/237/bus" dev="sda1" ino=15067 res=1 errno=0 13:13:46 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) gettid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='pids.events\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7a6}, 0x1c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xf) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r0) 13:13:46 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000008000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:46 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f0000004340)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000004200)={0x50, 0x0, r2}, 0x50) syz_fuse_handle_req(r1, &(0x7f0000000000)="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", 0x2000, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000066c0)={0x90, 0x0, 0x0, {0x7, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000, 0x0, 0x0, 0x0, 0x800}}}, 0x0, 0x0, 0x0, 0x0}) read$FUSE(0xffffffffffffffff, &(0x7f0000008a80)={0x2020}, 0x2020) r3 = openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x3) ioctl$SG_IO(r3, 0x2285, &(0x7f0000002300)={0x53, 0xfffffffffffffffd, 0x11, 0x0, @buffer={0x0, 0x40000, &(0x7f00000021c0)=""/209}, &(0x7f00000020c0)="7155640d559dcb778937fb86e0f8ded777", 0x0, 0x216, 0x0, 0x0, 0x0}) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000002380)={0x0, @hci={0x1f, 0x0, 0x4}, @llc={0x1a, 0x325, 0x1f, 0x0, 0x0, 0x7f, @random="49adf005423c"}, @ethernet={0x306, @dev}, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x691, 0x1f}) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000002100)={0x10, 0xffffffffffffffda}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x0, &(0x7f0000003680)=[{&(0x7f0000002400)="6578e8a33479621565c9709f2d0d2d56e64f9ac656ebaccf8e156b63bedd86a59bae73c79a21f507f5ac5415903b5d5855629f720eeb7b8e6376bd93fde3a9fbf823d139a77055305be1515ca5d643aaf478b859a393ce81ac00483b41e556acd87a5b0324042cb6ca0fc75fdbd2fd08b6b4bdf0435fbc24c2692d7d27ccd807e891f211f245edbf684e41ce857ca7fa3ec8906300", 0x95}, {&(0x7f00000024c0)="170e517a21aeaae66d252862348a5b0ef8d521ec1540c64bed852cb79e9b75378160fa72b1d26d1962771ea78bc0248075c8ddc6a72686123c130d619c570a9be94ff31061f94132ea2648340955eab265e4d1edada845ae3080aa26b75bfa7f8c7aaff59514ea0b958d4efeee065cbd5dcc800c59c5bc944baade205c99be44affd422219fd0ed16021f82adb5a7297b4ae42f2de8d97334a14ab4155a0617187e881ede5da130a56b1fe27662561fc1b312c7a8118d2ef58fa77416d3f4713", 0xc0}, {&(0x7f0000002580)="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", 0x1000}, {&(0x7f0000003580)="ac549b6922527ae2ff5b0d47e8b7e4e133da69d962821240647c1df57904177c3d8c4199a4b92fc0b58f641e537c7ac74834dc59ede8302f97f9cb0da3c2702691fb461bca6436baf6be30953c2aac7a7101440f08d8a4d9ebeb71cef8d0e89c7e6c627d17d0c6126b871dcbcbcbc4d68414759c5e006d965d382710851b2e528555aea133a28f06afd5a48a21bb1725758577c8f5a07b4518db558695e756a73c2df267b68804e1842e4f0e85a31afb860ea94406964db5d6a59b369631de3aeb0b41636151b4a16d2590fac96cc7f40ade7743a9538801be09ec8ae0d54d70729c0f5ab2a09cbe13b74f24977ef2fc", 0xf0}, {&(0x7f00000022c0)="30b4ecb797de2e6c9d64e8f1b9e3e6a18cfe80f57b1e187d47d393941d4255d97763d069b2410eb775e523c995", 0x2d}], 0x5, &(0x7f0000006a40)=ANY=[@ANYBLOB="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"], 0x13a8}}], 0x1, 0x4000000) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x25, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) 13:13:46 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x8000000, [{0x3000, 0x0, 0x0}]}) 13:13:46 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000000), 0x10) getpeername$llc(r0, 0x0, 0x0) 13:13:46 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000009000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:46 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:46 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file1\x00', 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2]) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000080)='autofs\x00', 0x0, &(0x7f0000000400)) getgroups(0x2, &(0x7f0000000100)=[0x0, 0xee00]) lchown(&(0x7f00000000c0)='./file1\x00', 0xffffffffffffffff, r3) sendfile(r0, r1, 0x0, 0x800000080004103) 13:13:46 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000a000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 238.074841][ T36] audit: type=1804 audit(1616850826.861:201): pid=15841 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/238/bus" dev="sda1" ino=15070 res=1 errno=0 13:13:47 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000b000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:47 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xda00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 238.183231][ T36] audit: type=1804 audit(1616850826.961:202): pid=15858 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/239/bus" dev="sda1" ino=15082 res=1 errno=0 13:13:47 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) gettid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='pids.events\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7a6}, 0x1c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xf) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r0) 13:13:47 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file1\x00', 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2]) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000080)='autofs\x00', 0x0, &(0x7f0000000400)) getgroups(0x2, &(0x7f0000000100)=[0x0, 0xee00]) lchown(&(0x7f00000000c0)='./file1\x00', 0xffffffffffffffff, r3) sendfile(r0, r1, 0x0, 0x800000080004103) 13:13:47 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000c000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:47 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xdb00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:47 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x7f, 0x0, &(0x7f00000002c0)=0x6) 13:13:47 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x9000000, [{0x3000, 0x0, 0x0}]}) 13:13:47 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000d000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:47 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='pids.events\x00', 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x3b, 0x6, 0x3f, 0x4, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xfffffffa, 0x0, @perf_config_ext={0x140c}, 0x0, 0x0, 0x0, 0x8, 0xf2, 0x9, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x9) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7a6}, 0x1c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xf) gettid() openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) 13:13:47 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xdc00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:47 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file1\x00', 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2]) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000080)='autofs\x00', 0x0, &(0x7f0000000400)) getgroups(0x2, &(0x7f0000000100)=[0x0, 0xee00]) lchown(&(0x7f00000000c0)='./file1\x00', 0xffffffffffffffff, r3) sendfile(r0, r1, 0x0, 0x800000080004103) 13:13:47 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000e000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:47 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xdc02}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:47 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) gettid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='pids.events\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7a6}, 0x1c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xf) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r0) 13:13:47 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000010000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:47 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file1\x00', 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2]) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000080)='autofs\x00', 0x0, &(0x7f0000000400)) getgroups(0x2, &(0x7f0000000100)=[0x0, 0xee00]) lchown(&(0x7f00000000c0)='./file1\x00', 0xffffffffffffffff, r3) sendfile(r0, r1, 0x0, 0x800000080004103) 13:13:47 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xdd02}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:47 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0xa000000, [{0x3000, 0x0, 0x0}]}) 13:13:47 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f00000047c0)) 13:13:47 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:47 executing program 1: add_key(&(0x7f0000000200)='cifs.idmap\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 13:13:47 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0xb000000, [{0x3000, 0x0, 0x0}]}) 13:13:47 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_ifreq(r0, 0x8949, &(0x7f00000001c0)={'ip_vti0\x00', @ifru_data=&(0x7f0000000100)="a16b21cc0bd038b6b660879e3c2e19869f0528119c07bcfbe2677008844c7c24"}) 13:13:47 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000011000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:47 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400d4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:47 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0xc000000, [{0x3000, 0x0, 0x0}]}) 13:13:47 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:47 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000012000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:47 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0x21, 0x0, 0x9c) 13:13:47 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_SYNTH_MEMAVL(r0, 0xc004510e, 0x0) 13:13:47 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x0, 0x0) mmap$snddsp_control(&(0x7f0000ffa000/0x3000)=nil, 0x1000, 0x0, 0x12, r0, 0x83000000) 13:13:47 executing program 1: syz_read_part_table(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000780)="fb", 0x1, 0x80000000}]) 13:13:47 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000020000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:48 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS_OLD(r0, 0xc1004111, &(0x7f00000001c0)={0x0, [0x3ff, 0x3ff, 0xff]}) 13:13:48 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0xd000000, [{0x3000, 0x0, 0x0}]}) 13:13:48 executing program 3: r0 = syz_open_dev$vcsu(&(0x7f0000000180)='/dev/vcsu#\x00', 0x0, 0x280000) setsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, 0x0, 0x0) 13:13:48 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:48 executing program 0: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x24800) [ 239.183402][ T9772] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) 13:13:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000025000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:48 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0xe000000, [{0x3000, 0x0, 0x0}]}) 13:13:48 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:48 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x4000081) [ 239.289026][T15977] loop1: detected capacity change from 0 to 264192 13:13:48 executing program 1: syz_read_part_table(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000780)="fb", 0x1, 0x80000000}]) 13:13:48 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0818, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:13:48 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:48 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x0) 13:13:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000040000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:48 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x10000000, [{0x3000, 0x0, 0x0}]}) 13:13:48 executing program 3: r0 = socket$kcm(0x29, 0x5, 0x0) getsockopt$bt_hci(r0, 0x0, 0x0, 0x0, 0x0) 13:13:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000048000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:48 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x11000000, [{0x3000, 0x0, 0x0}]}) 13:13:48 executing program 0: openat$dsp1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp1\x00', 0x4021, 0x0) 13:13:48 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000004c000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 239.546520][T16015] loop1: detected capacity change from 0 to 264192 13:13:48 executing program 1: syz_read_part_table(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000780)="fb", 0x1, 0x80000000}]) 13:13:48 executing program 3: socketpair(0x22, 0x0, 0x8, &(0x7f0000000000)) 13:13:48 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002400)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_DIRENTPLUS(r0, 0x0, 0xf0ffffff7f0000) 13:13:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x0) 13:13:48 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x12000000, [{0x3000, 0x0, 0x0}]}) 13:13:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000058000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:48 executing program 3: socket(0x3, 0x0, 0x14bedc) 13:13:48 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:48 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:48 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x4, 0xffffffe0}, 0xc) 13:13:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000068000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 239.798377][T16063] loop1: detected capacity change from 0 to 264192 13:13:48 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x25000000, [{0x3000, 0x0, 0x0}]}) 13:13:48 executing program 1: syz_read_part_table(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000780)="fb", 0x1, 0x80000000}]) 13:13:48 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002400)='/dev/cuse\x00', 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000002080)={0x50, 0x0, r2}, 0x50) 13:13:48 executing program 3: perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xa, 0xffffffffffffffff, 0x0) 13:13:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000006c000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:48 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001540)={{0x14}, [@NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x48}}, 0x0) 13:13:48 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x5c000000, [{0x3000, 0x0, 0x0}]}) 13:13:48 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETFMTS(r0, 0x8004500b, 0x0) 13:13:48 executing program 0: clock_gettime(0x0, &(0x7f0000000000)) fork() 13:13:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000074000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r1, 0xae45, 0x0) 13:13:48 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x2500, 0x0, 0x0}]}) [ 240.084778][T16108] loop1: detected capacity change from 0 to 264192 [ 240.100029][ T36] kauditd_printk_skb: 12 callbacks suppressed [ 240.100040][ T36] audit: type=1804 audit(1616850828.881:215): pid=16115 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/252/bus" dev="sda1" ino=15058 res=1 errno=0 13:13:49 executing program 0: clock_gettime(0x0, &(0x7f0000000000)) fork() 13:13:49 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000007a000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:49 executing program 1: mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10132, 0xffffffffffffffff, 0x0) 13:13:49 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:49 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x2fff, 0x0, 0x0}]}) 13:13:49 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000003c0)='NLBL_MGMT\x00', r0) sendmsg$NLBL_MGMT_C_REMOVEDEF(r1, &(0x7f0000000500)={&(0x7f0000000100), 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x28, r2, 0x625, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0x11, 0x1, '[+&[!-{*\'+*}\x00'}]}, 0x28}}, 0x0) 13:13:49 executing program 0: clock_gettime(0x0, &(0x7f0000000000)) fork() 13:13:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x0, 0x1, 0x201}, 0x14}}, 0x0) 13:13:49 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000007c000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:49 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x5}, 0x40) 13:13:49 executing program 0: clock_gettime(0x0, &(0x7f0000000000)) fork() [ 240.310832][ T36] audit: type=1804 audit(1616850829.091:216): pid=16152 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/253/bus" dev="sda1" ino=15062 res=1 errno=0 13:13:49 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x3002, 0x0, 0x0}]}) 13:13:49 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={0x20, 0xa, 0xa, 0x101, 0x0, 0x0, {}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) 13:13:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000001200)=ANY=[@ANYBLOB="9feb01001800000008"], &(0x7f00000001c0)=""/4096, 0x3a, 0x1000, 0x1}, 0x20) 13:13:49 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800ffffff85000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:49 executing program 1: r0 = syz_open_dev$ndb(&(0x7f0000002380)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x0) 13:13:49 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000008a000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:49 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:49 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[], 0x94}}, 0x0) 13:13:49 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x3003, 0x0, 0x0}]}) 13:13:49 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000002800)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000004900)={0x0, 0x0, &(0x7f0000004680)=[{&(0x7f0000004580)="ca", 0x1}, {&(0x7f0000004640)="c0", 0x1}], 0x2, &(0x7f00000046c0)=[{0x28, 0x0, 0x0, "e22b3a4b98da83b1af04ad7fd5c37d884a"}], 0x28}, 0x0) [ 240.511008][ T36] audit: type=1804 audit(1616850829.291:217): pid=16179 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/254/bus" dev="sda1" ino=15060 res=1 errno=0 13:13:49 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) ioctl$SOUND_MIXER_WRITE_VOLUME(r0, 0xc0044d07, &(0x7f0000000080)) 13:13:49 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) ioctl$SOUND_MIXER_WRITE_VOLUME(r0, 0xc0044d07, &(0x7f0000000080)=0x1b) 13:13:49 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800ffffff95000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:49 executing program 3: socketpair(0x2, 0x0, 0x0, &(0x7f0000001cc0)) 13:13:49 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:49 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x3004, 0x0, 0x0}]}) [ 240.641701][ T36] audit: type=1804 audit(1616850829.421:218): pid=16198 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/255/bus" dev="sda1" ino=15096 res=1 errno=0 13:13:49 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f0000000840)='/dev/vsock\x00', 0x0, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000001440)) 13:13:49 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x30, r1, 0x1, 0x0, 0x0, {{}, {}, {0x14, 0x18, {0x0, @bearer=@l2={'ib', 0x3a, 'veth0\x00'}}}}}, 0x30}}, 0x0) 13:13:49 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000d0000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:49 executing program 3: socketpair(0x27, 0x0, 0x0, &(0x7f0000000180)) 13:13:49 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x14}, 0x40) [ 240.850104][ T36] audit: type=1804 audit(1616850829.631:219): pid=16225 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/256/bus" dev="sda1" ino=15060 res=1 errno=0 [ 240.874890][ T35] Bluetooth: hci0: command 0x0406 tx timeout [ 240.893144][ T35] Bluetooth: hci1: command 0x0406 tx timeout [ 240.918209][ T35] Bluetooth: hci2: command 0x0406 tx timeout [ 240.937189][ T35] Bluetooth: hci3: command 0x0406 tx timeout [ 240.952971][ T35] Bluetooth: hci4: command 0x0406 tx timeout [ 240.979115][ T35] Bluetooth: hci5: command 0x0406 tx timeout 13:13:50 executing program 0: r0 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x58, 0x0, &(0x7f0000000140)=[@free_buffer, @transaction_sg={0x40486311, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x6b, 0x0, &(0x7f00000001c0)="81a9797affde9bf3830a4dce17346be1ce094eafec76f04dc390bd9c4ce44911598fd56a566fd4e64a69eea6788aa0220f55b220754eba78ae56c824692b613093785c73a76819f8110e3940f5255c412bbf40362afb7306edec4c79fe1a0b0287886040026661ecdb6335"}) 13:13:50 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:50 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x3005, 0x0, 0x0}]}) 13:13:50 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x103401) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x0, 0x5}) 13:13:50 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000002fc000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:50 executing program 1: mmap$usbmon(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 13:13:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x1c, 0xa, 0x6, 0x301, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 13:13:50 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x3006, 0x0, 0x0}]}) 13:13:50 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000ff000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:50 executing program 1: perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB="14000000030701"], 0x14}}, 0x0) 13:13:50 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 241.590150][ T36] audit: type=1804 audit(1616850830.372:220): pid=16263 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/257/bus" dev="sda1" ino=15117 res=1 errno=0 13:13:50 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r0, 0xc1004110, &(0x7f00000002c0)={0x0, [0x4, 0x101, 0x4], [], 0x4}) 13:13:50 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$sock_SIOCSIFBR(r0, 0x8941, 0x0) 13:13:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x1, 0x8, 0x101}, 0x14}}, 0x0) 13:13:50 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000060ff000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:50 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x3007, 0x0, 0x0}]}) 13:13:50 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x11}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:50 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180085ffffff000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:50 executing program 3: r0 = fork() perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49560, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0x4}, r0, 0x0, 0xffffffffffffffff, 0x0) 13:13:50 executing program 0: r0 = socket$inet(0x2, 0xa, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) [ 241.742617][ T36] audit: type=1804 audit(1616850830.522:221): pid=16284 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/258/bus" dev="sda1" ino=14401 res=1 errno=0 13:13:50 executing program 1: socketpair(0x0, 0x0, 0x9, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 13:13:50 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:50 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180095ffffff000000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 241.856801][ T36] audit: type=1804 audit(1616850830.642:222): pid=16301 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/259/bus" dev="sda1" ino=14401 res=1 errno=0 13:13:50 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x1e, &(0x7f0000000000), &(0x7f0000000040)=0x4) 13:13:50 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x3008, 0x0, 0x0}]}) 13:13:50 executing program 3: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETFMTS(r0, 0x8004500b, &(0x7f0000000040)) [ 241.907457][T16308] syz-executor.0 uses obsolete (PF_INET,SOCK_PACKET) 13:13:50 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800ffffffffff6000000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)={0x28, r1, 0x115, 0x0, 0x0, {{}, {}, {0xc, 0x14, 'syz0\x00'}}}, 0x28}}, 0x0) 13:13:50 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x14}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 241.987395][ T36] audit: type=1804 audit(1616850830.772:223): pid=16317 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/260/bus" dev="sda1" ino=15106 res=1 errno=0 13:13:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x891f, &(0x7f0000010d40)={'batadv0\x00', @ifru_addrs=@can}) 13:13:50 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x73, 0x0, &(0x7f0000000040)) 13:13:50 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:50 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x3009, 0x0, 0x0}]}) 13:13:50 executing program 0: socketpair(0x2b, 0x1, 0x3, &(0x7f0000000000)) 13:13:50 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x2, 0x0) 13:13:51 executing program 3: socketpair(0x2, 0x1, 0x80, &(0x7f0000000080)) 13:13:51 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000020000044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:51 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 242.153066][ T36] audit: type=1804 audit(1616850830.932:224): pid=16343 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir877011668/syzkaller.mHyQdK/261/bus" dev="sda1" ino=15110 res=1 errno=0 13:13:51 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) 13:13:51 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, &(0x7f0000000500)={&(0x7f0000000100)={0x10, 0x0, 0x2}, 0xc, &(0x7f00000004c0)={0x0}}, 0x0) 13:13:51 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x300a, 0x0, 0x0}]}) 13:13:51 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000010044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:51 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x56}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:51 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet(r0, &(0x7f0000005040)=[{{&(0x7f0000000100)={0x2, 0x0, @local}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000140)='|', 0x1}], 0x1}}], 0x1, 0x0) 13:13:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000540)={{0x14}, [@NFT_MSG_DELOBJ={0x34, 0x14, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_OBJ_TYPE={0x8}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x5c}}, 0x0) 13:13:51 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x300b, 0x0, 0x0}]}) 13:13:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000004c0)={0x44, 0x2, 0x9, 0x3, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private2}, {0x14, 0x4, @dev}}}]}]}, 0x44}}, 0x0) 13:13:51 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x74}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:51 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000020044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:51 executing program 1: syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x4, 0x101000) 13:13:51 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, 0xffffffffffffffff) 13:13:51 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x10}, 0x10}}, 0x0) 13:13:51 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x300c, 0x0, 0x0}]}) [ 242.471414][T16388] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 13:13:51 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000030044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:51 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:51 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000001100), 0x4) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0x5, 0x0, 0x0) 13:13:51 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x80000, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x40089416, 0x0) 13:13:51 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f0000000600)={0x0, 0x0}) ioctl$MON_IOCH_MFLUSH(r0, 0x9208, 0x0) 13:13:51 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000040044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:51 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x300d, 0x0, 0x0}]}) [ 242.649461][T16415] sctp: [Deprecated]: syz-executor.1 (pid 16415) Use of int in maxseg socket option. [ 242.649461][T16415] Use struct sctp_assoc_value instead 13:13:51 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xb8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:51 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x1, @loopback}}, 0x1e) 13:13:51 executing program 0: syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7, 0x4000) [ 242.693658][T16419] sctp: [Deprecated]: syz-executor.1 (pid 16419) Use of int in maxseg socket option. [ 242.693658][T16419] Use struct sctp_assoc_value instead 13:13:51 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000050044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:51 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x300e, 0x0, 0x0}]}) 13:13:51 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, 0x0, &(0x7f0000000100)=0xeb) 13:13:51 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xd0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:51 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') 13:13:51 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000060044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000), 0x4) 13:13:52 executing program 1: syz_read_part_table(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000580)="d5", 0x1, 0xfff}]) 13:13:52 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x3010, 0x0, 0x0}]}) 13:13:52 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000070044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:52 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x0, 0x2}, 0xc) 13:13:52 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xdc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:52 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0x7d, 0x0, 0x9c) 13:13:52 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000380)={{}, 'port1\x00'}) 13:13:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x70, 0x0, 0x9, 0x5, 0x0, 0x0, {}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x16c9}}, @NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_PRIV_DATA_LEN={0x8}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private0}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x70}}, 0x0) 13:13:52 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000080044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:52 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2, 0x11, r0, 0x0) 13:13:52 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x3011, 0x0, 0x0}]}) 13:13:52 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0xe1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x0, r0}) 13:13:52 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000090044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000001200)=ANY=[], &(0x7f00000001c0)=""/4096, 0x3a, 0x1000, 0x1}, 0x20) 13:13:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x58, 0x0, 0x7, 0x201, 0x0, 0x0, {}, [@NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x1}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0xf8c}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0xe}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_BYTES={0xc}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x3}]}, 0x58}, 0x1, 0x0, 0x0, 0x10}, 0x40000084) [ 243.778879][T16503] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 243.796610][T16503] netlink: 'syz-executor.3': attribute type 2 has an invalid length. 13:13:52 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x3012, 0x0, 0x0}]}) 13:13:52 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000a0044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x24, 0x4, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_L4PROTO={0x5}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0xf7}]}, 0x24}}, 0x0) 13:13:52 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1ce}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:52 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000000)) 13:13:52 executing program 1: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0xe7f, 0x4000) 13:13:52 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x3025, 0x0, 0x0}]}) 13:13:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000000c0)={{0x14}, [@NFT_MSG_DELFLOWTABLE={0x2c, 0x18, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x54}}, 0x0) 13:13:52 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000b0044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:52 executing program 1: socketpair(0x1a, 0x0, 0x0, &(0x7f0000000140)) 13:13:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0xa, 0xa, 0x801, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) 13:13:52 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1dd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:52 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f00000059c0)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="bc", 0x1}], 0x1}], 0x1, 0x44080) 13:13:52 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x305c, 0x0, 0x0}]}) 13:13:52 executing program 3: syz_usb_connect$uac1(0x0, 0x71, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f0000001300)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}}}]}}]}}, 0x0) 13:13:52 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000c0044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:53 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2b8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:53 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x0) 13:13:53 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000d0044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:53 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=ANY=[@ANYBLOB="18000000000000008400000007000000ac1414bb0000000018000000000000008400000007000000ac1414bb0000000020000000000000008400000002000000010001008100000005000000df1bb43c59"], 0x128}, 0x0) 13:13:53 executing program 0: socketpair(0x29, 0x5, 0x3, &(0x7f0000000380)) 13:13:53 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001a00)={0x1, 0x0, [{0x3000, 0x2, 0x0}]}) 13:13:53 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000e0044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 13:13:53 executing program 5: set_mempolicy(0x3, &(0x7f0000000140)=0x6, 0xa) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2dc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:13:53 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x2, 0x0, &(0x7f0000000040)) 13:13:53 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000100044000000000000000000000000000500ffff000000009500d6dd83cc42d0b8d97652c67d670fe27f0bb2292588412e8c873861983a11c2f4b2381fff6700b9f9e4f0621a0c7a48aa2c5d668e682c34211fae6aa70006570ee51f56284520e37e6b143f588c04235558dc10f3f3d469b8c7952bb5f5f241df3f4cff1d"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000200)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 244.532756][ T5] usb 4-1: new high-speed USB device number 4 using dummy_hcd [ 244.772732][ T5] usb 4-1: Using ep0 maxpacket: 8 [ 244.892712][ T5] usb 4-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 244.901512][ T5] usb 4-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 244.918321][ T5] usb 4-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 245.082735][ T5] usb 4-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 245.091815][ T5] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 245.100217][ T5] usb 4-1: Product: syz [ 245.104449][ T5] usb 4-1: Manufacturer: syz [ 245.109025][ T5] usb 4-1: SerialNumber: syz [ 245.354306][T16578] udc-core: couldn't find an available UDC or it's busy [ 245.361387][T16578] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 245.432672][ T5] usb 4-1: 0:2 : does not exist [ 245.439637][ T5] usb 4-1: USB disconnect, device number 4 [ 246.162573][ T9703] usb 4-1: new high-speed USB device number 5 using dummy_hcd [ 246.453596][ T9703] usb 4-1: Using ep0 maxpacket: 8