216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:18 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) 07:41:18 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0x0, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) madvise(&(0x7f0000003000/0xc000)=nil, 0xc000, 0xb) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x4, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00c@@'], 0x0, 0x0, 0x0}) 07:41:18 executing program 2: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000300)='/dev/loop0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)='fuseblk\x00', 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 07:41:19 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000300)='/dev/loop0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)='fuseblk\x00', 0x0, 0x0) 07:41:19 executing program 2: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:19 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fstat(0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x6900) ftruncate(r1, 0x800) ioctl$VT_DISALLOCATE(r1, 0x5608) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) syncfs(r1) socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, r1, 0x0, 0x9, &(0x7f0000000000)='./cgroup\x00', 0xffffffffffffffff}, 0x30) fcntl$lock(r0, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x80000001, r3}) sendfile(r1, r2, &(0x7f0000000380), 0x8001) sendfile(r1, r2, 0x0, 0x8400fffffffa) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f00000000c0)=""/62) socket$inet(0x2, 0x5, 0x2) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000180)=0x400) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000300)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) 07:41:19 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0fe7285c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:19 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:19 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000bd7000)={&(0x7f0000c07e98)=ANY=[@ANYBLOB="38010000100013070000000000000000fe800200000b000000000000009b0000ff00000000000000000000ffffac00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000480001006d643500"/240], 0x138}}, 0x0) [ 633.085546] audit: type=1804 audit(1567410079.172:6614): pid=29517 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/syzcgroup/unified/syz4/bus" dev="sda1" ino=16721 res=1 07:41:19 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:19 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0fe7285c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:19 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) dup3(r0, r1, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) 07:41:19 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) 07:41:19 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:19 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0fe7285c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:19 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:19 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) [ 633.911055] audit: type=1804 audit(1567410080.002:6615): pid=29529 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/syzcgroup/unified/syz4/bus" dev="sda1" ino=16721 res=1 [ 633.972109] audit: type=1804 audit(1567410080.002:6616): pid=29525 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/syzcgroup/unified/syz4/bus" dev="sda1" ino=16721 res=1 07:41:20 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100)) madvise(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0xd10c) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) 07:41:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:20 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:20 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) dup3(r0, r1, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) [ 634.310134] protocol 88fb is buggy, dev hsr_slave_0 [ 634.315296] protocol 88fb is buggy, dev hsr_slave_1 07:41:20 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) 07:41:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000480)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:20 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:20 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) dup3(r0, r1, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) 07:41:20 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000480)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000480)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) [ 634.550946] protocol 88fb is buggy, dev hsr_slave_0 [ 634.556640] protocol 88fb is buggy, dev hsr_slave_1 07:41:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:21 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) dup3(r0, r1, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) 07:41:21 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:21 executing program 5: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) 07:41:21 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:21 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100)) madvise(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0xd10c) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) 07:41:21 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:21 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:21 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xc, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:21 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xc, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:21 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) dup3(r0, r1, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)) [ 635.430180] protocol 88fb is buggy, dev hsr_slave_0 [ 635.435424] protocol 88fb is buggy, dev hsr_slave_1 07:41:21 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xc, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:21 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x13, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) [ 635.590120] protocol 88fb is buggy, dev hsr_slave_0 [ 635.590385] protocol 88fb is buggy, dev hsr_slave_0 [ 635.595270] protocol 88fb is buggy, dev hsr_slave_1 [ 635.600470] protocol 88fb is buggy, dev hsr_slave_1 07:41:21 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x13, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:21 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x13, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:21 executing program 5: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) 07:41:22 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) dup3(r0, r1, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)) 07:41:22 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19da"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:22 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100)) madvise(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0xd10c) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) 07:41:22 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:22 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:22 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19da"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:22 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19da"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:22 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) dup3(r0, r1, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)) 07:41:22 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x18, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b37521373"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:22 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x18, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b37521373"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:22 executing program 5: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) 07:41:22 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) dup3(r0, r1, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) 07:41:22 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x18, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b37521373"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:22 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x18, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6da"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:23 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000880)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 07:41:23 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x18, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6da"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:23 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) dup3(r0, r1, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) 07:41:23 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:23 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:23 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) 07:41:23 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:23 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x18, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6da"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:23 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x19, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:23 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:23 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000880)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 07:41:23 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x19, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:23 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) dup3(r0, r1, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) 07:41:23 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:23 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x19, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:23 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:23 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x19, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0fe728"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:23 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) 07:41:23 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) 07:41:23 executing program 4: 07:41:23 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x19, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0fe728"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:23 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x19, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0fe728"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:23 executing program 4: 07:41:24 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x19, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0fe7285c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:24 executing program 4: 07:41:24 executing program 4: 07:41:24 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) 07:41:24 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x19, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0fe7285c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:24 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:24 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) 07:41:24 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:24 executing program 4: 07:41:24 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x19, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0fe7285c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:24 executing program 4: 07:41:24 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x19, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0fe7285c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:24 executing program 4: 07:41:24 executing program 4: 07:41:24 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x19, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0fe7285c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:24 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) 07:41:24 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x19, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0fe7285c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:25 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:25 executing program 4: 07:41:25 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x19, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0fe7285c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:25 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:25 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000000)) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, 0x0) 07:41:25 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) 07:41:25 executing program 4: 07:41:25 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x19, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0fe7285c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:25 executing program 4: 07:41:25 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x19, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0fe7285c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:25 executing program 4: 07:41:25 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000000)) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, 0x0) 07:41:26 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0fe7285c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 07:41:26 executing program 4: 07:41:26 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:26 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:26 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000000)) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, 0x0) 07:41:26 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) 07:41:26 executing program 4: 07:41:26 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0fe7285c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 07:41:26 executing program 4: 07:41:26 executing program 0: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) dup3(0xffffffffffffffff, r0, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000340)) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) 07:41:26 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0fe7285c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 07:41:26 executing program 4: 07:41:26 executing program 0: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) dup3(0xffffffffffffffff, r0, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000340)) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) 07:41:26 executing program 4: 07:41:26 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:26 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:26 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0fe7285c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:26 executing program 4: 07:41:26 executing program 0: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) dup3(0xffffffffffffffff, r0, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000340)) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) 07:41:26 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) 07:41:26 executing program 3: write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:27 executing program 4: 07:41:27 executing program 0: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) dup3(r0, r1, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) 07:41:27 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0fe7285c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:27 executing program 4: 07:41:27 executing program 0: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) dup3(r0, r1, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) 07:41:27 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0fe7285c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x1000000, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea179", 0x0}, 0x28) 07:41:27 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0fe7285c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0x0, 0x0, 0x0, 0x0}, 0x28) 07:41:27 executing program 4: 07:41:27 executing program 0: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) dup3(r0, r1, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) 07:41:27 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:27 executing program 3: write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:27 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f00000001c0)) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) 07:41:27 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000000)) dup3(r0, r1, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) 07:41:27 executing program 4: 07:41:27 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0fe7285c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0x0, 0x0, 0x0, 0x0}, 0x28) 07:41:27 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0fe7285c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0x0, 0x0, 0x0, 0x0}, 0x28) 07:41:27 executing program 4: 07:41:28 executing program 4: 07:41:28 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0fe7285c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0x0, 0x0, &(0x7f0000000400), 0x0}, 0x28) 07:41:28 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000000)) dup3(r0, r1, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) 07:41:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x8, 0x7ff, 0x3}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), &(0x7f0000000280)}, 0x20) 07:41:28 executing program 1: connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:28 executing program 4: getpriority(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) unshare(0x600) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) select(0x0, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0xfff}, &(0x7f0000000100), &(0x7f0000000140)={0x0, 0x2710}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r0, &(0x7f00000002c0)="82bc7b4d488b32aaa2884aa5a9664de9705fdff9940371a0ce9cb60741a2606ea05f8bf519aa5c85c5ea4b331967b6259dee21dc77e470261113b344683293f1fb4697540fc3df805618abd41125eecb38b24a62947916552480359e127a9d1a8a574425d12f98ea5f777b9fb6c740fcc6b0c806c9d935e1926e8bf7538ad78c1edcd47795084426f557151d86cd0daa42da3a69ffaa5945f471a2de8d3fa7f4447661f61506b44e0be9ca8a47582843715fac8eac25ca0ff224969cf5eb797249ee02896f64229b186b90926c35572c70e39ac8be46ac0aa6ca6b64"}, 0x10) geteuid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000640)={{{@in=@local, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@multicast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@initdev}}, &(0x7f00000001c0)=0xe8) prctl$PR_SET_PDEATHSIG(0x1, 0x0) getresgid(&(0x7f0000000940), 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001dc0)=0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000001f00)) gettid() getresuid(&(0x7f00000020c0), &(0x7f0000002100), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000021c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getpgid(r2) 07:41:28 executing program 3: write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:28 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000000)) dup3(r0, r1, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) 07:41:28 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f00000001c0)) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) 07:41:28 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0fe7285c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0x0, 0x0, &(0x7f0000000400), 0x0}, 0x28) 07:41:28 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0fe7285c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0x0, 0x0, &(0x7f0000000400), 0x0}, 0x28) 07:41:28 executing program 1: connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:28 executing program 1: connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:28 executing program 4: getpriority(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) unshare(0x600) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) select(0x0, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0xfff}, &(0x7f0000000100), &(0x7f0000000140)={0x0, 0x2710}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r0, &(0x7f00000002c0)="82bc7b4d488b32aaa2884aa5a9664de9705fdff9940371a0ce9cb60741a2606ea05f8bf519aa5c85c5ea4b331967b6259dee21dc77e470261113b344683293f1fb4697540fc3df805618abd41125eecb38b24a62947916552480359e127a9d1a8a574425d12f98ea5f777b9fb6c740fcc6b0c806c9d935e1926e8bf7538ad78c1edcd47795084426f557151d86cd0daa42da3a69ffaa5945f471a2de8d3fa7f4447661f61506b44e0be9ca8a47582843715fac8eac25ca0ff224969cf5eb797249ee02896f64229b186b90926c35572c70e39ac8be46ac0aa6ca6b64"}, 0x10) geteuid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000640)={{{@in=@local, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@multicast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@initdev}}, &(0x7f00000001c0)=0xe8) prctl$PR_SET_PDEATHSIG(0x1, 0x0) getresgid(&(0x7f0000000940), 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001dc0)=0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000001f00)) gettid() getresuid(&(0x7f00000020c0), &(0x7f0000002100), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000021c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getpgid(r2) 07:41:28 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0fe7285c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0x7, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab", 0x0}, 0x28) 07:41:28 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:28 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) dup3(r0, r1, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) 07:41:28 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0fe7285c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0x7, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab", 0x0}, 0x28) 07:41:29 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:29 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0fe7285c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0x7, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab", 0x0}, 0x28) 07:41:29 executing program 4: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x300, 0x0, 0x0, 0x0, 0x0) 07:41:29 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:29 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) dup3(r0, r1, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) 07:41:29 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f00000001c0)) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) 07:41:29 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0fe7285c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xb, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9b", 0x0}, 0x28) 07:41:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setns(0xffffffffffffffff, 0x0) [ 643.326290] hfs: can't find a HFS filesystem on dev loop4 07:41:29 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:29 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0fe7285c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xb, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9b", 0x0}, 0x28) 07:41:29 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, &(0x7f00000001c0)) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={0x0, 0x9}, 0x8) 07:41:29 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) dup3(r0, r1, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) [ 643.624533] audit: type=1804 audit(1567410089.702:6617): pid=30087 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/583/bus" dev="sda1" ino=16787 res=1 07:41:30 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:30 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0fe7285c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xb, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9b", 0x0}, 0x28) 07:41:30 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:30 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) 07:41:30 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) dup3(0xffffffffffffffff, r1, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) 07:41:30 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0fe7285c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xd, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea1", 0x0}, 0x28) 07:41:30 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0fe7285c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xd, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea1", 0x0}, 0x28) 07:41:30 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) dup3(0xffffffffffffffff, r1, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) 07:41:30 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000f56a0a00fe00000000850000001f000000b70000000000000095000000000000001f498f753f786439f9bb2d49133039cc655f4a1128f7172fc3d8ca49ecce1e3ca199c3fead2ce57a0df5874751f0856412c56652b5308a7a3235506c46416c826a19dab3dc69ea268d7e000b3752137300723834c6daeb3a0fe7285c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1000000, 0xd, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbea1", 0x0}, 0x28) [ 644.376107] audit: type=1804 audit(1567410090.452:6618): pid=30093 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/583/bus" dev="sda1" ino=16787 res=1 07:41:30 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, &(0x7f00000001c0)) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={0x0, 0x9}, 0x8) [ 644.405145] audit: type=1804 audit(1567410090.482:6619): pid=30087 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/583/bus" dev="sda1" ino=16787 res=1 07:41:30 executing program 2: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, &(0x7f00000001c0)) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={0x0, 0x9}, 0x8) 07:41:30 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) dup3(0xffffffffffffffff, r1, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) 07:41:30 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:30 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) 07:41:30 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:30 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, &(0x7f00000001c0)) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={0x0, 0x9}, 0x8) 07:41:30 executing program 2: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, &(0x7f00000001c0)) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={0x0, 0x9}, 0x8) 07:41:30 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) [ 644.894879] audit: type=1804 audit(1567410090.982:6620): pid=30157 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir713828339/syzkaller.gpy8EF/912/bus" dev="sda1" ino=17713 res=1 07:41:31 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000600)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000000c0)=""/77) 07:41:31 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, &(0x7f00000001c0)) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={0x0, 0x9}, 0x8) 07:41:31 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f00000073c0)=[{0x0, 0x0, 0x0}], 0x1, 0x0) 07:41:31 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) 07:41:31 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, &(0x7f00000001c0)) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={0x0, 0x9}, 0x8) 07:41:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') [ 645.319891] audit: type=1804 audit(1567410091.402:6621): pid=30175 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/587/bus" dev="sda1" ino=17809 res=1 07:41:31 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x1c, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}]}, &(0x7f0000000280)=0x10) 07:41:31 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:31 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) 07:41:31 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) 07:41:32 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:32 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) dup3(r0, r1, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000340)) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) 07:41:32 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, &(0x7f00000001c0)) [ 646.191857] audit: type=1804 audit(1567410092.272:6622): pid=30211 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/588/bus" dev="sda1" ino=17809 res=1 07:41:32 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) dup3(r0, r1, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000340)) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) 07:41:32 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) 07:41:32 executing program 2: accept4$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x80000) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:41:32 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) 07:41:32 executing program 2: accept4$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x80000) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:41:32 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) dup3(r0, r1, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000340)) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) 07:41:32 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:32 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) 07:41:32 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) 07:41:32 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:32 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) 07:41:33 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:41:33 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) dup3(r0, r1, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) 07:41:33 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) [ 647.056674] audit: type=1804 audit(1567410093.132:6623): pid=30263 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/589/bus" dev="sda1" ino=16645 res=1 07:41:33 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) dup3(r0, r1, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) 07:41:33 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) 07:41:35 executing program 2: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000000)) 07:41:35 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) 07:41:35 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:35 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) dup3(r0, r1, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) 07:41:35 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:35 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:41:35 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) 07:41:35 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x0, 0x15, 0x0, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e62", 0x0, 0x400}, 0x28) 07:41:35 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) [ 649.694536] audit: type=1804 audit(1567410095.772:6624): pid=30292 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/590/bus" dev="sda1" ino=17824 res=1 07:41:35 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) dup3(r0, r1, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, 0x0) 07:41:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:36 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) 07:41:36 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) 07:41:36 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) dup3(r0, r1, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, 0x0) 07:41:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:36 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:36 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:36 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) 07:41:36 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(0x0, 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) 07:41:36 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) dup3(r0, r1, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, 0x0) 07:41:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) [ 650.552658] audit: type=1804 audit(1567410096.632:6625): pid=30345 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/591/bus" dev="sda1" ino=16931 res=1 07:41:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:36 executing program 0: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001240)={[{@utf8='utf8'}]}) 07:41:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) [ 650.907061] ntfs: (device loop0): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 07:41:37 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(0x0, 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) [ 650.988989] ntfs: (device loop0): parse_options(): Unrecognized mount option . [ 651.088333] ntfs: (device loop0): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 07:41:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) [ 651.195125] ntfs: (device loop0): parse_options(): Unrecognized mount option . 07:41:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 07:41:37 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:37 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:37 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) 07:41:37 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) write$cgroup_int(r0, &(0x7f00000006c0), 0x12) 07:41:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) [ 651.424469] audit: type=1804 audit(1567410097.512:6626): pid=30388 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/592/bus" dev="sda1" ino=16572 res=1 07:41:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) socket$inet(0x2, 0x0, 0x0) 07:41:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:37 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(0x0, 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) 07:41:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) socket$inet(0x2, 0x0, 0x0) 07:41:38 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:38 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:38 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) 07:41:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(0x0, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:38 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) 07:41:38 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:41:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(0x0, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(0x0, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:38 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:41:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:38 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x10, &(0x7f0000000080), 0x4) 07:41:38 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 652.807849] audit: type=1804 audit(1567410098.882:6627): pid=30456 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/595/bus" dev="sda1" ino=16567 res=1 [ 652.975446] audit: type=1804 audit(1567410099.062:6628): pid=30465 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/596/bus" dev="sda1" ino=16569 res=1 07:41:39 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:39 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:39 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x6df3}, 0x3c) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:41:39 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) 07:41:39 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:41:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:39 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000000), 0x4) 07:41:39 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:40 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000100)={0x0, {0x0, 0x0, 0x0, 0x0, 0x57}}) 07:41:40 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:40 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 653.910283] audit: type=1804 audit(1567410099.982:6629): pid=30493 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/597/bus" dev="sda1" ino=17840 res=1 07:41:40 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x0) 07:41:40 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:41:40 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x8) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 654.261404] input: syz1 as /devices/virtual/input/input15 [ 654.344356] input: syz1 as /devices/virtual/input/input16 07:41:41 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) 07:41:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:41 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:41:41 executing program 0: r0 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/user\x00', 0x2, 0x0) write$binfmt_script(r0, 0x0, 0x0) 07:41:41 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:41 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:41 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0xc0045878, 0x0) 07:41:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) [ 655.404820] kauditd_printk_skb: 1 callbacks suppressed [ 655.404830] audit: type=1804 audit(1567410101.482:6631): pid=30544 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/600/bus" dev="sda1" ino=17862 res=1 07:41:41 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000140)={0xffffffffffffffff, r0}) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.stat\x00', 0x2761, 0x0) socket$kcm(0x29, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000007d40)}, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000400)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000500)=""/74, 0x4a}, {&(0x7f0000000000)=""/14, 0xe}], 0x2, &(0x7f0000000580)=""/129, 0x81}, 0x1) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x1000000000000002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f0000000040)=r4, 0xfff4) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 07:41:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") close(0xffffffffffffffff) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x40800) io_submit(r1, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xfe}]) 07:41:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") close(0xffffffffffffffff) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x40800) io_submit(r1, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xfe}]) 07:41:42 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) [ 656.230150] net_ratelimit: 4 callbacks suppressed [ 656.230156] protocol 88fb is buggy, dev hsr_slave_0 [ 656.240205] protocol 88fb is buggy, dev hsr_slave_1 [ 656.390132] protocol 88fb is buggy, dev hsr_slave_0 [ 656.390136] protocol 88fb is buggy, dev hsr_slave_0 [ 656.390181] protocol 88fb is buggy, dev hsr_slave_1 [ 656.395239] protocol 88fb is buggy, dev hsr_slave_1 07:41:42 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x0, 0x0, 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) 07:41:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") close(0xffffffffffffffff) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x40800) io_submit(r1, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xfe}]) 07:41:42 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:42 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:41:42 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:wireless_device_t:s0\x00', 0x27, 0x0) 07:41:42 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:42 executing program 0: getresgid(&(0x7f0000000940), 0x0, 0x0) [ 656.776857] audit: type=1400 audit(1567410102.862:6632): avc: denied { relabelto } for pid=30585 comm="syz-executor.0" name="/" dev="tmpfs" ino=129923 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:wireless_device_t:s0 tclass=dir permissive=1 07:41:42 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 656.809097] audit: type=1400 audit(1567410102.892:6633): avc: denied { mounton } for pid=30585 comm="syz-executor.0" path="/root/syzkaller-testdir054914337/syzkaller.wPxmJw/508/file0" dev="tmpfs" ino=129923 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:wireless_device_t:s0 tclass=dir permissive=1 07:41:43 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r0, 0x4, 0x40800) io_submit(r1, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xfe}]) 07:41:43 executing program 0: r0 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f00000005c0)=""/133) 07:41:43 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) setsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, 0xffffffffffffffff, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:41:43 executing program 0: getpid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x6df3}, 0x3c) sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:41:43 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x0, 0x0, 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) 07:41:43 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r0, 0x4, 0x40800) io_submit(r1, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xfe}]) 07:41:43 executing program 0: 07:41:43 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) setsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, 0xffffffffffffffff, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:41:43 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:43 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:43 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r0, 0x4, 0x40800) io_submit(r1, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xfe}]) 07:41:43 executing program 0: 07:41:43 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) setsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, 0xffffffffffffffff, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:41:43 executing program 0: 07:41:43 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r0, 0x4, 0x40800) io_submit(r1, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xfe}]) 07:41:43 executing program 0: 07:41:44 executing program 0: 07:41:44 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:41:44 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x0, 0x0, 0x0, &(0x7f0000000080)={0xff}, &(0x7f0000000200), 0x0) 07:41:44 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) [ 658.118535] audit: type=1804 audit(1567410104.202:6634): pid=30672 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/606/bus" dev="sda1" ino=17872 res=1 07:41:44 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r0, 0x4, 0x40800) io_submit(r1, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xfe}]) 07:41:44 executing program 0: 07:41:44 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:44 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:44 executing program 0: 07:41:44 executing program 0: 07:41:44 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r0, 0x4, 0x40800) io_submit(r1, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xfe}]) 07:41:44 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000200), 0x0) 07:41:44 executing program 0: 07:41:44 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:44 executing program 0: 07:41:44 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:41:44 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r0, 0x4, 0x40800) io_submit(r1, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xfe}]) 07:41:45 executing program 0: 07:41:45 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:41:45 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:45 executing program 0: 07:41:45 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000200), 0x0) 07:41:45 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:45 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r0, 0x4, 0x40800) io_submit(r1, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xfe}]) 07:41:45 executing program 0: 07:41:45 executing program 0: 07:41:45 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 659.413245] audit: type=1804 audit(1567410105.492:6635): pid=30730 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/608/bus" dev="sda1" ino=17864 res=1 07:41:45 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r0, 0x4, 0x40800) io_submit(r1, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xfe}]) 07:41:45 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:45 executing program 0: 07:41:45 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 659.736485] audit: type=1804 audit(1567410105.822:6636): pid=30761 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/610/bus" dev="sda1" ino=17870 res=1 07:41:46 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:46 executing program 0: 07:41:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:46 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:46 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000200), 0x0) 07:41:46 executing program 0: 07:41:46 executing program 0: 07:41:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:46 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:41:46 executing program 0: 07:41:46 executing program 0: 07:41:46 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:47 executing program 4: socket$unix(0x1, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000340)) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r2 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r1, 0x0, 0x2) sendfile(r1, r2, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:41:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:47 executing program 0: 07:41:47 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:47 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:47 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080), &(0x7f0000000200), 0x0) 07:41:47 executing program 0: 07:41:47 executing program 0: 07:41:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) [ 661.166891] audit: type=1804 audit(1567410107.252:6637): pid=30818 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/612/bus" dev="sda1" ino=17890 res=1 07:41:47 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:47 executing program 0: 07:41:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:47 executing program 0: 07:41:47 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080), &(0x7f0000000200), 0x0) 07:41:47 executing program 4: socket$unix(0x1, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000340)) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r2 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r1, 0x0, 0x2) sendfile(r1, r2, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:41:48 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:48 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:48 executing program 0: 07:41:48 executing program 0: 07:41:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:48 executing program 0: [ 662.045193] audit: type=1804 audit(1567410108.132:6638): pid=30860 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/613/bus" dev="sda1" ino=17904 res=1 07:41:48 executing program 0: 07:41:48 executing program 0: 07:41:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:48 executing program 0: 07:41:48 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080), &(0x7f0000000200), 0x0) 07:41:48 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040), 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:48 executing program 0: 07:41:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:48 executing program 4: socket$unix(0x1, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000340)) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r2 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r1, 0x0, 0x2) sendfile(r1, r2, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:41:48 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:48 executing program 0: 07:41:48 executing program 0: 07:41:49 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r3 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r3, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:41:49 executing program 0: 07:41:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:49 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:49 executing program 0: 07:41:49 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, 0x0, 0x0) 07:41:49 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r3 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r3, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:41:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:49 executing program 0: 07:41:49 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040), 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:49 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:49 executing program 0: 07:41:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) [ 663.742416] audit: type=1804 audit(1567410109.822:6639): pid=30936 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/616/bus" dev="sda1" ino=17907 res=1 07:41:49 executing program 0: 07:41:50 executing program 0: 07:41:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:50 executing program 0: 07:41:50 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, 0x0, 0x0) 07:41:50 executing program 0: 07:41:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:50 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r3 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r3, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:41:50 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:50 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040), 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:50 executing program 0: 07:41:50 executing program 0: [ 664.615253] audit: type=1804 audit(1567410110.692:6640): pid=30967 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/617/bus" dev="sda1" ino=16785 res=1 07:41:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:50 executing program 0: 07:41:50 executing program 0: 07:41:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:51 executing program 0: 07:41:51 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffc1a, 0xfa00, {0x0, 0x0}}, 0x1c3) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0xff}, 0x0, 0x0) 07:41:51 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x0, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:51 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:51 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:41:51 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:51 executing program 0: 07:41:51 executing program 0: 07:41:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) [ 665.542590] audit: type=1804 audit(1567410111.622:6641): pid=31005 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/618/bus" dev="sda1" ino=16801 res=1 07:41:51 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:51 executing program 0: 07:41:51 executing program 0: 07:41:52 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:41:52 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:52 executing program 0: 07:41:52 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x0, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:52 executing program 5: 07:41:52 executing program 0: 07:41:52 executing program 5: 07:41:52 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:52 executing program 0: 07:41:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) [ 666.431951] audit: type=1804 audit(1567410112.512:6642): pid=31044 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/619/bus" dev="sda1" ino=16617 res=1 07:41:52 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:53 executing program 0: 07:41:53 executing program 5: 07:41:53 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:53 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:41:53 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x0, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:41:53 executing program 0: 07:41:53 executing program 5: 07:41:53 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:53 executing program 0: 07:41:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, 0x0) close(0xffffffffffffffff) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x40800) io_submit(r1, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xfe}]) 07:41:53 executing program 5: 07:41:53 executing program 5: 07:41:53 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:53 executing program 0: [ 667.377081] audit: type=1804 audit(1567410113.462:6643): pid=31085 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/620/bus" dev="sda1" ino=16993 res=1 07:41:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, 0x0) close(0xffffffffffffffff) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x40800) io_submit(r1, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xfe}]) 07:41:53 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r2, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r3 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(0xffffffffffffffff, 0x0, 0x2) sendfile(0xffffffffffffffff, r3, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:41:53 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x0, 0x0) 07:41:53 executing program 5: 07:41:53 executing program 0: 07:41:53 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0), 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:53 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r2, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r3 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(0xffffffffffffffff, 0x0, 0x2) sendfile(0xffffffffffffffff, r3, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:41:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, 0x0) close(0xffffffffffffffff) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x40800) io_submit(r1, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xfe}]) 07:41:53 executing program 0: 07:41:54 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0), 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:54 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r2, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r3 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(0xffffffffffffffff, 0x0, 0x2) sendfile(0xffffffffffffffff, r3, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:41:54 executing program 5: 07:41:54 executing program 0: 07:41:54 executing program 5: [ 668.053904] Dev loop3: unable to read RDB block 3 [ 668.066012] loop3: unable to read partition table [ 668.094630] loop3: partition table beyond EOD, truncated [ 668.130973] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 07:41:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:54 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:41:54 executing program 0: 07:41:54 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0), 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:54 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x0, 0x0) 07:41:54 executing program 5: 07:41:54 executing program 0: 07:41:54 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:54 executing program 5: 07:41:54 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:41:54 executing program 0: 07:41:54 executing program 5: [ 668.445660] Dev loop3: unable to read RDB block 3 [ 668.466033] loop3: unable to read partition table 07:41:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:54 executing program 5: 07:41:54 executing program 0: [ 668.498314] audit: type=1804 audit(1567410114.582:6644): pid=31180 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/625/bus" dev="sda1" ino=16785 res=1 [ 668.502310] loop3: partition table beyond EOD, [ 668.681879] truncated [ 668.693101] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 07:41:54 executing program 5: 07:41:54 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:41:54 executing program 0: [ 668.882548] audit: type=1804 audit(1567410114.972:6645): pid=31199 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/626/bus" dev="sda1" ino=16961 res=1 07:41:55 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x0, 0x0) 07:41:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:55 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:55 executing program 5: 07:41:55 executing program 0: 07:41:55 executing program 5: 07:41:55 executing program 0: 07:41:55 executing program 5: 07:41:55 executing program 0: 07:41:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) [ 669.335429] Dev loop3: unable to read RDB block 3 [ 669.347519] loop3: unable to read partition table [ 669.390978] loop3: partition table beyond EOD, truncated [ 669.420332] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 07:41:55 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000340)) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r2, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r3 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r1, 0x0, 0x2) sendfile(r1, r3, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:41:55 executing program 0: 07:41:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:55 executing program 5: [ 669.717845] audit: type=1804 audit(1567410115.802:6646): pid=31238 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/627/bus" dev="sda1" ino=16559 res=1 07:41:56 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:56 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}]) 07:41:56 executing program 5: 07:41:56 executing program 0: 07:41:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x0, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:56 executing program 0: 07:41:56 executing program 5: 07:41:56 executing program 0: [ 670.133407] Dev loop3: unable to read RDB block 3 [ 670.157712] loop3: unable to read partition table [ 670.205270] loop3: partition table beyond EOD, truncated [ 670.250224] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 07:41:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x0, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:56 executing program 5: 07:41:56 executing program 0: 07:41:56 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}]) [ 670.583408] Dev loop3: unable to read RDB block 3 [ 670.588644] loop3: unable to read partition table [ 670.596074] loop3: partition table beyond EOD, truncated [ 670.603080] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 07:41:56 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:56 executing program 0: 07:41:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x0, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:56 executing program 5: 07:41:56 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000340)) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r2, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r3 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r1, 0x0, 0x2) sendfile(r1, r3, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:41:56 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}]) 07:41:57 executing program 5: 07:41:57 executing program 0: 07:41:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, 0x0) io_cancel(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(0x0, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) [ 670.983402] audit: type=1804 audit(1567410117.042:6647): pid=31287 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/628/bus" dev="sda1" ino=17409 res=1 [ 671.026238] Dev loop3: unable to read RDB block 3 [ 671.048703] loop3: unable to read partition table 07:41:57 executing program 5: [ 671.073697] loop3: partition table beyond EOD, truncated 07:41:57 executing program 0: [ 671.120227] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 07:41:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, 0x0) io_cancel(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(0x0, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:57 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {0x0, 0x0, 0x80000001}]) 07:41:57 executing program 5: 07:41:57 executing program 0: 07:41:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, 0x0) io_cancel(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(0x0, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:57 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:57 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000340)) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r2, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r3 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r1, 0x0, 0x2) sendfile(r1, r3, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:41:58 executing program 5: 07:41:58 executing program 0: 07:41:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) [ 671.939470] audit: type=1804 audit(1567410118.022:6648): pid=31324 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/629/bus" dev="sda1" ino=16557 res=1 07:41:58 executing program 5: 07:41:58 executing program 0: 07:41:58 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {0x0, 0x0, 0x80000001}]) 07:41:58 executing program 0: 07:41:58 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0xb) 07:41:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:58 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc340) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)) 07:41:58 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:58 executing program 5: r0 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ftruncate(r0, 0x80000000079a0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000000c0)={0x8, 0xfffffffffffffff9, 0x2, 0x0, 0x0, [{r0}, {r0, 0x0, 0x9}]}) 07:41:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:58 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000340)) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000280)={r2, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r3 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r1, 0x0, 0x2) sendfile(r1, r3, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:41:58 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {0x0, 0x0, 0x80000001}]) 07:41:58 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x84) getsockopt$inet6_int(r0, 0x29, 0x1e, 0x0, &(0x7f0000000180)) 07:41:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) [ 672.928651] audit: type=1804 audit(1567410119.012:6649): pid=31377 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/630/bus" dev="sda1" ino=17634 res=1 07:41:59 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000}]) 07:41:59 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x84) getsockopt$inet6_int(r0, 0x29, 0x13, 0x0, &(0x7f0000000180)) 07:41:59 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000340)) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000280)={r2, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r3 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r1, 0x0, 0x2) sendfile(r1, r3, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:41:59 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) 07:41:59 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@mcast1, 0x0, 0x0, 0x0, 0x5}, 0x20) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 673.289073] audit: type=1804 audit(1567410119.372:6650): pid=31400 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/631/bus" dev="sda1" ino=17425 res=1 [ 673.349510] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 673.405801] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 07:41:59 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r1, 0x0, 0x0}, 0x10) 07:41:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:41:59 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:41:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) dup2(r0, r1) 07:41:59 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000340)) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000280)={r2, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r3 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r1, 0x0, 0x2) sendfile(r1, r3, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:41:59 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x84) getsockopt$inet6_int(r0, 0x3a, 0x0, 0x0, 0x0) 07:41:59 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="00fb6800feac938c6b5e98d193ca7eeb96ecf9da85f483f58239e27a347e5106ea1060b29dda9f91c70200228165567171646502db4f8a74b940adc9368177b088ea0d759964507aaf2b409ece80fd153b98fe69000000000000ce2a87df6ed73cf20654ad6c"], 0x68, 0x0) listxattr(&(0x7f00000004c0)='./file0\x00', 0x0, 0x2) [ 673.755766] audit: type=1804 audit(1567410119.842:6651): pid=31421 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/632/bus" dev="sda1" ino=17602 res=1 07:42:00 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000}]) 07:42:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:42:00 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002600)={[{@fat=@check_normal='check=normal'}]}) 07:42:00 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r3, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) 07:42:00 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 674.078477] FAT-fs (loop5): bogus number of reserved sectors [ 674.114337] FAT-fs (loop5): Can't find a valid FAT filesystem 07:42:00 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) [ 674.211368] FAT-fs (loop5): bogus number of reserved sectors [ 674.223887] FAT-fs (loop5): Can't find a valid FAT filesystem [ 674.374091] audit: type=1804 audit(1567410120.452:6652): pid=31466 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/634/bus" dev="sda1" ino=17010 res=1 07:42:00 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:42:00 executing program 5: r0 = eventfd2(0x0, 0x801) readv(r0, &(0x7f00000013c0)=[{&(0x7f0000000080)=""/244, 0xf4}], 0x1) 07:42:00 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:42:00 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000240), 0x3000000}]) 07:42:00 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x84) getsockopt$inet6_int(r0, 0x29, 0x2, 0x0, &(0x7f0000000180)) 07:42:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) [ 674.759801] audit: type=1804 audit(1567410120.842:6653): pid=31483 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/635/bus" dev="sda1" ino=17602 res=1 07:42:01 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_genetlink_get_family_id$tipc2(0x0) 07:42:01 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r0, 0x0, 0x0) 07:42:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x0) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:42:01 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000540)="8d14fb003092bd81ed4e5b534c57", 0x0}, 0x28) 07:42:01 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 07:42:01 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:42:01 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0x6) 07:42:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30806", 0x0, 0x2e, 0xf0ffffffffffff}, 0x28) 07:42:01 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:01 executing program 4: socket$unix(0x1, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:01 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f04305000f0000fffff00063a377fbac141414e9", 0x0, 0x100}, 0x28) 07:42:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30806", 0x0, 0x2e, 0xf0ffffffffffff}, 0x28) [ 675.690868] audit: type=1804 audit(1567410121.772:6654): pid=31533 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/636/bus" dev="sda1" ino=16560 res=1 07:42:01 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:02 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x19, 0x0, 0x1ce) 07:42:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x0) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:42:02 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f04305000f0000fffff00063a377fbac141414e9", 0x0, 0x100}, 0x28) 07:42:02 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:02 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0), 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:42:02 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) getxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000040)=@random={'user.', '/dev/usbmon#\x00'}, 0x0, 0x345) 07:42:02 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0}, {&(0x7f0000000240), 0x3000000, 0x80000001}]) 07:42:02 executing program 5: 07:42:02 executing program 4: socket$unix(0x1, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x0) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:42:02 executing program 5: 07:42:02 executing program 0: 07:42:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(0x0, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:42:02 executing program 5: 07:42:02 executing program 0: 07:42:02 executing program 5: [ 676.652167] audit: type=1804 audit(1567410122.732:6655): pid=31589 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/637/bus" dev="sda1" ino=17010 res=1 07:42:03 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0), 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:42:03 executing program 0: 07:42:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(0x0, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:42:03 executing program 5: 07:42:03 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:03 executing program 5: 07:42:03 executing program 4: socket$unix(0x1, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:03 executing program 0: 07:42:03 executing program 5: 07:42:03 executing program 0: 07:42:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(0x0, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfe}]) 07:42:03 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) [ 677.562574] audit: type=1804 audit(1567410123.642:6656): pid=31627 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/638/bus" dev="sda1" ino=17013 res=1 07:42:04 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0), 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:42:04 executing program 5: 07:42:04 executing program 0: 07:42:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x0, 0x0) 07:42:04 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:04 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:04 executing program 5: 07:42:04 executing program 0: [ 678.229780] audit: type=1804 audit(1567410124.312:6657): pid=31655 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/639/bus" dev="sda1" ino=17842 res=1 07:42:04 executing program 5: 07:42:04 executing program 0: 07:42:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x0, 0x0) 07:42:04 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {0x0, 0x0, 0x6}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:05 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:42:05 executing program 5: 07:42:05 executing program 0: 07:42:05 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x0, 0x0) 07:42:05 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {0x0, 0x0, 0x6}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:05 executing program 5: 07:42:05 executing program 0: [ 679.124913] audit: type=1804 audit(1567410125.212:6658): pid=31695 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/640/bus" dev="sda1" ino=17940 res=1 07:42:05 executing program 5: 07:42:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x0, &(0x7f0000000600)) 07:42:05 executing program 0: 07:42:05 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {0x0, 0x0, 0x6}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:06 executing program 5: 07:42:06 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:06 executing program 0: 07:42:06 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:42:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x0, &(0x7f0000000600)) 07:42:06 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140), 0x0, 0x6}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:06 executing program 0: 07:42:06 executing program 5: [ 680.008352] audit: type=1804 audit(1567410126.092:6659): pid=31733 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/641/bus" dev="sda1" ino=17956 res=1 07:42:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x0, &(0x7f0000000600)) 07:42:06 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140), 0x0, 0x6}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:06 executing program 0: 07:42:06 executing program 5: 07:42:06 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:42:06 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:06 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x5, 0x105082) pread64(r0, &(0x7f0000000000)=""/123, 0x7b, 0x0) [ 680.469874] audit: type=1804 audit(1567410126.552:6660): pid=31770 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/642/bus" dev="sda1" ino=17949 res=1 07:42:06 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:42:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x1, &(0x7f0000000600)=[0x0]) 07:42:06 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140), 0x0, 0x6}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:06 executing program 5: r0 = gettid() rt_sigqueueinfo(r0, 0x41, &(0x7f00000000c0)) 07:42:06 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:07 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x5, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000000)) 07:42:07 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x5, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, "99961e188ebef4e84744ffe5ec7ef48a5d00cfa56d438d39ebbb58e3f2fc9b2361661b304a0cc8599994e8658555cb49eaf551e36e915da7ce7665707331a9a6", "ebaa2447ddbef4b8673dd2b78b439116198d919b397262c9e002658efaeba11f812ee00ac02677887a8f4731e3cdc174176a5894ab20002141f1aa9e56c9968f", "3d6e689d25066c62f44f6d7cac4156caeb2241209d3078e0e5b6771c8a6990dd"}) [ 680.900689] audit: type=1804 audit(1567410126.992:6661): pid=31782 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/643/bus" dev="sda1" ino=17958 res=1 07:42:07 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8", 0x27, 0x6}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x1, &(0x7f0000000600)=[0x0]) 07:42:07 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x5, 0x105082) write(r0, &(0x7f0000000000), 0x52698b21) 07:42:07 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x6, &(0x7f0000000dc0)="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") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r1, &(0x7f00000000c0)=0x202, 0xdd) 07:42:07 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 681.266684] audit: type=1804 audit(1567410127.352:6662): pid=31815 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/644/bus" dev="sda1" ino=17942 res=1 07:42:07 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:42:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x1, &(0x7f0000000600)=[0x0]) 07:42:07 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) getpeername(r0, 0x0, &(0x7f0000000180)) 07:42:07 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8", 0x27, 0x6}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:07 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x80000000000701, 0x4) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e22, 0x0, @ipv4}, 0x1b) recvfrom$inet6(r0, 0x0, 0x0, 0x2023, 0x0, 0xfffffc40) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000040)) 07:42:07 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:07 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'nr0\x01\x01\x00', 0x6fd6df04f53fd9ef}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) [ 681.731788] audit: type=1804 audit(1567410127.822:6663): pid=31829 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/645/bus" dev="sda1" ino=17950 res=1 07:42:07 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8", 0x27, 0x6}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:07 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)=[{0x10}], 0x10}}], 0x1, 0x0) 07:42:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xfe}]) 07:42:08 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000740)='net/psched\x00') read$eventfd(r0, 0x0, 0x0) 07:42:08 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) pread64(r0, &(0x7f0000001180)=""/4096, 0x1000, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) 07:42:08 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:42:08 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b2", 0x3a, 0x6}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:08 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:08 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'nr0\x01\x01\x00', 0x2}) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000140)) 07:42:08 executing program 0: prctl$PR_GET_NAME(0x10, &(0x7f00000007c0)=""/89) 07:42:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xfe}]) 07:42:08 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000940), 0x0, 0x20000041, &(0x7f00000003c0)={0xa, 0x0, 0x1, @mcast2, 0x896}, 0x1c) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000200)=@req3={0x1f, 0xfff, 0x0, 0x1}, 0x1c) ftruncate(0xffffffffffffffff, 0x0) clone(0x12000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f0000000080)=0x2000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0) [ 682.621454] audit: type=1804 audit(1567410128.712:6664): pid=31876 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/646/bus" dev="sda1" ino=17950 res=1 07:42:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x804, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fcntl$setstatus(r1, 0x4, 0x40800) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xfe}]) 07:42:08 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000005c0)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x0) 07:42:08 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b2", 0x3a, 0x6}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:08 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d530bcfe47bf070") r1 = socket$unix(0x1, 0x800000000005, 0x0) bind$unix(r1, &(0x7f0000000400)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r1) [ 682.949267] input: syz1 as /devices/virtual/input/input17 [ 683.016630] audit: type=1804 audit(1567410129.102:6665): pid=31912 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/647/bus" dev="sda1" ino=17964 res=1 [ 683.063927] input: syz1 as /devices/virtual/input/input18 07:42:09 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x11, 0x800000002, 0x81) bind(r1, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f0000000080)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x1) sendfile(r0, r2, 0x0, 0x8000fffffffe) 07:42:09 executing program 2: munmap(&(0x7f0000000000/0x600000)=nil, 0x600000) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000000)={0x0, {}, {{0x2, 0x0, @dev}}}, 0x108) 07:42:09 executing program 5: socket$packet(0x11, 0x0, 0x300) r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x4, 0x1100082) r1 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) exit(0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 07:42:09 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:42:09 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b2", 0x3a, 0x6}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:09 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:09 executing program 2: r0 = memfd_create(&(0x7f0000000200)='ppp1^ppp0vmnet0^\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[@ANYBLOB='&u\t'], 0x3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 07:42:09 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:09 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea0", 0x44, 0x6}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:09 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000740), 0x4) 07:42:09 executing program 2: mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0) io_submit(r1, 0x1, &(0x7f0000001780)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_getevents(r1, 0x2, 0x97f, &(0x7f0000000000)=[{}, {}], 0x0) io_destroy(r1) 07:42:10 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000001c80)='./file0\x00', 0x113d, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r0 = gettid() r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/attr/exec\x00', 0x2, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r1, &(0x7f0000000240)=ANY=[], 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = gettid() tkill(r2, 0x1000000000016) 07:42:10 executing program 0: socket$inet(0x2, 0x3, 0x1) syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x8}}}}}, 0x0) 07:42:10 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea0", 0x44, 0x6}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) io_setup(0x80400000000002, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1, &(0x7f0000001780)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_getevents(r1, 0x2, 0x97f, &(0x7f0000000000)=[{}, {}], 0x0) io_destroy(r1) 07:42:10 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:10 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40)}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:42:10 executing program 0: r0 = gettid() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="f95a0f34"], 0x4}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xc}], 0x100000000000005a}}], 0x1, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="7e499fe412b31c5c5fd21dacb7b35ad29999e5deb90bd622b9f4a177373afcbc3b5bf61816d9162b65cccc061c938047d9953b277929434509c7ecfe9659f8afccc983090dfe92f8ec65fcc8e262ebca23136f1c21122803ab2e3a7c209f2ad15c3383db595c65172b70c954c01b5e237f81f433dd9e31ea8a7dc73435827acff83babd2e943473102300841ecb2e78bd261b870452493a3426094b0069c694ad0529c2b03aed0f5c1927e54ac8d1dd0b6e1bd8307f1220b4944f972b13c88dad7", @ANYRES64, @ANYRESHEX, @ANYBLOB="9f3388c5b87b558d8aedcbb605ebcfca9ba7a5b7f64c5649b189d8f1e87738c76cf8a8e40ead6546ab973248041521ba892d95d2ceca3e423ded7d092f03b7f9b3f7cb5fa335e4b7a5c3f7aebc430d1066af11fe4ee902229a792f619822d0e2e6a09847df14ed780a66"], 0x0, 0x145}, 0x20) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x30) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:42:10 executing program 5: r0 = gettid() socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000100)={'#! ', './file0'}, 0xb) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) [ 684.529225] audit: type=1804 audit(1567410130.612:6668): pid=32009 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/650/bus" dev="sda1" ino=17937 res=1 07:42:10 executing program 2: 07:42:10 executing program 0: [ 684.635171] ptrace attach of "/root/syz-executor.0"[32021] was attempted by "/root/syz-executor.0"[32022] 07:42:10 executing program 5: 07:42:10 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e7300", 0x49, 0x6}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:10 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x1120, 0x0) r0 = open$dir(&(0x7f00000013c0)='./file0\x00', 0x27a, 0x0) r1 = dup2(r0, r0) write$FUSE_IOCTL(r1, &(0x7f0000000100)={0x20}, 0x1380f0d) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r2 = gettid() write$selinux_attr(r1, &(0x7f0000000080)='system_u:object_r:apm_bios_t:s0\x00', 0x20) tkill(r2, 0x16) read$FUSE(r1, &(0x7f00000003c0), 0x1000) 07:42:10 executing program 5: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x28000003, &(0x7f0000000100)={0xa, 0x28000004e22, 0x1, @empty, 0xfb}, 0x1c) write(r2, &(0x7f0000000280)="a2", 0x1) r3 = accept(r1, 0x0, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x36, &(0x7f0000000080)=@dstopts={0x6, 0x4, [], [@pad1, @pad1, @ra={0x5, 0x2, 0x10001}, @ra={0x5, 0x2, 0xce}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, [], 0x15}}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}]}, 0x30) dup3(r0, r3, 0x80000) 07:42:10 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f0000000040)=0x1e) 07:42:11 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e7300", 0x49, 0x6}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) [ 684.935647] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 685.002638] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:42:11 executing program 2: 07:42:11 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40)}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:42:11 executing program 0: 07:42:11 executing program 5: 07:42:11 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e7300", 0x49, 0x6}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:11 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:11 executing program 2: 07:42:11 executing program 5: 07:42:11 executing program 0: 07:42:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2000000002800500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpgrp(0x0) prlimit64(r1, 0x0, 0x0, &(0x7f0000000340)) 07:42:11 executing program 5: 07:42:11 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e70", 0x4b, 0x6}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:11 executing program 0: [ 685.523194] audit: type=1804 audit(1567410131.612:6669): pid=32073 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/651/bus" dev="sda1" ino=17940 res=1 [ 685.682214] audit: type=1400 audit(1567410131.612:6670): avc: denied { getrlimit } for pid=32083 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=process permissive=1 07:42:12 executing program 5: 07:42:12 executing program 2: 07:42:12 executing program 0: 07:42:12 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40)}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:42:12 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e70", 0x4b, 0x6}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:12 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:12 executing program 2: 07:42:12 executing program 0: 07:42:12 executing program 5: 07:42:12 executing program 0: 07:42:12 executing program 2: 07:42:12 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e70", 0x4b, 0x6}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:12 executing program 5: 07:42:12 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:12 executing program 0: 07:42:12 executing program 5: 07:42:13 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)}}], 0x2, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:42:13 executing program 2: 07:42:13 executing program 0: 07:42:13 executing program 5: 07:42:13 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:13 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e7055", 0x4c, 0x6}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:13 executing program 0: 07:42:13 executing program 2: [ 687.158079] Unknown ioctl -1073191904 07:42:13 executing program 5: 07:42:13 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:13 executing program 5: 07:42:13 executing program 0: [ 687.435190] Unknown ioctl -1073191904 [ 687.482517] audit: type=1804 audit(1567410133.572:6671): pid=32180 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/655/bus" dev="sda1" ino=17978 res=1 07:42:14 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e7055", 0x4c, 0x6}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:14 executing program 2: 07:42:14 executing program 5: 07:42:14 executing program 0: 07:42:14 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)}}], 0x2, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:42:14 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:14 executing program 0: 07:42:14 executing program 2: 07:42:14 executing program 5: [ 688.149903] Unknown ioctl -1073191904 07:42:14 executing program 0: 07:42:14 executing program 2: 07:42:14 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:14 executing program 5: 07:42:14 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x1ff) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x200, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/current\x00', 0x2, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f00000000c0)={'ipvs\x00'}, &(0x7f0000000100)=0x1e) prctl$PR_GET_THP_DISABLE(0x2a) setsockopt(r0, 0x1, 0x200, &(0x7f0000000140)="24da5c5d0bf1590eae72b8fd6b76d0cfb4ea4851f8f4db7a05b56c90e87c35adabdb8a6fee816becaedeb26040c5db2269d57d9bfbf958218276b2a509be2c32f4aa4aed9b7567947d36655f5f79880040088b6bbe8369740657fa44c936854c6f0f19bc6884b08aaaddbdf57b602d6922043fd2cecf190a9c73f18da87515ec6c", 0x81) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB='#!'], 0x2) close(r2) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 07:42:14 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e7055", 0x4c, 0x6}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x20000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x24000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000180)="b1", 0xfffffe24, 0x4081, 0x0, 0x26f) recvfrom$inet(r0, 0x0, 0x0, 0x41, 0x0, 0x0) 07:42:15 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)}}], 0x2, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:42:15 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200107fd, &(0x7f0000000140)={0x2, 0x800004e23, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) sendmmsg$inet(r0, &(0x7f00000004c0)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000001940)="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", 0x2d1}], 0x1}}], 0x1, 0x0) 07:42:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x2000000000000057, &(0x7f0000000480)=ANY=[@ANYBLOB="bb00000200ed0000bfa30000000000000703000028feffff720af0fff8ffff000000003f000000000000005d400300000000006504000001ed000004000000000008006c44000000000000630a00fe000000001f04000000000000b7000000000000009500000000000000023bc065b7a379d17cf9333379fc9e94af69912435f1b6a693002e7f3be361917adef6ee1c8a2b4f8ef1e50becb19bc461e91a7168e3295cc5181554a090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fee5bef70548aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd8dff0c710e4cdbf4fc41fbba4f94329e646b8ee6de2109fbe4ef154400e2438ec649dc74a1a610643a98d9ec21ead2ed51b104d4d91af25b845d8a7925c3109b151b8b9f75dd08d123deda8a3658d42ecbf28bf7076c15b463bebc72f526d8e8aaafcb913466aaa7f6df70252e79166d858fcd0e06dd31af9612f2460d0b11008e59a5923906f88b53987ad1714e72ba7924f0c33d39000d06ad99edc3a6138d5fcfba53f8d0c67ff616236fd9aa58f2477184b6a89adaf17b0a6041bdef728d236619074d6ebdf098bc908f523d228a40f94116764f0cd2bb36ca32fcbc49d2bb9fe7226a4040996e37c4f4675"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 07:42:15 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:15 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:15 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000080)) ioctl$PPPIOCSPASS(r0, 0x40087447, &(0x7f0000000140)={0x0, 0x0}) 07:42:15 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:15 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:15 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000340)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x4, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='\x00c@@'], 0x0, 0x0, 0x0}) 07:42:15 executing program 2: capset(&(0x7f00000000c0)={0x20080522}, &(0x7f0000000100)={0x9}) 07:42:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000006800)=[{{&(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10, 0x0}}, {{&(0x7f00000037c0)={0x2, 0x0, @loopback}, 0x10, 0x0}}], 0x2, 0x0) 07:42:15 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x0, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0x40}, 0x4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000007affc), 0x4) close(r0) pipe(0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000240)={'U-', 0x4}, 0x28, 0x0) sendto$inet(r3, 0x0, 0x47, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r3, &(0x7f0000001000)=ANY=[@ANYRES16=r2], 0x2) setsockopt$sock_int(r3, 0x1, 0x1000000000008, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf64(r3, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) [ 689.510152] protocol 88fb is buggy, dev hsr_slave_0 [ 689.515284] protocol 88fb is buggy, dev hsr_slave_1 [ 689.670126] protocol 88fb is buggy, dev hsr_slave_0 [ 689.670161] protocol 88fb is buggy, dev hsr_slave_0 [ 689.675225] protocol 88fb is buggy, dev hsr_slave_1 [ 689.680282] protocol 88fb is buggy, dev hsr_slave_1 07:42:15 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x47, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$sock(r0, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="89b116c2c6b87fd16e866b769fbeb8ba371ee3829f4b01fc933e21a53121b4f375b2e3f91236492db8f300d40322d1a231391ca133c882a17df17553d98234a684cab36f63bcb1507ae045666869150d2e21c27a64882c9d45edb11feb42db7a8bcf4367a82ad1ed5fe01c9be5468339827ed8eadc853605960ac617d62b4b4e2153fedf1fb2db731c462a37deb6a490a506a3cf3ea6fee08867e0902c92fc5d4fb606cb273bf90c1388049961f73a828d0814d32a4a0a10d65241ea1dcd034d356a3721211cd8c1a1", 0xc9}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20000040) 07:42:15 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, 0x0) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:15 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="a585a0c47b7121", 0x7, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:15 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40)}}, {{0x0, 0x0, &(0x7f0000000040)}}], 0x2, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:42:15 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x20000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x24000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000180)="b1", 0xfffffe24, 0x4081, 0x0, 0x26f) recvfrom$inet(r0, 0x0, 0x0, 0x41, 0x0, 0x0) 07:42:15 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000280)="64b5134654f35cf169ef2c1b39c9dcdb09ddaff634dee12eb7729b0f1acc2e7bc456965781486662e5bc1cc8161f480194214e5466f27801624c32c67e42c62d5896dd174a86e06e3f1ec04da87a0e13358057d50c6830ac59a4f0b55f0ebe3b4e3314648fbc0e8a59a2656993bd78093b45197dc8a82f898ea9d8bac59f64b7e7df150005955bf0bdf422d6829e21b0ff95411a57131cf43af1efac876eb036117716387ebcec4bc9dd30558670e4949ee619f1b3690cba56544a0faa89feacaa96bd583f98610a1fd6790d4904ecd607bc1c70b8eefea425a4e4105639db7cfd3555ce342ce4f54606c393856ff2de5cd2cac600e59018f387bb242ead27a03a1eeafe63532e5f2ce367301b75caf8fdc37cfaf02a6ae6582b39878a16bf3cfbedd956a29e3a940871506a33457f3eeeacc0089b18a7ca91ed6ce7b67f0e5524ea028a22855f2f3d68e02c42f65d1558c3c5149f9da255b5350596646fca19e18219ffc58e6efb8e9925136dedf9f9e8d8ec6995b27c7c923727eab4cbebce1120f84ce2f91d9d4ceabd4d6903e0834cf19acca58c0ba3a6c63dcc8ad2e61ecf36a5969cbe22beebd2bfdfcd5ed9f83d39381f273850c952bc42e14cf3170198dd58d76793ff35c1359daf3446625a98624c5c753976035b4299db29b8d039f10146b182c1ce1ad6bf72ec00440177809a68653ff6a58ace7dacf81bbe6f94e4f769a273a198eb5466af9f16e7094c7720e50fa2d615ebf4aa9ef61f01e483e670e40cedbe028a7c764602c89b6b82bc2ccac99d3141c2176196fea794e2d997ff3df466a5e54904cccba623730eadabe5f8f676e094241da58c1027c5e3c2cb6b0a1908fc8f0b44e1513f60404ad3f790794ddea7bd266d29a83fdf9b68bd507e306db1fb146138aeff3e09fdcc80ef5f755f3e5bfb7fe97eb03c902f31381a2909e45285fa4ac16713e54799e61c9e270bb1fecd6a7c63db871fee8c9a272c519ec8dc36c3a96bb725d59fc5fc5246b15a2180961c8ddf9aef624f98fe493aad6251f2d02934f77e181c7a4b69d0ce321b9ec59fb6080bc56bf95ab17a12ef96d2e7212c426e68fed2326900530e7bfde91c0c805cee409f765a291494b3e3357824a804e135c26eb8e8fb0cd8eb3f03e09cfbeb62272f61869c3ba31869b712fafff5812687c8dbf41b6d9a723fab61c53ddaf6bed8d0c0f0fa544a1348cc95e45c4aa440c00784d6a885f2bee0854866fa4473e2e7377e69dc56207d45c1d0e71beb193bc697be94db855eda56691087cc8659c5a54ea496b6bd1753f16af2ea97e59e8a38e8c9aaf332ed458afce03ea882f4daaf80c7fe785411b2c79eb826d13f6dc8f91588eef40ce785820018ba337a58b255e092a2daa08a940e723ffe3d1a9d3369789ce859662f1c4a3bd47a08ddfd73d0fa354aa2ee6069380673c9b85ce75da1dacba4395833a9b74c28b6fa2071f5952aaae01f258001ecebd4d550b00cb51e24de4eaba08b6f2d152f92ee5d1f083d775b49e2a0cb45c9ed86b4635ec90538e7a24e87e03d1b980420773af69a0cf40574d310dadd2f5737150439df72e2123f805f07e25e978b69b2a587336090356ba67af5a96975a451695554b846fe5f5d7d803277c2a239718b9a844c2ddb53272dbc3b7067387155a705ed726ba2ca721a4bb929cbc5fed763e9617879c2a8de74dad2b815b011f606fa46a511001f91d1075fb99fe5a95817050478fc943623bdc7ce9074a5d50131856c2e8fb9ea04e0d1abd86d0b846de79e3c98161d1de729d878889768377344b9cc8dd84835370e1b913bd57d085f1224c886c763c17d62ea93c5f35bd609eaf09230e31b604d507f7fe522d2489e46f655e6cd9994b814419e439ed4a9db788084be8753ffbb9077c32d0a9c13fc09257a0214d211fd539ba8385b500a2ed7079966380874f3d8a73c102decaa55203211ba3b6122b2b5da881c76117ac0e2d74d8c159652a3238e76018255b5a7320650401a6e2ec1e419bcd6902b594b6c8b8f0672b5a32e1c4929d6e2a7e3d31be4e0e43043738b6214a0043d149293bcbf3406b939ca2cb41d5fc477f635595d003eba88f8389efaad5d7f36e4a77a3f32f11db4c22bf4b7994c2c6bca0fe688fe0cc5f435088f9a968ec22b5f7677587f83da234e05e7921c0a66ce226517b1ed3bc16887c8fc36876fa3ee9c1bc086e464354fc079496c56f67b4b765ceec41d6aebe339fbf3ef2a200a793045889c8311f21a361231a16da7cd60e80f7d55805e8232574d35063266249642a387c5c1816160b6addca28cf4dce2129c32e4d1270b5bce331fd3f7cdbd1219d77f2a70e21d6f5a860100607b148ba326a953d0346c94520eaeec052f42474c423c5c956519465355d00f6bfafaf1282f79c2a6812a1267ba18022c23070539def9d855c452c64382f3ea6af6fe9bc97d443844f39496eea570a7a9c6c83a1b479faeb1b985b8e756b51f2c251f226f563214c47f1ef907ea59b1f309b464dc20b6ec75707868bea722db54c05a882937d960b9f8fd9dcb2c7ac165d52016df186b11f8924dc288199a0396400f8998f433c68b5d61c985e337113ae76a2021778e74304cfaa4ce3ddbc49a028e15fe9e2d26d81c2710371e3b091af53f36975c5336220d36cb678e5c50986e3ca19fa2b5ab8e4849c522330fc73552e838b81b872377020a26bb1b839e53ddef905ab71e758057b0b704139a429ea419e8357e9e2ad78fbbc0940e9e26b03339de5a484b61d69879ec5850a96cb8a3554afc5706815c0dba32875b93c03e3d51f3b08efe2bea0f00b4e9f538ce73876d0f158a601b86d0082be991c8ff1dab491ef0c37aa6fef1d4f3e6a83acfdb02b54b7cbac3bea4caf2d49d3506a2dac9ec5b48b03b9bcc59a1bcdc490a377b58fe6f1abdf39995bfb13668f8e197202a4c164c39756c50b21a46fa261347611676f330133466b7a91124f57a9bd05e6752353008008c80f6402fad5dd872535d2dee8c75f7adaab33f75151fb1581481c4619bae0d4172e476be9364c5e3c03c5dd8bd5f289a10c3970a3e6b9f66bdb09d5e94a6e0a48d62e54421ae0aadbf5d5720d5e253a2867372e6ca35b407e96c0502f8b3d41e885ac2120dc914d18dd4ca7c81e20e0de338f92f9934f33560948668e62f3cd8a867688865a62e8b8dfc4f6acb2fb96e0e077f5a3aeaf6994987121136bedd3050f3655a39987ece2f60f295602d200f0b18382749b6b8a6cad6f4de7bf67d6a3fcedd5a8eb53733c6e2ce2639428991601f20e43fcf34742e7af3c7ed5ff6388c2a569fdbd99f8b5de965685eece72626d56b029cb045406c8038e64a6328f8e6d6a2180e4f2b8eda12cc2f55e6f476fdf95ffed7d0392c32ade5572565d5b0a5a7510ba28fe0162e3497a47a06c006d3bfa7ffd72d675b24cfc5f5cdf025b4f7718d1ced757dda4d28d1bed6221b11f18807b382fd72a5b04e7355bf03092cbead83a905063fcffd29a29c5e4ce9f62cbf252aa16a1aac40c976691f378d9c552cfe1b63a9fc288749cc3e846d52b3dab38d24a3e94582687c8caa22e9a539c6bebf836dd42c953e62704790d4e8b5bf0cb3f969d7be2e01693e4dddac8ff7a885049078f223704a2020f0358177da77fa0164b52275767018d57eb5386d73a060d409da779ea7fb9b8a08514d7a7c0894554031a4d8bd36a607562cd892e618fac852abd77f214321ccb4a10d21ccc3d8aa3f4e15f10658c76e14e09182c0d09eb53b48e107b585311d001419ff6a7056deb903832600417b4be4ddef7310b9ee05a225eb75c9719ac2f5080157dd5d089583968946db41a05d01c6d6af9b0731b7b4115b70c603de3cffcab6b0b4e0fd2398c8b65e5350c18b3d4b6c8d5cdaa37db88e674edae99da233c948d29d60ec363c87030fb9d925a761e56412e016c0f8afd2ae9605e0bf9d628d768b2bad38a589b922dc1601436569fa64f3710f811fc1c37da94c02cce6c02fecba722fa2b59ec56b288405d088071f725a2041df82670be4ad0273c083a1ae6fa77c7b20bb0ff4d011e72f0eacc0c72f7dcb706eef8ed8af73071d293c68834ce89efe50211109637e49f7370047aa1f78619ba03239f58648b8e826eda8566922e2e0f083f40b7c56352f78f80a5f0a518b95c6f6ba92a30f84eaa6e3aad0c41699e525f0a2526b2be14aaa800d5930fa3db4ff21a4d2c11821ee0dd0b3e8bb4cac9567308e844a87a373e9356265a067555c3109c627a9cd8c88e86505440b73611c81a254e6f6c372a9ae926f24effcc90fee0924b205dd5de1abe47d84007503681d737aad4554475353145c6596a34ad930e2ab8ff9f1d940a4dfc4b5e45a203034abc12cdd2ae915793505f8bd890f9f2dbe1847c194afcdd20f0d75722634d3ce0426505066157fff6aa58a53a96d3b3ba329e321654f4aa0563d95b0e43dd72368586697dd75705c7719141243912303e199042cd4c869182835c922f9ef5b9c05e85b6bfdb9d1bea5a2e0c4ddc343b4fa5d6ba92451d1b9804a57da875a20ea06275f6b60452bf1fc108363ab2f93ae789c7ad28c6f03165e221b7afdbd165f3f70b9c4c870e85d22b0456a7b1c4a4aa278708cff0cd491e9497b650bd7ac3beb0c4a4ea90e07d4cc43f5b71c2c4f2123c7405cbf340d6ca49b717ccc5ad2a472a0aef8e01ffe3facaa54339c7d3520d285d51d0b57259053df13164b8348fdc9ab62ee4d419acbe12a31434135c3aded3a287ab71386b7acff4eca5beafcd66a461b577a6dd57433f57188523cf5cb7dd6d4e75646d51c61f71c167f56a6e1c45d4bc0376792af0951a18921f3bff7e52bd60fe3e041561da706cf85") ioctl$TCGETA(r0, 0x5405, &(0x7f0000001280)) 07:42:16 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, 0x0) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:16 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:16 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x40141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x7fffff, 0x11, r1, 0x0) r2 = creat(0x0, 0x0) ftruncate(r1, 0x20fffe) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xfffffffffffffcbc) mprotect(&(0x7f0000004000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) 07:42:16 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, 0x0) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:16 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:wireless_device_t:s0\x00', 0x27, 0x0) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) [ 690.158345] audit: type=1804 audit(1567410136.242:6672): pid=32323 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/662/bus" dev="sda1" ino=18018 res=1 [ 690.194755] audit: type=1400 audit(1567410136.262:6673): avc: denied { getattr } for pid=32324 comm="syz-executor.0" path="/root/syzkaller-testdir054914337/syzkaller.wPxmJw/654/file0" dev="tmpfs" ino=137381 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:wireless_device_t:s0 tclass=dir permissive=1 [ 690.230128] protocol 88fb is buggy, dev hsr_slave_0 [ 690.235256] protocol 88fb is buggy, dev hsr_slave_1 07:42:16 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:16 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x40141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) ftruncate(r1, 0x20fffe) 07:42:16 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:wireless_device_t:s0\x00', 0x27, 0x0) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) 07:42:16 executing program 0: mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 07:42:16 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40)}}, {{0x0, 0x0, &(0x7f0000000040)}}], 0x2, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:42:16 executing program 2: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 07:42:16 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:16 executing program 0: add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) 07:42:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf={0x100, &(0x7f0000000200)="bfb2be22a40355032c2d1faf7b202eac3b3c6ea7f8ce0fd7ec70fc5e4068bec28a245644c107a0ea3a4e5fa13386ea12bcbeeff615b8be0d8d48aed9cb946a91f8123bb79e6e1d2a4799fe6403c82c037054e9c3160337853631c915ae84735b04d3f404f6ce4b95c214106bf86e091cc53b8ece4ffd6ce4e63d2ee4b7e170e849c87ca6d91dc898039e4db80c78a6a807cfb048da91723de417f7b64e3ed5cfed2f311099510b711506c10e39607de1a222cec216ac9ae7e7bd95ee627f14edaaef2fd8d95e8c3e98fe6f4f8cd05d332fb253be31464a46ea1d1f3bd3aa0f02fa6ebb92c85a805c6790045d486f205a5be160c03cf7aafd59df0a4cfb743a9d"}) [ 690.734913] device lo entered promiscuous mode 07:42:16 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) 07:42:17 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(0x0, 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:17 executing program 2: io_setup(0x7135, &(0x7f0000000000)) 07:42:17 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{0x0, 0x0, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x8, &(0x7f0000000100)='N', 0x1) getsockopt$inet_opts(r0, 0x0, 0x400000000000009, &(0x7f0000937fed)=""/16, &(0x7f0000000080)=0x10) 07:42:17 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x100000000a, &(0x7f00000001c0)=0x3, 0x19f) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000480)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c) 07:42:17 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000005c0)={'vlan0\x00', 0xd803}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'vlan0\x00\x00\xf6\xff\xff\xff\xff\xff\xff\xff\x00', {0x2, 0x0, @local}}) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) 07:42:17 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40)}}, {{0x0, 0x0, &(0x7f0000000040)}}], 0x2, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:42:17 executing program 0: capset(&(0x7f0000000200)={0x19980330}, &(0x7f0000000080)) socket$packet(0x11, 0x0, 0x300) 07:42:17 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(0x0, 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:17 executing program 2: syz_open_procfs(0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:42:17 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{0x0, 0x0, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:17 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000080)={0x0, {{0x2, 0x0, @broadcast}}}, 0x84) 07:42:17 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) linkat(r0, &(0x7f00000004c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x1400) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r2) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000380)) r3 = creat(&(0x7f0000000a40)='./bus\x00', 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x29, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) truncate(&(0x7f0000000300)='./bus\x00', 0xa00) mount(&(0x7f0000000080)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./bus\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x400, &(0x7f00000001c0)='\x00') r4 = open(&(0x7f0000000000)='./bus\x00', 0x26880, 0x0) lseek(r3, 0x20000010000, 0x2) sendfile(r3, r4, 0x0, 0x7fffffff) sendfile(r3, r4, &(0x7f0000000040), 0x8000fffffffe) creat(&(0x7f0000000280)='./bus\x00', 0x0) fchdir(0xffffffffffffffff) 07:42:17 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(0x0, 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:17 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 07:42:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000140)=@filename='./file0\x00', &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) 07:42:17 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{0x0, 0x0, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:17 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000100)={0x0, {0x0, 0x0, 0x8, 0x0, 0x57}}) 07:42:18 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000140)}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:42:18 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000005a00)='memory.events\x00', 0x26e1, 0x0) 07:42:18 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(0x0, &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:18 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:18 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000200), 0x135) 07:42:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r0, 0x300, 0x0, 0x0, 0x0) 07:42:18 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000000)={0x7}, 0x7) fcntl$setstatus(r1, 0x4, 0x4002) io_setup(0xc32c, &(0x7f0000000080)=0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000040000/0x1000)=nil, 0x1000, 0xb, 0x12, r3, 0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 07:42:18 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000012c0)='/dev/loop#\x00', 0xffff, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000001340)) 07:42:18 executing program 2: r0 = msgget$private(0x0, 0x12c) msgrcv(r0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1, 0x0, 0x1000) msgctl$IPC_STAT(r0, 0x2, &(0x7f00000005c0)=""/133) 07:42:18 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(0x0, &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:18 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x4}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair(0x3, 0x80000, 0xff, &(0x7f00000014c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f0000001500), 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000080)={'lo\x00', {0x2, 0x4e24, @empty}}) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r4 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r4, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, 0x0, 0x4000000) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r5, &(0x7f0000007e00), 0x26e, 0x0) sendmmsg(r5, &(0x7f000000ac80), 0x400000000000302, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20008000}, 0xc, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x80) ioctl(r0, 0x8000001000008912, &(0x7f0000000000)="11dca505ba583bcb7bf0") r6 = socket$inet(0x10, 0x2, 0x0) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f00000013c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r6, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000001680)={&(0x7f0000001640)={0x30, r7, 0x100, 0x70bd27, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x800}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}]}, 0x30}}, 0x44004) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r6, 0x0, 0x41, &(0x7f0000000140)={'security\x00', 0x2, [{}, {}]}, 0x48) write$cgroup_int(r8, &(0x7f0000000100)=0x1f, 0x12) sendmsg(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f00000001c0)="53b40ae82abdf8487a328dafcfecf4", 0xf}, {&(0x7f0000000200)="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", 0xfde}, {&(0x7f0000001200)="b12735a9c3674f62cf2fb14de338ad8923a842ff579ca4bb8ec98ebbbf854052049d243053bc859056daca07a54fbde3a8c9eb2ca4d4a10ffe2c54601db2992af3dc99ed931f481f690fe4ba4936b29c771cf328c0895f9e5344e0c8a5f0771c6310704138987ab7a30c4b95ee543fc1f5871e0718b0ab7589ea3004e3d89e8626e96f692f", 0x85}, {&(0x7f00000012c0)="90d2addf3bf389b5bed82268efc74bfb3d9e375552bd7a5481d0a7620207a03d285d602beb2d0cd68bc0179c1af75edfdc2a7fb87afd6bcb728bb11bb5ee364c787314be67a47bb511735e9cfcc0f58cb0eccf34f82b81c7b7f6ea4ce658b678450b04f4664962ac1c88ebb9b0e06ef8fdf5b5ce235534776ecaca93dab09f9d3d9e12a753e2396c504df00d10a58f9b72700d47893f7a2c3cfd07df420b03c945b2eeca87f72af75158132e6a0c4196e48a229ecc07a3", 0xb7}, {&(0x7f0000001380)="de51ea449d9bb6fb3376e4", 0xb}, {&(0x7f00000013c0)}, {&(0x7f0000001400)="2b76f4fcc34d2f4b764095571e6c84237565c36c536fcbedc848ccd4f24585", 0x1f}, {&(0x7f0000001440)}, {&(0x7f0000001540)="6e3d9fe292c556ccf3fe7c2eaeed1f7bc6ae837b110a7efa1cfd87ac4d891ed89069b6a8fa6e333a227f6d892096920d", 0x30}], 0x9}, 0x0) [ 692.856272] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=48426 sclass=netlink_route_socket pig=32491 comm=syz-executor.0 07:42:19 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000140)}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:42:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1000080002, 0x100000000000088) bind$inet6(r1, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r2 = socket$inet6(0xa, 0x802, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) recvmmsg(r1, &(0x7f0000006400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 07:42:19 executing program 3: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) syz_genetlink_get_family_id$tipc(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_read_part_table(0x75f, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)}, {&(0x7f0000000140)="82baa8c4040e35de82195df4166fbddaaea511770ea6a226fb27bb2789a40435b9216e11664fb8c13f393bbd968175a0fb7a84d93e597e6084b27d79de398563484ebea047781e73000e705538", 0x4d, 0x6}, {0x0}, {&(0x7f0000000240), 0x0, 0x80000001}]) 07:42:19 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(0x0, &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:19 executing program 0: r0 = socket$unix(0x1, 0x805, 0x0) connect$unix(r0, &(0x7f0000000000)=@abs={0x1, 0x0, 0x4e24}, 0x6e) 07:42:19 executing program 0: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a1100008f2cd6cc62e13f10a5f31a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0fafa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvmmsg(r0, &(0x7f00000071c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff74, 0x4000000000000}}, {{0x0, 0x0, 0x0}}], 0x216, 0x0, 0x0) 07:42:19 executing program 5: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="c703f2ac6b1df827c0b1ef1061cfe037f7ed7595af884494eb00c218000000000000005e199daeaffa889b4ebb979d074c66d5d02abd3f7e0bc7df0bfda01967f0e920ef399db300bd76dc7c1e2ae0a40e4ee192c3effb4344ee1b9ad8057a35a2ce9a4811c80c568cd744116eb666af5c1b646143ae8ee99d094ae702c1f11273487c2cf323c46d02e528cf9c903913"], 0x1a000) 07:42:19 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0800a1695e1dcfe87b1071") r1 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="24000000700007041dfffd946f6105000a0081001f0000000400080903001f000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 07:42:19 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r1, &(0x7f0000000100), 0xfffffffffffffff4, 0x0, 0x0, 0x2cc) splice(r1, 0x0, r0, 0x0, 0x11001, 0x0) [ 693.569804] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=112 sclass=netlink_route_socket pig=32525 comm=syz-executor.2 [ 693.590790] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 07:42:19 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r0) close(r1) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept(r2, 0x0, 0x0) close(r2) close(r1) [ 693.779663] audit: type=1804 audit(1567410139.862:6674): pid=32539 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/670/bus" dev="sda1" ino=18046 res=1 07:42:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0800a1695e1dcfe87b1071") r1 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="24000000700007041dfffd946f6105000a0081001f0000000400080903001f000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 07:42:20 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0x20007ffc) 07:42:20 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000140)}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:42:20 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) [ 694.241199] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=112 sclass=netlink_route_socket pig=32556 comm=syz-executor.2 [ 694.255194] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 07:42:20 executing program 0: 07:42:20 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f0000001640)=""/247, 0x140a8885}], 0x1, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40000000000611, 0x0) fcntl$setstatus(r0, 0x4, 0x80) pwritev(r0, &(0x7f00000003c0), 0x1df, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r1, &(0x7f0000001480)={&(0x7f0000000180)=ANY=[@ANYBLOB="70012e2f66696c6530001a8d9d173923a4b08a07ded7048805ccf7567879b33ba7004e389c015eb0805f9f479f871cc5182c5b156e98f6d8ec2d9ab0c9e69352ada132d53ab0a9fdd22b7cd09cdbe8caa93329f35c74a862842c5d3296c12f8240244bf674fb529bcf4ac0fb07a354391a46cc27acaa0757a7cffd2b6f7fca04c1e84f4b7c9918a331a31fba2bd09fac2156cc7091b3b2c073d9aefab0cc0c7a161da284173f76dfcb1cc1355f"], 0xa, 0x0}, 0x0) sendmsg$unix(r1, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) 07:42:20 executing program 0: 07:42:20 executing program 5: 07:42:22 executing program 3: 07:42:22 executing program 2: 07:42:22 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:22 executing program 5: 07:42:22 executing program 0: 07:42:22 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000140)}}], 0x2, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:42:22 executing program 2: 07:42:22 executing program 5: 07:42:22 executing program 0: 07:42:22 executing program 5: [ 696.649523] audit: type=1804 audit(1567410142.732:6675): pid=32588 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/672/bus" dev="sda1" ino=16617 res=1 07:42:22 executing program 2: 07:42:22 executing program 3: 07:42:22 executing program 5: 07:42:22 executing program 0: 07:42:23 executing program 3: 07:42:23 executing program 2: 07:42:23 executing program 5: 07:42:23 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:23 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000140)}}], 0x2, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:42:23 executing program 0: 07:42:23 executing program 5: 07:42:23 executing program 3: 07:42:23 executing program 2: 07:42:23 executing program 3: 07:42:23 executing program 5: 07:42:23 executing program 0: 07:42:23 executing program 2: 07:42:23 executing program 0: 07:42:23 executing program 5: [ 697.516591] audit: type=1804 audit(1567410143.582:6676): pid=32624 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/673/bus" dev="sda1" ino=16594 res=1 07:42:24 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 698.146261] audit: type=1804 audit(1567410144.232:6677): pid=32647 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/674/bus" dev="sda1" ino=16881 res=1 07:42:24 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000140)}}], 0x2, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:42:24 executing program 5: 07:42:24 executing program 2: 07:42:24 executing program 3: 07:42:24 executing program 0: 07:42:24 executing program 5: 07:42:24 executing program 2: 07:42:24 executing program 3: 07:42:24 executing program 0: 07:42:24 executing program 5: 07:42:24 executing program 2: 07:42:24 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, 0x0, &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r3 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r3, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 698.837698] audit: type=1804 audit(1567410144.922:6678): pid=32673 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/675/bus" dev="sda1" ino=16737 res=1 07:42:25 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:42:25 executing program 0: 07:42:25 executing program 3: 07:42:25 executing program 5: 07:42:25 executing program 2: 07:42:25 executing program 3: 07:42:25 executing program 5: 07:42:25 executing program 0: 07:42:25 executing program 2: 07:42:25 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, 0x0, &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r3 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r3, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:25 executing program 3: 07:42:25 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:42:25 executing program 2: 07:42:25 executing program 5: 07:42:25 executing program 0: 07:42:25 executing program 2: 07:42:25 executing program 3: 07:42:25 executing program 5: 07:42:25 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:42:25 executing program 3: 07:42:25 executing program 0: [ 699.545876] audit: type=1804 audit(1567410145.622:6679): pid=32701 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/676/bus" dev="sda1" ino=17153 res=1 07:42:26 executing program 2: 07:42:26 executing program 5: 07:42:26 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) 07:42:26 executing program 3: 07:42:26 executing program 0: 07:42:26 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, 0x0, &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r3 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r3, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:26 executing program 2: 07:42:26 executing program 5: 07:42:26 executing program 3: 07:42:26 executing program 0: 07:42:26 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) 07:42:26 executing program 2: 07:42:26 executing program 5: 07:42:26 executing program 3: [ 700.264798] audit: type=1804 audit(1567410146.352:6680): pid=32731 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/677/bus" dev="sda1" ino=17314 res=1 07:42:26 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r3 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r3, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:26 executing program 2: 07:42:26 executing program 0: 07:42:26 executing program 5: 07:42:26 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) 07:42:26 executing program 3: 07:42:26 executing program 2: 07:42:26 executing program 5: 07:42:26 executing program 3: 07:42:26 executing program 0: 07:42:26 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) 07:42:26 executing program 2: [ 700.565637] audit: type=1804 audit(1567410146.652:6681): pid=32760 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/678/bus" dev="sda1" ino=17121 res=1 07:42:27 executing program 0: 07:42:27 executing program 5: 07:42:27 executing program 3: 07:42:27 executing program 2: 07:42:27 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r3 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r3, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:27 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) 07:42:27 executing program 2: 07:42:27 executing program 5: 07:42:27 executing program 3: 07:42:27 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) 07:42:27 executing program 0: 07:42:27 executing program 2: 07:42:27 executing program 3: 07:42:27 executing program 0: 07:42:27 executing program 5: 07:42:27 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 07:42:27 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r3 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r3, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:27 executing program 3: 07:42:27 executing program 5: 07:42:27 executing program 2: 07:42:27 executing program 0: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x80000000000000bd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000004680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40010022, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_GET(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 07:42:27 executing program 5: r0 = getpid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x8000, 0x6df3}, 0x3c) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 07:42:27 executing program 1: r0 = getpid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x8000, 0x6df3}, 0x3c) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 07:42:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r1, &(0x7f0000000040)={0x2, 0x1004e20, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 701.583121] audit: type=1804 audit(1567410147.662:6682): pid=344 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/680/bus" dev="sda1" ino=17394 res=1 07:42:27 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x8000, 0x6df3}, 0x3c) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:42:27 executing program 2: write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="00038aa174036ed7e05776cacbebb7357c"], 0x11) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r1, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 07:42:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x21f) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000080)={0x0, 0xa9f12b630e4d5466}) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:42:28 executing program 2: openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) 07:42:28 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:28 executing program 2: socket$unix(0x1, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) lseek(0xffffffffffffffff, 0x0, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, &(0x7f00000001c0)) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={0x0, 0x9}, 0x8) ioctl$VIDIOC_OVERLAY(r2, 0x4004560e, 0x0) 07:42:28 executing program 3: r0 = getpid() ptrace$setregs(0xffffffffffffffff, r0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x8000, 0x6df3, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x3c) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000200), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 07:42:28 executing program 5: getpriority(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) select(0x0, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0xfff}, &(0x7f0000000100), &(0x7f0000000140)={0x0, 0x2710}) [ 702.440620] audit: type=1804 audit(1567410148.512:6683): pid=396 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/681/bus" dev="sda1" ino=17793 res=1 07:42:28 executing program 0: getpriority(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) select(0x0, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0xfff}, &(0x7f0000000100), &(0x7f0000000140)={0x0, 0x2710}) 07:42:28 executing program 5: getpriority(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) select(0x0, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0xfff}, &(0x7f0000000100), &(0x7f0000000140)={0x0, 0x2710}) 07:42:28 executing program 2: getpriority(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) select(0x0, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0xfff}, &(0x7f0000000100), &(0x7f0000000140)={0x0, 0x2710}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r0, 0x0}, 0x10) geteuid() 07:42:28 executing program 5: socketpair$unix(0x1, 0x900000001, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) shutdown(r0, 0x0) 07:42:28 executing program 1: r0 = getpid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x8000, 0x6df3, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x3c) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 07:42:28 executing program 0: r0 = getpid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x3c) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 07:42:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x43c) write$cgroup_pid(r0, &(0x7f0000000000), 0xc3200) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000100), 0x4) 07:42:28 executing program 2: getpriority(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) select(0x0, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0xfff}, &(0x7f0000000100), &(0x7f0000000140)={0x0, 0x2710}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r0, 0x0}, 0x10) geteuid() 07:42:29 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:29 executing program 2: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f00000000c0)) 07:42:29 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x5000000) 07:42:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) prctl$PR_SET_PDEATHSIG(0x1, 0x0) getresgid(&(0x7f0000000940), 0x0, 0x0) getresuid(&(0x7f00000020c0), &(0x7f0000002100), 0x0) 07:42:29 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000a40)) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f00000005c0)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) write$uinput_user_dev(r0, &(0x7f0000000b40)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\xfb\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\xfa\xff\xff\xff\x00'}, 0x45c) [ 703.275133] audit: type=1804 audit(1567410149.352:6684): pid=442 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/682/bus" dev="sda1" ino=16737 res=1 07:42:29 executing program 5: perf_event_open(&(0x7f0000000500)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 703.329103] input: syz1 as /devices/virtual/input/input20 07:42:29 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x20000004e20, @broadcast}, 0x10) 07:42:29 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 703.374690] audit: type=1400 audit(1567410149.442:6685): avc: denied { map } for pid=440 comm="syz-executor.3" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=139667 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 07:42:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sync() 07:42:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') 07:42:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000000c80)={0x8, "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", 0x2b6}, 0x1006) sendfile(r1, r1, &(0x7f0000000240), 0x2008000fffffffe) 07:42:30 executing program 1: r0 = getpid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x8000, 0x6df3, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x3c) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 07:42:30 executing program 0: r0 = getpid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x3c) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 07:42:30 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:30 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0xc0189436, 0x7fdfffffeffb) 07:42:30 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$lock(r0, 0x5, &(0x7f0000000140)) 07:42:30 executing program 2: socket$unix(0x1, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0xfffffffffffffffa) add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0x0) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r1 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r1, 0x0, 0x40d09) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 07:42:30 executing program 3: socket$packet(0x11, 0x0, 0x300) write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$P9_RLCREATE(r0, &(0x7f0000000300)={0x18}, 0x18) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 704.238324] audit: type=1804 audit(1567410150.322:6686): pid=491 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/683/bus" dev="sda1" ino=16689 res=1 [ 704.399644] audit: type=1804 audit(1567410150.482:6687): pid=496 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir713828339/syzkaller.gpy8EF/1081/bus" dev="sda1" ino=16641 res=1 07:42:30 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x7fffffef, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}) 07:42:30 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 07:42:31 executing program 5: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) r1 = dup(r0) write$FUSE_DIRENT(r1, &(0x7f0000000140)={0x10}, 0x10) 07:42:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = creat(&(0x7f0000000340)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r1, 0x0, 0x5e89, 0xfff3) open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) 07:42:31 executing program 4: socket$unix(0x1, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000340)) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000280)={r2, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r3 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r1, 0x0, 0x2) sendfile(r1, r3, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 705.116089] audit: type=1804 audit(1567410151.202:6688): pid=525 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir713828339/syzkaller.gpy8EF/1081/bus" dev="sda1" ino=16641 res=1 [ 705.178336] audit: type=1804 audit(1567410151.262:6689): pid=521 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/684/bus" dev="sda1" ino=16655 res=1 [ 705.284577] audit: type=1804 audit(1567410151.262:6690): pid=501 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir713828339/syzkaller.gpy8EF/1081/bus" dev="sda1" ino=16641 res=1 07:42:31 executing program 1: socket$unix(0x1, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r1 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r1, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={0x0, 0x9}, 0x8) 07:42:31 executing program 5: r0 = getpid() ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x8000}, 0x3c) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000200), &(0x7f0000000240)=0xad) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 07:42:31 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000002c0)="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", 0x1ab, 0x55}]) 07:42:31 executing program 2: socket$unix(0x1, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0xfffffffffffffffa) add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0x0) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r1 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r1, 0x0, 0x40d09) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 07:42:31 executing program 0: r0 = getpid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x3c) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 705.551439] audit: type=1804 audit(1567410151.632:6691): pid=544 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir720810270/syzkaller.5PbbR4/648/bus" dev="sda1" ino=16738 res=1 [ 705.640194] Dev loop3: unable to read RDB block 1 [ 705.662072] loop3: unable to read partition table [ 705.696328] loop3: partition table beyond EOD, truncated [ 705.710143] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 705.830892] Dev loop3: unable to read RDB block 1 [ 705.836130] loop3: unable to read partition table 07:42:32 executing program 4: socket$unix(0x1, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000340)) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000280)={r2, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r3 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r1, 0x0, 0x2) sendfile(r1, r3, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 705.864613] audit: type=1804 audit(1567410151.712:6692): pid=543 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir713828339/syzkaller.gpy8EF/1082/bus" dev="sda1" ino=16741 res=1 [ 705.879644] loop3: partition table beyond EOD, [ 705.969697] truncated [ 705.984433] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 07:42:32 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000002c0)="9e706bb3a3bf248a7af70e2b23b5c684d9cf10be5bda9de3d021d84e8412d930d8223818d73640b0a57d867f9771b1ee0e0e7e6bcc53e859be97b2b87cb5911a951106e6a7f7523e328a37a6513ad29021faa4644b7cafe8af676645ee15122bde9107da004c10ae6ce8ff3e45803452367fd7929c5d215527068eb0c608b24522f2e5fdfe11b44ee5dea1616c6b7b61dc7b81aed159bd64f8e54b1201a9ed32e03c2ea70d4c04eaded9755e10d7a11bcf7fdd61def14c3978f56dcb46d0a5d6e6975ad2c72a0349a4436f2ff9f42f7169002b6e53c3afee6f75c46370be9cef28f214d4244608fb9ad03bba5440ac57350d7076d135cba3c3df7b463dbfb3f593bfa2fcb1936d8a24eb0371e717586ae8a42ee8bc5001318d060eae4000506437bdae6da8571b70a3f5ea5127c6d4858657786c0068b3a213b4b6d0933ff8631f838cc9d59d877571cbc8ab04ce7c6c532f812590fb9fb8ebe89a1190c992792543e51e355cdab37e5adee19c8d9154a3cf5a44eabc7d45360754970861f00042d865326d844a7cc7ea68e7f9369b28eaf59b92e136d706a615a11a44e224c22b687eebc5ef907cde70b8", 0x1ab, 0x55}]) [ 706.281186] Dev loop3: unable to read RDB block 1 [ 706.325375] loop3: unable to read partition table [ 706.358469] loop3: partition table beyond EOD, truncated [ 706.364248] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 07:42:32 executing program 1: socket$unix(0x1, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r1 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r1, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={0x0, 0x9}, 0x8) 07:42:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x4, 0x353, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000140], 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff020000000d0000000000000088a8736974300000000000000000000000006c6170623000000000000000000000007369743000000000000000000000000074756e6c300000000000000000000000aaaaaaaaaa1fff00ffffffff0180c200000f00000000000000001809000068090000b0090000616d6f6e670000000000000000000000000000000000000000000000000000008008000000000000040000000300000003000000080000003903000000000000800000000008000001000000000000009e030000010400005f0000003f000000008000000400000006000000400000008100000000080000020000005a0700000000000004000000ff0f0000090000000500000009000000ff0f0000add800000100000001000000010000008100000018bb00000500000001000000ff07000003000000fdffffff00080000ff00000004000000000001000700000005000000070000000c0a0000060000000600000001000080ff7f00000500000001000080ff7f0000ac000000070000008e900000080000004a1000000800000006000000ff010000c016000002000000ffffffff05000000ff0700000100000000080000f3000000030000000000008088000000e502000081000000018000000600000005000000008000000500000000000000a48b000000100000b971000044010000b44d000000000000ff0f00001f0000000400000001800000ca00000000100000000000000000ffff0000000004000000080000000200000006000000dc0b000002000000ff0f000001000000ff0f000004000000020000000004000002000000008000008000000009000000000000008600000007000000050000008000000006000000ffffff7f010000000600000000800000720000008100000005000000fbffffff020000000600000004000000000000000100000001000000080000000500000002000000060000008f0000000200000002000000ba7400000100010001000000a80000000300000003000000030000001d11ffff710f00007f000000010001"]}, 0x3cb) r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r1, &(0x7f0000000000)=[{{0x0, 0x7530}}], 0xfe72) 07:42:32 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000002c0)="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", 0x1ab, 0x55}]) [ 706.611458] Dev loop3: unable to read RDB block 1 [ 706.616573] loop3: unable to read partition table [ 706.622175] loop3: partition table beyond EOD, truncated [ 706.635874] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 07:42:32 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000002c0)="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", 0x1ab, 0x55}]) 07:42:32 executing program 4: socket$unix(0x1, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000340)) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000280)={r2, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r3 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r1, 0x0, 0x2) sendfile(r1, r3, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:32 executing program 2: syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) socket$unix(0x1, 0x5, 0x0) pipe(&(0x7f00000004c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) [ 706.891051] Dev loop3: unable to read RDB block 1 [ 706.897480] loop3: unable to read partition table [ 706.908145] loop3: partition table beyond EOD, truncated [ 706.914777] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 07:42:33 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(r1, r0) 07:42:33 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) 07:42:33 executing program 5: socket$unix(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r1 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r1, 0x0, 0x40d09) 07:42:33 executing program 0: r0 = socket(0x11, 0x2, 0x0) setsockopt(r0, 0x107, 0x2000000000001, &(0x7f0000d52ff0)="010000000300000000000000000001cc", 0x10) 07:42:33 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) 07:42:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0, 0x0) 07:42:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0, 0x0) 07:42:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x0, 0x0, &(0x7f00000002c0)) 07:42:33 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) 07:42:33 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r3 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r3, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:33 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x2, &(0x7f0000000100), 0x4) [ 707.803893] kauditd_printk_skb: 6 callbacks suppressed [ 707.803901] audit: type=1804 audit(1567410153.872:6699): pid=629 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/687/bus" dev="sda1" ino=16543 res=1 07:42:34 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000100), 0x4) 07:42:34 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000008c0)={0x2, 0x0, @local}, 0x10) 07:42:34 executing program 3: syz_read_part_table(0x0, 0x0, &(0x7f0000001480)) 07:42:34 executing program 5: socket$unix(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r1 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r1, 0x0, 0x40d09) 07:42:34 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x2, &(0x7f0000000100), 0x4) [ 707.997425] audit: type=1804 audit(1567410154.082:6700): pid=644 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir693504997/syzkaller.L8bSIM/676/bus" dev="sda1" ino=16817 res=1 07:42:34 executing program 3: syz_read_part_table(0x0, 0x0, &(0x7f0000001480)) 07:42:34 executing program 0: socket$unix(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r1 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r1, 0x0, 0x40d09) 07:42:34 executing program 2: socket$unix(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r1 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r1, 0x0, 0x40d09) 07:42:34 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x2, &(0x7f0000000100), 0x4) 07:42:34 executing program 3: syz_read_part_table(0x0, 0x0, &(0x7f0000001480)) [ 708.216481] audit: type=1804 audit(1567410154.082:6701): pid=641 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir693504997/syzkaller.L8bSIM/676/bus" dev="sda1" ino=16817 res=1 [ 708.510610] audit: type=1804 audit(1567410154.262:6702): pid=653 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir693504997/syzkaller.L8bSIM/677/bus" dev="sda1" ino=16776 res=1 07:42:34 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r3 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r3, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:34 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x2, &(0x7f0000000100), 0x4) 07:42:34 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{0x0, 0x0, 0x55}]) 07:42:34 executing program 1: setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x2, &(0x7f0000000100), 0x4) 07:42:34 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{0x0, 0x0, 0x55}]) [ 708.750949] audit: type=1804 audit(1567410154.362:6703): pid=663 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir054914337/syzkaller.wPxmJw/696/bus" dev="sda1" ino=16573 res=1 [ 708.788649] audit: type=1804 audit(1567410154.422:6704): pid=667 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir713828339/syzkaller.gpy8EF/1086/bus" dev="sda1" ino=16575 res=1 [ 708.861087] audit: type=1804 audit(1567410154.872:6705): pid=684 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/688/bus" dev="sda1" ino=16897 res=1 07:42:35 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) recvmmsg(r0, &(0x7f0000000d00)=[{{0x0, 0x0, &(0x7f0000000c00)}}], 0x1, 0x0, 0x0) 07:42:35 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{0x0, 0x0, 0x55}]) 07:42:35 executing program 1: setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x2, &(0x7f0000000100), 0x4) 07:42:35 executing program 0: clone(0x200, 0x0, 0x0, 0x0, 0x0) symlink(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='./file1\x00') mknod(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r1 = dup(r0) read(r0, &(0x7f00000001c0)=""/11, 0x8) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)) r2 = creat(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x6158eb11138685fc) r3 = dup2(r0, r2) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, 0x0) 07:42:35 executing program 2: clone(0x204, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x81050, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x10a) close(r0) execve(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200800000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) open$dir(&(0x7f0000000040)='./file0\x00', 0x841, 0x0) clone(0x3102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, 0x0, 0xcdad466163d9c9bc) 07:42:35 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000040), 0x10) 07:42:35 executing program 1: setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x2, &(0x7f0000000100), 0x4) 07:42:35 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r3 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r3, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:35 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000002c0), 0x0, 0x55}]) 07:42:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x2000021c) sendmsg$unix(r1, &(0x7f0000000b80)={&(0x7f0000000100)=@abs, 0x6e, 0x0}, 0x20008000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/11, 0x4) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)) clone(0x3502001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r3 = dup2(r2, r0) ioctl$sock_SIOCSPGRP(r3, 0x8902, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 07:42:35 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) setsockopt$llc_int(r0, 0x10c, 0x2, &(0x7f0000000100), 0x4) 07:42:35 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) setsockopt$llc_int(r0, 0x10c, 0x2, &(0x7f0000000100), 0x4) 07:42:35 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000002c0), 0x0, 0x55}]) [ 709.661873] audit: type=1804 audit(1567410155.732:6706): pid=746 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/689/bus" dev="sda1" ino=16897 res=1 07:42:35 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) setsockopt$llc_int(r0, 0x10c, 0x2, &(0x7f0000000100), 0x4) 07:42:35 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000002c0), 0x0, 0x55}]) 07:42:36 executing program 0: clone(0x200, 0x0, 0x0, 0x0, 0x0) symlink(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='./file1\x00') mknod(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r1 = dup(r0) read(r0, &(0x7f00000001c0)=""/11, 0x8) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)) r2 = creat(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x6158eb11138685fc) r3 = dup2(r0, r2) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, 0x0) 07:42:36 executing program 1: syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x2, &(0x7f0000000100), 0x4) 07:42:36 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x1, 0xdb0d) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet_mreq(r2, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 07:42:36 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000002c0)="9e706bb3a3bf248a7af70e2b23b5c684d9cf10be5bda9de3d021d84e8412d930d8223818d73640b0a57d867f9771b1ee0e0e7e6bcc53e859be97b2b87cb5911a951106e6a7f7523e328a37a6513ad29021faa4644b7cafe8af676645ee15122bde9107da004c10ae6ce8ff3e45803452367fd7929c5d215527068eb0c608b24522f2e5fdfe11b44ee5dea1616c6b7b61dc7b81aed159bd64f8e54b1201a9ed32e03c2ea70d4c04eaded9755e10d7a11bcf7fdd61def14c3978f56dcb46d0a5d6e6975ad2c72a0349a4436f2ff9f42f7169002b6e53c3", 0xd6, 0x55}]) 07:42:36 executing program 1: syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x2, &(0x7f0000000100), 0x4) 07:42:36 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0x10000007c) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) dup2(r0, r1) ioctl$VT_RELDISP(r1, 0x5605) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 07:42:36 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000002c0)="9e706bb3a3bf248a7af70e2b23b5c684d9cf10be5bda9de3d021d84e8412d930d8223818d73640b0a57d867f9771b1ee0e0e7e6bcc53e859be97b2b87cb5911a951106e6a7f7523e328a37a6513ad29021faa4644b7cafe8af676645ee15122bde9107da004c10ae6ce8ff3e45803452367fd7929c5d215527068eb0c608b24522f2e5fdfe11b44ee5dea1616c6b7b61dc7b81aed159bd64f8e54b1201a9ed32e03c2ea70d4c04eaded9755e10d7a11bcf7fdd61def14c3978f56dcb46d0a5d6e6975ad2c72a0349a4436f2ff9f42f7169002b6e53c3", 0xd6, 0x55}]) 07:42:36 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r3 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r3, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:36 executing program 1: syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x2, &(0x7f0000000100), 0x4) 07:42:36 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000002c0)="9e706bb3a3bf248a7af70e2b23b5c684d9cf10be5bda9de3d021d84e8412d930d8223818d73640b0a57d867f9771b1ee0e0e7e6bcc53e859be97b2b87cb5911a951106e6a7f7523e328a37a6513ad29021faa4644b7cafe8af676645ee15122bde9107da004c10ae6ce8ff3e45803452367fd7929c5d215527068eb0c608b24522f2e5fdfe11b44ee5dea1616c6b7b61dc7b81aed159bd64f8e54b1201a9ed32e03c2ea70d4c04eaded9755e10d7a11bcf7fdd61def14c3978f56dcb46d0a5d6e6975ad2c72a0349a4436f2ff9f42f7169002b6e53c3", 0xd6, 0x55}]) [ 710.531599] audit: type=1804 audit(1567410156.612:6707): pid=820 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/690/bus" dev="sda1" ino=16776 res=1 07:42:36 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f0000000100), 0x4) 07:42:36 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000002c0)="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", 0x141, 0x55}]) 07:42:37 executing program 0: clone(0x200, 0x0, 0x0, 0x0, 0x0) symlink(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='./file1\x00') mknod(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r1 = dup(r0) read(r0, &(0x7f00000001c0)=""/11, 0x8) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)) r2 = creat(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x6158eb11138685fc) r3 = dup2(r0, r2) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, 0x0) 07:42:37 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) 07:42:37 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f0000000100), 0x4) 07:42:37 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000002c0)="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", 0x141, 0x55}]) 07:42:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:37 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f0000000100), 0x4) 07:42:37 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 07:42:37 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000002c0)="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", 0x141, 0x55}]) 07:42:37 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r3 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r3, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:37 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x2, 0x0, 0x0) 07:42:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:37 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x2, 0x0, 0x0) [ 711.418722] audit: type=1804 audit(1567410157.502:6708): pid=877 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/691/bus" dev="sda1" ino=17217 res=1 07:42:38 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000ac0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x80000001}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcf}], "", [[], []]}, 0x278) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 07:42:38 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000002c0)="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", 0x176, 0x55}]) 07:42:38 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x2, 0x0, 0x0) 07:42:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:38 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r3 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r3, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:38 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000002c0)="9e706bb3a3bf248a7af70e2b23b5c684d9cf10be5bda9de3d021d84e8412d930d8223818d73640b0a57d867f9771b1ee0e0e7e6bcc53e859be97b2b87cb5911a951106e6a7f7523e328a37a6513ad29021faa4644b7cafe8af676645ee15122bde9107da004c10ae6ce8ff3e45803452367fd7929c5d215527068eb0c608b24522f2e5fdfe11b44ee5dea1616c6b7b61dc7b81aed159bd64f8e54b1201a9ed32e03c2ea70d4c04eaded9755e10d7a11bcf7fdd61def14c3978f56dcb46d0a5d6e6975ad2c72a0349a4436f2ff9f42f7169002b6e53c3afee6f75c46370be9cef28f214d4244608fb9ad03bba5440ac57350d7076d135cba3c3df7b463dbfb3f593bfa2fcb1936d8a24eb0371e717586ae8a42ee8bc5001318d060eae4000506437bdae6da8571b70a3f5ea5127c6d4858657786c0068b3a213b4b6d0933ff8631f838cc9d59d877571cbc8ab04ce7c6c532f812590fb9fb8ebe89a1190c992792543e51e355cdab37e5adee19c8d9154a3cf5a44eabc", 0x176, 0x55}]) 07:42:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:38 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000ac0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x80000001}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcf}], "", [[], []]}, 0x278) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 07:42:38 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000003c00)="2e0000001e000507ed0080648c6394f201315c030a0006402c00000001000080004800000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 07:42:38 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000002c0)="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", 0x176, 0x55}]) 07:42:38 executing program 1: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/relabel\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000100)={'/usr/sbin/cupsd', 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023'}, 0x53) 07:42:38 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x10, 0x4, 0x20000000004, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001100)={r0, &(0x7f0000000100)='u', &(0x7f0000000040)=""/90}, 0x18) 07:42:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:38 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000002c0)="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", 0x191, 0x55}]) 07:42:38 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:38 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) clock_nanosleep(0x9, 0x0, &(0x7f00000001c0)={0x0, r0+30000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 07:42:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:38 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000002c0)="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", 0x191, 0x55}]) 07:42:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) [ 712.849059] kauditd_printk_skb: 5 callbacks suppressed [ 712.849068] audit: type=1400 audit(1567410158.932:6714): avc: denied { wake_alarm } for pid=969 comm="syz-executor.1" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 07:42:39 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000002c0)="9e706bb3a3bf248a7af70e2b23b5c684d9cf10be5bda9de3d021d84e8412d930d8223818d73640b0a57d867f9771b1ee0e0e7e6bcc53e859be97b2b87cb5911a951106e6a7f7523e328a37a6513ad29021faa4644b7cafe8af676645ee15122bde9107da004c10ae6ce8ff3e45803452367fd7929c5d215527068eb0c608b24522f2e5fdfe11b44ee5dea1616c6b7b61dc7b81aed159bd64f8e54b1201a9ed32e03c2ea70d4c04eaded9755e10d7a11bcf7fdd61def14c3978f56dcb46d0a5d6e6975ad2c72a0349a4436f2ff9f42f7169002b6e53c3afee6f75c46370be9cef28f214d4244608fb9ad03bba5440ac57350d7076d135cba3c3df7b463dbfb3f593bfa2fcb1936d8a24eb0371e717586ae8a42ee8bc5001318d060eae4000506437bdae6da8571b70a3f5ea5127c6d4858657786c0068b3a213b4b6d0933ff8631f838cc9d59d877571cbc8ab04ce7c6c532f812590fb9fb8ebe89a1190c992792543e51e355cdab37e5adee19c8d9154a3cf5a44eabc7d45360754970861f00042d865326d844a7cc7ea68e7f9369b28ea", 0x191, 0x55}]) 07:42:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:39 executing program 0: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:42:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) [ 712.996480] audit: type=1804 audit(1567410159.082:6715): pid=984 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/693/bus" dev="sda1" ino=17362 res=1 07:42:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:39 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000002c0)="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", 0x19e, 0x55}]) 07:42:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:39 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x40000002) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffffffffffffff02, 0x0, 0x0, 0xfffffffffffffd37) 07:42:39 executing program 0: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2002002102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:42:39 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:39 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000002c0)="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", 0x19e, 0x55}]) 07:42:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:39 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x0, 0x2}}) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0xb26f71c36f7777cb) 07:42:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:39 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000002c0)="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", 0x19e, 0x55}]) 07:42:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:40 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) [ 713.901929] audit: type=1804 audit(1567410159.982:6716): pid=1048 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/694/bus" dev="sda1" ino=16772 res=1 07:42:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0x1000}], 0x1}, 0x0) 07:42:40 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000002c0)="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", 0x1a5, 0x55}]) 07:42:40 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000600)='./bus\x00', 0x0) listxattr(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)=""/144, 0x90) 07:42:40 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:40 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:40 executing program 0: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) close(r0) 07:42:40 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x1, 0x0, 0x0, 0x3}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x5420, 0x0) 07:42:40 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000002c0)="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", 0x1a5, 0x55}]) 07:42:40 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) [ 714.719186] audit: type=1804 audit(1567410160.802:6717): pid=1102 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/695/bus" dev="sda1" ino=16771 res=1 07:42:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:40 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x21, 0x5086, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:42:40 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) 07:42:41 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000002c0)="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", 0x1a5, 0x55}]) 07:42:41 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:41 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:41 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000002c0)="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", 0x1a8, 0x55}]) 07:42:41 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2806}, [@nested={0x8, 0xa, [@generic="03"]}]}, 0x1c}}, 0x0) 07:42:41 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:41 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) 07:42:41 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:41 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, &(0x7f0000000180)) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000100)=0x1) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) r2 = socket$inet6(0xa, 0x0, 0x6) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000042c0)={{{@in6=@initdev, @in=@empty}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in6=@mcast2}}, &(0x7f00000043c0)=0xe8) sendmmsg$inet6(r2, 0x0, 0x0, 0x50) recvmmsg(r2, &(0x7f0000002bc0)=[{{0x0, 0x0, &(0x7f0000001580)=[{0x0}], 0x1, &(0x7f00000015c0)=""/155, 0x9b}, 0x8}], 0x1, 0x10001, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000080)={0x0, 0x200000022d, 0x0, 0x0, 0x4}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 07:42:41 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000002c0)="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", 0x1a8, 0x55}]) 07:42:41 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$rtc(0x0, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) [ 715.552565] audit: type=1804 audit(1567410161.632:6718): pid=1171 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/696/bus" dev="sda1" ino=16770 res=1 07:42:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:41 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:41 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000002c0)="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", 0x1a8, 0x55}]) 07:42:41 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:41 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000100)=0x1) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) poll(&(0x7f0000000140)=[{}, {r0}, {r0, 0x8100}, {r0}], 0x4, 0xd21f) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000080)={0x0, 0x200000022d, 0x0, 0x0, 0x4}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 07:42:42 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:42 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000002c0)="9e706bb3a3bf248a7af70e2b23b5c684d9cf10be5bda9de3d021d84e8412d930d8223818d73640b0a57d867f9771b1ee0e0e7e6bcc53e859be97b2b87cb5911a951106e6a7f7523e328a37a6513ad29021faa4644b7cafe8af676645ee15122bde9107da004c10ae6ce8ff3e45803452367fd7929c5d215527068eb0c608b24522f2e5fdfe11b44ee5dea1616c6b7b61dc7b81aed159bd64f8e54b1201a9ed32e03c2ea70d4c04eaded9755e10d7a11bcf7fdd61def14c3978f56dcb46d0a5d6e6975ad2c72a0349a4436f2ff9f42f7169002b6e53c3afee6f75c46370be9cef28f214d4244608fb9ad03bba5440ac57350d7076d135cba3c3df7b463dbfb3f593bfa2fcb1936d8a24eb0371e717586ae8a42ee8bc5001318d060eae4000506437bdae6da8571b70a3f5ea5127c6d4858657786c0068b3a213b4b6d0933ff8631f838cc9d59d877571cbc8ab04ce7c6c532f812590fb9fb8ebe89a1190c992792543e51e355cdab37e5adee19c8d9154a3cf5a44eabc7d45360754970861f00042d865326d844a7cc7ea68e7f9369b28eaf59b92e136d706a615a11a44e224c22b687eebc5ef907cde70", 0x1aa, 0x55}]) 07:42:42 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) 07:42:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:42 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:42 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:42 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000100)=0x1) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000080)={0x0, 0x200000022d, 0x0, 0x0, 0x4}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 07:42:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:42 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000002c0)="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", 0x1aa, 0x55}]) 07:42:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) [ 716.349234] audit: type=1804 audit(1567410162.412:6719): pid=1230 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/697/bus" dev="sda1" ino=17441 res=1 07:42:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:42 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)) 07:42:42 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:42 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000002c0)="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", 0x1aa, 0x55}]) 07:42:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:42 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000100)=0x1) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000080)={0x0, 0x200000022d, 0x0, 0x0, 0x4}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 07:42:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:42 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x101, 0x0) prctl$PR_GET_ENDIAN(0x13, 0x0) write$P9_RFLUSH(r0, 0x0, 0x0) [ 716.725269] audit: type=1804 audit(1567410162.802:6720): pid=1268 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/698/bus" dev="sda1" ino=17618 res=1 07:42:42 executing program 0: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c28f5e87a64820546a1ebed56adb3b91e7f1ffd7e4ab56ad8e39808e0b61a0bf7a301ffe8dac0726906da58a5d1ab066f24351eda628769d37cbcb5c0c5d", @ANYRESHEX, @ANYRES32, @ANYRESHEX, @ANYBLOB="e6c55c669eb82eec510100019b3d7280437a7462010000000000000029a741efca04f937d0492482ba837296d961244e2e0c734057548c402cc43b3897cc275fd87f333c960d2bc40dd8ece5ff1b9d9e2afb67443e955f96c787fc8dc4872b0001000000000000f515586de3c101e4f8d1b12b1894ef983d0cfcdfbb1118c5ae060bb6ae2af877735be7b03b5278b53fe125393d6b6adf7f7d0734bc1e5566b4d1447a982f0b0b061ef05d38deddd795e0b31aa0a970cd400a87bbc1f1f150fd7187e3983ed154423401e8cf4e6f92eeed807307663c4c", @ANYRESHEX], 0x0, 0x162}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:42:42 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000002c0)="9e706bb3a3bf248a7af70e2b23b5c684d9cf10be5bda9de3d021d84e8412d930d8223818d73640b0a57d867f9771b1ee0e0e7e6bcc53e859be97b2b87cb5911a951106e6a7f7523e328a37a6513ad29021faa4644b7cafe8af676645ee15122bde9107da004c10ae6ce8ff3e45803452367fd7929c5d215527068eb0c608b24522f2e5fdfe11b44ee5dea1616c6b7b61dc7b81aed159bd64f8e54b1201a9ed32e03c2ea70d4c04eaded9755e10d7a11bcf7fdd61def14c3978f56dcb46d0a5d6e6975ad2c72a0349a4436f2ff9f42f7169002b6e53c3afee6f75c46370be9cef28f214d4244608fb9ad03bba5440ac57350d7076d135cba3c3df7b463dbfb3f593bfa2fcb1936d8a24eb0371e717586ae8a42ee8bc5001318d060eae4000506437bdae6da8571b70a3f5ea5127c6d4858657786c0068b3a213b4b6d0933ff8631f838cc9d59d877571cbc8ab04ce7c6c532f812590fb9fb8ebe89a1190c992792543e51e355cdab37e5adee19c8d9154a3cf5a44eabc7d45360754970861f00042d865326d844a7cc7ea68e7f9369b28eaf59b92e136d706a615a11a44e224c22b687eebc5ef907cde70b8", 0x1ab}]) 07:42:43 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:43 executing program 1: getrandom(&(0x7f0000000080)=""/44, 0xffffffffffffffea, 0x0) r0 = memfd_create(&(0x7f0000000140)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) add_key(&(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = dup(r0) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 716.982532] ptrace attach of "/root/syz-executor.0"[1294] was attempted by "/root/syz-executor.0"[1296] 07:42:43 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:43 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000002c0)="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", 0x1ab}]) 07:42:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000440)={'nr0\x01\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x30a) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 07:42:43 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:43 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c28f5e87a64820546a1ebed56adb3b91e7f1ffd7e4ab56ad8e39808e0b61a0bf7a301ffe8dac0726906da58a5d1ab066f24351eda628769d37cbcb5c0c5d", @ANYRESHEX, @ANYRESOCT, @ANYRES32, @ANYRESHEX, @ANYBLOB="e6c55c669eb82eec510100019b3d7280437a7462010000000000000029a741efca04f937d0492482ba837296d961244e2e0c734057548c402cc43b3897cc275fd87f333c960d2bc40dd8ece5ff1b9d9e2afb67443e955f96c787fc8dc4872b0001000000000000f515586de3c101e4f8d1b12b1894ef983d0cfcdfbb1118c5ae060bb6ae2af877735be7b03b5278b53fe125393d6b6adf7f7d0734bc1e5566b4d1447a982f0b0b061ef05d38deddd795e0b31aa0a970cd400a87bbc1f1f150fd7187e3983ed154423401e8cf4e6f92eeed", @ANYRESHEX], 0x0, 0x173}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:42:43 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:43 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000002c0)="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", 0x1ab}]) [ 717.573071] ptrace attach of "/root/syz-executor.1"[1326] was attempted by "/root/syz-executor.1"[1329] 07:42:43 executing program 1: unshare(0x20000) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1001, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xfffffef6) unlink(&(0x7f0000000400)='./file0\x00') 07:42:43 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) [ 717.654185] audit: type=1804 audit(1567410163.742:6721): pid=1328 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/699/bus" dev="sda1" ino=17441 res=1 07:42:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000440)={'nr0\x01\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x30a) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 07:42:43 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000440)={'nr0\x01\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x30a) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 07:42:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 07:42:44 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:44 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000440)={'nr0\x01\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x30a) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') [ 718.539970] audit: type=1804 audit(1567410164.612:6722): pid=1381 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/700/bus" dev="sda1" ino=16770 res=1 07:42:44 executing program 1: 07:42:44 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:44 executing program 3: 07:42:44 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000440)={'nr0\x01\x00', 0x2}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 07:42:44 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:44 executing program 1: 07:42:44 executing program 3: 07:42:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:45 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000440)={'nr0\x01\x00', 0x2}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') [ 718.908903] audit: type=1804 audit(1567410164.992:6723): pid=1400 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/701/bus" dev="sda1" ino=17441 res=1 07:42:45 executing program 1: 07:42:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:45 executing program 3: 07:42:45 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000440)={'nr0\x01\x00', 0x2}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 07:42:45 executing program 3: 07:42:45 executing program 1: 07:42:45 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:45 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:45 executing program 1: 07:42:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:45 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:45 executing program 3: 07:42:45 executing program 3: 07:42:45 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:45 executing program 1: 07:42:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x30a) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 07:42:45 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:45 executing program 3: 07:42:45 executing program 1: 07:42:46 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:46 executing program 3: [ 719.926378] audit: type=1804 audit(1567410166.002:6724): pid=1487 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/703/bus" dev="sda1" ino=16774 res=1 07:42:46 executing program 1: 07:42:46 executing program 3: 07:42:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x30a) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 07:42:46 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:46 executing program 1: 07:42:46 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:46 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000640)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 07:42:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000080)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/xfrm_stat\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001a0, 0x0) 07:42:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x30a) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 07:42:46 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:46 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000480)={'veth1_to_team\x00', 0x8000}) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000040)={0x7, 0x1b, 0x2}, 0x7) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 07:42:46 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54db", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000440)={'nr0\x01\x00', 0x2}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x30a) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 07:42:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:46 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 720.759719] audit: type=1804 audit(1567410166.842:6725): pid=1535 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/704/bus" dev="sda1" ino=16837 res=1 07:42:46 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54db", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54db", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) [ 720.924098] bond0: Enslaving bond_slave_1 as an active interface with an up link 07:42:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) [ 721.025600] audit: type=1804 audit(1567410167.112:6726): pid=1559 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/705/bus" dev="sda1" ino=17937 res=1 07:42:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000080)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/xfrm_stat\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001a0, 0x0) 07:42:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000440)={'nr0\x01\x00', 0x2}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x30a) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 07:42:47 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000480)={'veth1_to_team\x00', 0x8000}) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000040)={0x7, 0x1b, 0x2}, 0x7) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 07:42:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) [ 721.337817] bond0: Releasing backup interface bond_slave_1 07:42:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000440)={'nr0\x01\x00', 0x2}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x30a) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 07:42:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000080)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/xfrm_stat\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001a0, 0x0) 07:42:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:47 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000480)={'veth1_to_team\x00', 0x8000}) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000040)={0x7, 0x1b, 0x2}, 0x7) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 07:42:47 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) [ 721.818759] bond0: Enslaving bond_slave_1 as an active interface with an up link 07:42:48 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000440)={'nr0\x01\x00', 0x2}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 07:42:48 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) [ 721.893316] audit: type=1804 audit(1567410167.972:6727): pid=1617 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/706/bus" dev="sda1" ino=17449 res=1 07:42:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54db", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:48 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000080)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/xfrm_stat\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001a0, 0x0) [ 722.264956] audit: type=1804 audit(1567410168.342:6728): pid=1638 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/707/bus" dev="sda1" ino=17457 res=1 07:42:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000080)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/xfrm_stat\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001a0, 0x0) 07:42:48 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x20000201}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:48 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000440)={'nr0\x01\x00', 0x2}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 07:42:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54db", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:48 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54db", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:48 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x20000000) 07:42:48 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000440)={'nr0\x01\x00', 0x2}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 07:42:48 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:48 executing program 3: syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500), 0xfffffffffffffd47, 0x0, 0x128, 0x0, 0x1e2}, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000840)=""/143, &(0x7f0000000340)=0x374) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:42:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:48 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x20000000) [ 722.817657] audit: type=1804 audit(1567410168.902:6729): pid=1669 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/709/bus" dev="sda1" ino=16772 res=1 07:42:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'syz_tun\x00\x1d\x00\x00\x00@\x00', &(0x7f0000000200)=ANY=[@ANYBLOB=';']}) 07:42:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000440)={'nr0\x01\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x30a) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 07:42:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:49 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x20000000) 07:42:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8937, &(0x7f0000000100)={'bond0\x00'}) 07:42:49 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80), 0x0, 0x20000000) 07:42:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000440)={'nr0\x01\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x30a) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 07:42:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:49 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r0, 0xffffffff80000000) r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f000051c000)=[{&(0x7f0000000100)="480000001400190d0c004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00000000000000", 0x48}], 0x1) 07:42:49 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x9}, 0x3c) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9bc3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xfffffffffffffffc) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000440)='cpuacct.usage_percpu_user\x00') r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(r1, 0x0, 0x12020) bpf$PROG_LOAD(0x5, &(0x7f000000ba80)={0x0, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="19000000ff0100000000000000000000dca7000010d3c5d3"], &(0x7f00000006c0)='syzkaller\x00', 0x2, 0xfa, &(0x7f0000000700)=""/250, 0x41000, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f000000ba40)={0x2, 0x1, 0x40, 0x100}, 0x10}, 0x70) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x660c, 0x0) perf_event_open$cgroup(0x0, r3, 0x1, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r4) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0xffffffffffffffc0, 0x0, 0x0, 0x1ff, 0x5c10, 0xd, 0x9, 0x9, 0x0, 0x0, 0x0, 0xea4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7, 0x7, 0xf88, 0x0, 0x5, 0x0, 0x7fffffff, 0x5, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x840, 0x100, 0x2, 0x2, 0x7, 0x3ff, 0xd3c7}, 0x0, 0xa, r3, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) 07:42:49 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80), 0x0, 0x20000000) 07:42:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000440)={'nr0\x01\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x30a) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 07:42:49 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:49 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80), 0x0, 0x20000000) 07:42:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9bc3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xfffffffffffffffc) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000440)='cpuacct.usage_percpu_user\x00') socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0xda4fff08) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x660c, 0x0) perf_event_open$cgroup(0x0, r2, 0x0, r1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x80, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r3) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0xffffffffffffffc0, 0x0, 0x0, 0x1ff, 0x5c10, 0xd, 0x9, 0x9, 0x0, 0x0, 0x0, 0xea4f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x4, 0x0, 0x1, 0x4770000000000, 0x0, 0x7fff, 0x7, 0x7, 0xf88, 0x0, 0x5, 0x0, 0x7fffffff, 0x5, 0x0, 0x0, 0x1, @perf_config_ext={0x6, 0x2}, 0x840, 0x100, 0x2, 0x2, 0x7, 0x3ff, 0xd3c7}, 0x0, 0xa, r2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) 07:42:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000440)={'nr0\x01\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x30a) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 07:42:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x1}], 0x2}], 0x4924924924924b1, 0x20000000) 07:42:49 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0}], 0x1, 0x20000000) [ 723.686772] audit: type=1804 audit(1567410169.762:6730): pid=1729 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/710/bus" dev="sda1" ino=16772 res=1 07:42:49 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0}], 0x1, 0x20000000) 07:42:50 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ip6_tables_matches\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 07:42:50 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x20000000) 07:42:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000440)={'nr0\x01\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x30a) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 07:42:50 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0}], 0x1, 0x20000000) 07:42:50 executing program 3: 07:42:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x20000000) 07:42:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r2 = syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r1, r2, 0x0, 0x1) 07:42:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000440)={'nr0\x01\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x30a) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 07:42:50 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x2}], 0x1}], 0x1, 0x20000000) [ 724.596674] audit: type=1804 audit(1567410170.682:6731): pid=1776 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/711/bus" dev="sda1" ino=17445 res=1 07:42:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x20000000) 07:42:50 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ip6_tables_matches\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 07:42:50 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") ppoll(&(0x7f0000000000)=[{r0}, {}], 0x2, 0x0, 0x0, 0x0) 07:42:51 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80), 0x0, 0x20000000) 07:42:51 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)}], 0x1, 0x20000000) 07:42:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x30a) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 07:42:51 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') add_key$user(0x0, 0x0, &(0x7f0000000280)="8d7c8487e09e5ace9d798e612ecd9e0cedea13960bb015d4ef8adf00b3b29ba3d733f1e5d5ef82a451313bf1356d8ae4a3f3beb6b826102ef73e5365c6faa4efcda73120663a7a6d73e62d0f233cec6e049b2e4abff625390e3372cf46bb1a5901e663c5aa2d6a9029c0ed7ab2ecab08acf84e7a08bab0e4f1b188714e2ba5a1810e0a2cade55f4600833f63fe7c4011b383627cd8eab83175baf3ee441835f1992a7af7c1002743d104e59636ee2d688b92a3c30f8b1b05e60be3ee4152faf64396c25b6e3ccf1014a92130cb15399a847b29fdefd11d533ebb451ba7793d313215ffed06de54057baaa2b9941a30f2af91a6b86b70a6188e4006c318e1313027aa239999569977fc58711e34033ba085f4eef8805a21e5cfd50a9d5f8ab5881f8ef9eae2ef1b5f5e0e5cb3d0de5f81fd587afd8101fa2ab33a841ae8a13ef3f8de0dabf68138661bc884d9cf2ecb3495452048b9ec9ea533d07076c2bf", 0x15e, 0xfffffffffffffffd) setgroups(0x54b, &(0x7f0000000180)) pread64(r0, 0x0, 0xf6, 0x5000000) 07:42:51 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ip6_tables_matches\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 07:42:51 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)}], 0x1, 0x20000000) 07:42:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80), 0x0, 0x20000000) 07:42:51 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') add_key$user(0x0, 0x0, &(0x7f0000000280)="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", 0x15e, 0xfffffffffffffffd) setgroups(0x54b, &(0x7f0000000180)) pread64(r0, 0x0, 0xf6, 0x5000000) 07:42:51 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ip6_tables_matches\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 07:42:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x30a) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 07:42:51 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)}], 0x1, 0x20000000) [ 725.452275] audit: type=1804 audit(1567410171.532:6732): pid=1823 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/712/bus" dev="sda1" ino=18067 res=1 07:42:51 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80), 0x0, 0x20000000) 07:42:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x30a) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 07:42:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000006c0)=@broute={'broute\x00', 0x20, 0x1, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000240], 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="00000006"]}, 0x7c) 07:42:51 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}], 0x1, 0x20000000) 07:42:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) 07:42:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0}], 0x1, 0x20000000) 07:42:51 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}], 0x1, 0x20000000) 07:42:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000440)={'nr0\x01\x00'}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x30a) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 07:42:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000006c0)=@broute={'broute\x00', 0x20, 0x1, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000240], 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="00000006"]}, 0x7c) 07:42:51 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 725.824345] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 07:42:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0}], 0x1, 0x20000000) 07:42:52 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8937, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x1, @dev, 'syzkaller1\x00'}}, 0x1e) 07:42:52 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1000000000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000340)={0x0, {0x2, 0x4e22, @remote}, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @empty}, 0x44, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='ip6gretap0\x00', 0x5, 0x7, 0xff}) syz_open_dev$amidi(&(0x7f0000000440)='/dev/amidi#\x00', 0xeb76, 0x1) syz_open_dev$vcsn(0x0, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$vcsn(0x0, 0x0, 0x4000) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000300)=[@mss, @sack_perm, @sack_perm, @timestamp], 0x2000000000000091) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x9, 0x64}, 0x14) shutdown(r0, 0x1) 07:42:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}], 0x1, 0x20000000) 07:42:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0}], 0x1, 0x20000000) 07:42:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000440)={'nr0\x01\x00'}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x30a) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 07:42:52 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(0x0, 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:52 executing program 3: r0 = socket$kcm(0x2c, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, &(0x7f0000002340), 0x20002344) 07:42:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)}], 0x1}], 0x1, 0x20000000) 07:42:52 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1000000000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000340)={0x0, {0x2, 0x4e22, @remote}, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @empty}, 0x44, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='ip6gretap0\x00', 0x5, 0x7, 0xff}) syz_open_dev$amidi(&(0x7f0000000440)='/dev/amidi#\x00', 0xeb76, 0x1) syz_open_dev$vcsn(0x0, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$vcsn(0x0, 0x0, 0x4000) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000300)=[@mss, @sack_perm, @sack_perm, @timestamp], 0x2000000000000091) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x9, 0x64}, 0x14) shutdown(r0, 0x1) 07:42:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x2}], 0x1}], 0x1, 0x20000000) 07:42:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)}], 0x1}], 0x1, 0x20000000) 07:42:52 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1000000000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000340)={0x0, {0x2, 0x4e22, @remote}, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @empty}, 0x44, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='ip6gretap0\x00', 0x5, 0x7, 0xff}) syz_open_dev$amidi(&(0x7f0000000440)='/dev/amidi#\x00', 0xeb76, 0x1) syz_open_dev$vcsn(0x0, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$vcsn(0x0, 0x0, 0x4000) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000300)=[@mss, @sack_perm, @sack_perm, @timestamp], 0x2000000000000091) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x9, 0x64}, 0x14) shutdown(r0, 0x1) 07:42:52 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb12001b403a7d0020e2000000180000000000", 0x2e}], 0x1}, 0x0) 07:42:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x2}], 0x1}], 0x1, 0x20000000) 07:42:52 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(0x0, 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000440)={'nr0\x01\x00'}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x30a) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 07:42:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)}], 0x1}], 0x1, 0x20000000) 07:42:52 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="230000005e0081aee4050c00000f00000000a300001232e0aa73c6bef6d8db51260185", 0x23}], 0x1}, 0x0) 07:42:52 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000480)={'veth1_to_team\x00', 0x8000}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) sendmsg$inet(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000002c0)}], 0x3, &(0x7f00000003c0)=[@ip_retopts={{0x28, 0x0, 0x7, {[@lsrr={0x83, 0x13, 0x9, [@broadcast, @local, @multicast1, @loopback]}, @end, @noop]}}}], 0x28}, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in=@empty}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001a00), 0x1, 0x0, 0x0, 0x841}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r2, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) r3 = fcntl$dupfd(r2, 0x406, 0xffffffffffffffff) write$P9_RSETATTR(r3, &(0x7f0000000040)={0x7, 0x1b, 0x2}, 0x7) ioctl$sock_ifreq(r2, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 07:42:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x2}], 0x1}], 0x1, 0x20000000) 07:42:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00', 0x1}], 0x1}], 0x1, 0x20000000) 07:42:52 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(0x0, 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 726.518372] audit: type=1804 audit(1567410172.602:6733): pid=1944 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/716/bus" dev="sda1" ino=17441 res=1 07:42:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x2}, {0x0}], 0x2}], 0x1, 0x20000000) 07:42:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 726.592079] bond0: Releasing backup interface bond_slave_1 07:42:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000440)={'nr0\x01\x00', 0x2}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x30a) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 07:42:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x2}, {0x0}], 0x2}], 0x1, 0x20000000) 07:42:52 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x0) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)}], 0x1}], 0x1, 0x20000000) 07:42:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x2400, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb3) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f00000000c0)=0x5ffe) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000080)={0x0, 0x7fffffff}, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f00000005c0)="b86b0000000f23d80f21f835000000900f23f866baf80cb88f72b98def66bafc0cec66c0a0313a000000c4c3d15c1ff30f350f01c3c4e24d96390f009c6a05000000c4c249af4d57b8340000000f23d00f21f8353000000c0f23f8", 0x5b}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:42:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000440)={'nr0\x01\x00', 0x2}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x30a) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 07:42:53 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xfffffef6) lremovexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.upper\x00') unlink(&(0x7f0000000400)='./file0\x00') 07:42:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x2}, {0x0}], 0x2}], 0x1, 0x20000000) 07:42:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)}], 0x1}], 0x1, 0x20000000) 07:42:53 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x0) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 726.968381] audit: type=1804 audit(1567410173.052:6734): pid=1987 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/718/bus" dev="sda1" ino=17442 res=1 07:42:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x2}, {&(0x7f0000000200)}], 0x2}], 0x1, 0x20000000) 07:42:53 executing program 1: socketpair(0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000140)) socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) r0 = socket$kcm(0x10, 0x400800000000000, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r1, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1e2}, 0x22) recvmsg(r1, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x1) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd0, 0xe8, 0x10000}}, 0x0, 0x1b6}, 0x20) socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x3dc) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x1000000000000005, 0x209e1e, 0x408000000004, 0x1, 0xffffffffffffff9c}, 0x3c) sendmsg$kcm(r0, &(0x7f0000001f40)={&(0x7f00000003c0)=@ax25={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x3}, [@null, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80, &(0x7f0000001bc0)=[{&(0x7f0000000440)="13c3987e44aeb0b7508eed85c67db8565513069d030d0fc393183a3be695f026aa2f80e794378c014b18af0f5b11cabaff571aaf4b3fd5d7560307632ea42fbd640612134284cb259751590b8685add996ae453277603e773e313014314435bf3c40f659b14963e9243ee297774d321a4ac830ec03930c8f82b049edd447340180b11cc2047c78c2f680237b7aaabe7edc43a38295d685c5bbe44d337dd7777f706fa005a7c68edae027ed93ba3fd8334afdda61f83a5f6cb3913a6ce2968d54692ebc7894c615b05e9f7393257972c1d2e1b2dbc674d6c26fbd224d9de59e163f6ea56915ce78f8e559", 0xea}, {&(0x7f0000000580)}, {&(0x7f00000005c0)="c4b0434c36467819729c06fac92ad21fdf4a4d8568ed2d3dafee7afa28759baeb233cd4a031c12f95ff8d76ca126ec8ab738ddc2424bab23d0e32e23bcf8dd6f8b3ce6d93c1341983f80c651098e58065641bdf4338d184dcab907e27274c21fb74305bddc778ecc825ea2aa7460a74d442856bb9a2ed6964e941ac0b12b9725c361587c224bcc67c2491ecfb705d09cb1f2761859535cd1cb89044888ca87f0cb364a27e9fe6ee7f8b884ae94735c4459ff6d9676df9756c5edea681a4fe823f40c3709", 0xc4}, {&(0x7f0000001700)="36aa315fa5a43cdfb1c6658c6d5069b4d1e8c1368bd1ff9077343006114f62b9d47d1d85f71b93376cc7a8a4dc91bc3e4a29181874d37ddc5d14e2487852753d568a5661a2272bdf646b1e6d80e30fdc71ed897e5e621ce1c7a33598db54ffe66053a0adae2109e618ee1f80ebe16d6d7196fe122a403cac8a8b781ccc03255cfa4b4eefac3678b730c8cb0f5a11ec8363b87206fb1765b07e865b6d0412d911622bcadf2c93e55ed5e250c2496b8d2edf5a70e368282db6fc614bc559c8a9f169ae89cf0155a15242554448edb4ae4c187f715879e082", 0xd7}, {&(0x7f0000001800)="cca1c1572f2bb3d5d3ec33edb888ebf7dd498dabb523063951c30b34414df2f39f31e5f7b556d687f6011bac4f0e2563ea66e85397c9fc748dc8d6f2d656297af6518f005df9368231af0ad30501112951f30b8dc724af54a19900a1d91214af6b2a39b31782f92e774b954b4afd4cccb4e7ef3ee14f1e7d77e91be1ff5e2a62457f65ba437c900227f661f5ef714af55fad2da269af45ffc733d32793cbb9faa1fa4660b72fdc2fb84bb00fdf52ecf930e2319a7b1d42549678dacaff3d7ce00c1845a08a06f6ffbe6cd026ea858fc9d3e0d6f14017c151a6c508a22f941109b09ac6667e878dd731dd858f15b76e353e0d08", 0xf3}, {&(0x7f0000001900)="c14dddac8bf93311dd7f3c1e8500f5478c9846c3620839891611b1c1d54e707df56dddb55fa7b0d73f2ffc9b26043981a564dbfc386bdb8f911a495acb13cd4ba56ba2b6b3474475d287bb67883320fe8b45925c80dcc372081cf00eabe35d2ec5bf867a37d55bf6cc477478dc09fcaf1d68d94f2d74fe1d6b131c01a1194b6d47e618df66e5346ef15904be1ccf1617fa4fdd1d8d57c1b0248feeb3d0cf6e14645238b3c7618566a67afc70fd8f5b3e2d6285bf4e675fff92619f7e8c039e0258f5482c1f2dec3c67ce41a9", 0xcc}, {&(0x7f0000001a00)="d1a898b5399f05a963a89a4e8dfb557dfbf3807e1dceec07b128c562af35d5d8a06b61ff55e61289488231899b7b33d3f01d8bea5b1ec13c9f43e6510b102d026f18103c89e304b063daa98e972f72835800fe9e41dac7b8b810717fb6d3af60d3a8bf4c0a48450685b98ff24607b33219db164844246521d8f0dddfa323750436fa2f3aa30c559986ca17d0a81b3780387efd9e0c3d039c9466d4beb166db0e100398acba67f05d46edaa900124912c02e86f2be5846fc1f0100a4401f9567021f53de8348cb5f45ad1dcbfec11b498138c8717b31064ae", 0xd8}, {&(0x7f0000001b00)="e17eb32dc9a59795014387cd629790f76d07fec4b40b93cefc8661", 0x1b}, {&(0x7f0000001b40)="aefd8cd931a4859830d040dd786a2a38091bb631e715f6f64f2082d11a9f64d4c6ee19b4473fd10efe1b76df12bd5e52a787738f529f851da03295d27d79dd4242232bd0fb3362b020d6d79a6afd14289874c983a68c4b45c4af881753e2412c44e6c1d437ba787a58be6a6f68c54c4882e45255", 0x74}], 0x9, &(0x7f0000001c80)=ANY=[@ANYBLOB="80000000000000001d010000040000002ab8ac863bc0f00df3cdd4391d900d2feae8499842c683d7dcc69c3f667606073555a9107e0cd0c4c00014768cb3a518959300d658047de14d0b6117c79d76ea45b6065e13d266c46b635060fe530b5a651015c6a2168c97f49c7bd12bc7e18d43482031b324591ee3980000000000002000009130114f5ffac28efc45c5859148000000000000000000faffffff5b8e641e103918e2c42fde05704a11fa9800000000000000ff01000009000000cbff2ef27c11cd7f49afa7c3add81c920dd9d300fe2df0452c3d1028db508964b4a1ea84b653356037cf3d40982404cda3f8701eadddb28025f2e339dc7970a3e2a1b8d39a36bba56803f6c7563a7bf7da1dfd2a7f5ef3de7ae8281dfd46eac79374bd29b5b66cfad7dc385c7076740de493882b80b4328323a46b6735c05b481805a6eb8076590050000000000000000901000001000100fb154b075ad6c060bfcb4ca34020949e65c82d697f0a6f069bc8cd2f9c2524cf694360a901c4caeb9650689d812d69314c6a3977efe8ae0890c97200000000080000009c45c73a00f11458f5deb1365e80a1693122f72a209b2c683e8ac5cc91686f205f2710d877297629b1d96e0694dc3dfc5c409f52a298bb5056efcccdf884639e070b687e3c5cb807aaf852faea879811b9775de04e74d7c67ba4453354174d5beacb627a560ba330b5fc3babf635d3b970817cab530cb250286d30bbd25c5832668be6467b61f28f4497ae0b04132175ad13604b03c881d10cd8e047bbfcfbc4b58870b6eff5bac21efc8174e527b09d546518f521e54477027f74e900da4e30972f2275d30fa33972d43fe2e1886091cb0a5fd7b4a20c79e827e169d62041a7c23d75de6f601415b180787a777c0a82ce50491f970e2a7f2ceb5821de000000a8caa2938b82a866530979d1a7d969c7a88f91264b57d54cf2fea9d896f2df3f09"], 0x298}, 0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:42:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)}], 0x1}], 0x1, 0x20000000) 07:42:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000440)={'nr0\x01\x00', 0x2}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x30a) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 07:42:53 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x0) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x2}, {&(0x7f0000000200)}], 0x2}], 0x1, 0x20000000) 07:42:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x2}, {&(0x7f0000000200)}], 0x2}], 0x1, 0x20000000) 07:42:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00', 0x1}], 0x1}], 0x1, 0x0) 07:42:54 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(0x0, 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000440)={'nr0\x01\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 07:42:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x2}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8c", 0x2f}], 0x2}], 0x1, 0x20000000) 07:42:54 executing program 3: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9\xf2XX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa3\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) 07:42:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x0, 0x8}, 0xc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='/\x02ro\x05\x00\x00\x00tap\x00\x89PY7/\x91\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1\xf8\x1d\xb6,\xc99\x96h\xf3\x01\xb3f\x8a\xd0+G\xddC\x9d\xcfE?\x1b\xce\xff;OZ\'E\xf5', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28, &(0x7f0000000040)}, 0x10) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000280)=""/146, 0x92}, {&(0x7f0000000340)=""/235, 0xeb}], 0x2, &(0x7f0000000480)=""/68, 0x44}, 0x40000100) 07:42:54 executing program 1: socketpair(0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000140)) socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) r0 = socket$kcm(0x10, 0x400800000000000, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r1, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1e2}, 0x22) recvmsg(r1, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x1) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd0, 0xe8, 0x10000}}, 0x0, 0x1b6}, 0x20) socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x3dc) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x1000000000000005, 0x209e1e, 0x408000000004, 0x1, 0xffffffffffffff9c}, 0x3c) sendmsg$kcm(r0, &(0x7f0000001f40)={&(0x7f00000003c0)=@ax25={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x3}, [@null, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80, &(0x7f0000001bc0)=[{&(0x7f0000000440)="13c3987e44aeb0b7508eed85c67db8565513069d030d0fc393183a3be695f026aa2f80e794378c014b18af0f5b11cabaff571aaf4b3fd5d7560307632ea42fbd640612134284cb259751590b8685add996ae453277603e773e313014314435bf3c40f659b14963e9243ee297774d321a4ac830ec03930c8f82b049edd447340180b11cc2047c78c2f680237b7aaabe7edc43a38295d685c5bbe44d337dd7777f706fa005a7c68edae027ed93ba3fd8334afdda61f83a5f6cb3913a6ce2968d54692ebc7894c615b05e9f7393257972c1d2e1b2dbc674d6c26fbd224d9de59e163f6ea56915ce78f8e559", 0xea}, {&(0x7f0000000580)}, {&(0x7f00000005c0)="c4b0434c36467819729c06fac92ad21fdf4a4d8568ed2d3dafee7afa28759baeb233cd4a031c12f95ff8d76ca126ec8ab738ddc2424bab23d0e32e23bcf8dd6f8b3ce6d93c1341983f80c651098e58065641bdf4338d184dcab907e27274c21fb74305bddc778ecc825ea2aa7460a74d442856bb9a2ed6964e941ac0b12b9725c361587c224bcc67c2491ecfb705d09cb1f2761859535cd1cb89044888ca87f0cb364a27e9fe6ee7f8b884ae94735c4459ff6d9676df9756c5edea681a4fe823f40c3709", 0xc4}, {&(0x7f0000001700)="36aa315fa5a43cdfb1c6658c6d5069b4d1e8c1368bd1ff9077343006114f62b9d47d1d85f71b93376cc7a8a4dc91bc3e4a29181874d37ddc5d14e2487852753d568a5661a2272bdf646b1e6d80e30fdc71ed897e5e621ce1c7a33598db54ffe66053a0adae2109e618ee1f80ebe16d6d7196fe122a403cac8a8b781ccc03255cfa4b4eefac3678b730c8cb0f5a11ec8363b87206fb1765b07e865b6d0412d911622bcadf2c93e55ed5e250c2496b8d2edf5a70e368282db6fc614bc559c8a9f169ae89cf0155a15242554448edb4ae4c187f715879e082", 0xd7}, {&(0x7f0000001800)="cca1c1572f2bb3d5d3ec33edb888ebf7dd498dabb523063951c30b34414df2f39f31e5f7b556d687f6011bac4f0e2563ea66e85397c9fc748dc8d6f2d656297af6518f005df9368231af0ad30501112951f30b8dc724af54a19900a1d91214af6b2a39b31782f92e774b954b4afd4cccb4e7ef3ee14f1e7d77e91be1ff5e2a62457f65ba437c900227f661f5ef714af55fad2da269af45ffc733d32793cbb9faa1fa4660b72fdc2fb84bb00fdf52ecf930e2319a7b1d42549678dacaff3d7ce00c1845a08a06f6ffbe6cd026ea858fc9d3e0d6f14017c151a6c508a22f941109b09ac6667e878dd731dd858f15b76e353e0d08", 0xf3}, {&(0x7f0000001900)="c14dddac8bf93311dd7f3c1e8500f5478c9846c3620839891611b1c1d54e707df56dddb55fa7b0d73f2ffc9b26043981a564dbfc386bdb8f911a495acb13cd4ba56ba2b6b3474475d287bb67883320fe8b45925c80dcc372081cf00eabe35d2ec5bf867a37d55bf6cc477478dc09fcaf1d68d94f2d74fe1d6b131c01a1194b6d47e618df66e5346ef15904be1ccf1617fa4fdd1d8d57c1b0248feeb3d0cf6e14645238b3c7618566a67afc70fd8f5b3e2d6285bf4e675fff92619f7e8c039e0258f5482c1f2dec3c67ce41a9", 0xcc}, {&(0x7f0000001a00)="d1a898b5399f05a963a89a4e8dfb557dfbf3807e1dceec07b128c562af35d5d8a06b61ff55e61289488231899b7b33d3f01d8bea5b1ec13c9f43e6510b102d026f18103c89e304b063daa98e972f72835800fe9e41dac7b8b810717fb6d3af60d3a8bf4c0a48450685b98ff24607b33219db164844246521d8f0dddfa323750436fa2f3aa30c559986ca17d0a81b3780387efd9e0c3d039c9466d4beb166db0e100398acba67f05d46edaa900124912c02e86f2be5846fc1f0100a4401f9567021f53de8348cb5f45ad1dcbfec11b498138c8717b31064ae", 0xd8}, {&(0x7f0000001b00)="e17eb32dc9a59795014387cd629790f76d07fec4b40b93cefc8661", 0x1b}, {&(0x7f0000001b40)="aefd8cd931a4859830d040dd786a2a38091bb631e715f6f64f2082d11a9f64d4c6ee19b4473fd10efe1b76df12bd5e52a787738f529f851da03295d27d79dd4242232bd0fb3362b020d6d79a6afd14289874c983a68c4b45c4af881753e2412c44e6c1d437ba787a58be6a6f68c54c4882e45255", 0x74}], 0x9, &(0x7f0000001c80)=ANY=[@ANYBLOB="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"], 0x298}, 0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:42:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x2}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8c", 0x2f}], 0x2}], 0x1, 0x20000000) 07:42:54 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(0x0, 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:54 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000600)="d800000018008100e00f80ecdb4cb904021d65ef0b00fe05e8fe55a1bc0005010414140103000000050000000000812fa8000b000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) 07:42:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000440)={'nr0\x01\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 07:42:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x2}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8c", 0x2f}], 0x2}], 0x1, 0x20000000) 07:42:54 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xf3, 0xea, &(0x7f0000000400)="b598a70e98e2172fb388c24aef3800371ae6f55cc275c748eb599ad37fec0a27762dc2edcbbb4546a413fd90fd7f80d9c499dc9c9f45053eb93f792230d805bb40510d875ad7acc66b6fa60aecf867cfef244fe3ef2d5dd93e0711edd1fe608656204215d3b01f534bd9fd54753fee09f7c7b3d11a00038fbe378a4ae7fd0ea79bc3d6d48c66b0cde8590bd1e7e1d2efb19c33f63c67da5123f93e4acee36a3daf454ce1dd782aa0589393ae1153c5e5edc55636b0dadab346037273b52a56b29ad33fbfceb3a9afa0cd71c0ca0dc1eae585e872360b9e5d3b02457ff6de8ca31c0fb3794648a3958e6abf6b1c2a38a273bda7", &(0x7f0000000500)=""/234, 0x7fff}, 0x28) 07:42:54 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12fa0d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = dup(r0) r3 = dup3(r2, r0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="6e614b07000000935744fd94bcd8e37a7b0061317d8d000080c9a169e52b5c00000000000010000000000000000000000000000000001b00000005000000e29c3b2f81ec6228f803000028010000400200007003000070"], 0x1) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f0000000140)) 07:42:54 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00\x99\xe8\x1f\x84\xf5U\xca\x85\'\xe2<\xc2Q\x02\x8a2\'l\xd7\x9e2`m\x1axo_\xf4\xbd\xcau\v\x96\xf5<\xf7r\xed0q\x9e\xbd\xb7\x11\xdb\xb7\xb4\v\xe0\x05\xdfO\x9e\x9eF\x87v\x95\xe4\xe1a\x02u\xdcd\xee2\x1f.\x8c\x9a\xcf7H\x8f\xf2\x8bL\xb2\xf7\v\x05\\\xa2\xc0\xef\xa2n\x84\x8d\xdfF^gVPE\x188\xe7\xd7') sendfile(r0, r1, &(0x7f00004db000)=0x300, 0x400000000000fb) 07:42:54 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(0x0, 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000440)={'nr0\x01\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 07:42:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x2}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776", 0x46}], 0x2}], 0x1, 0x20000000) 07:42:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r4 = syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r3, r4, 0x0, 0x1) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f00000000c0)) 07:42:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x2}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776", 0x46}], 0x2}], 0x1, 0x20000000) 07:42:54 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:54 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000440)={'nr0\x01\x00', 0x2}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 07:42:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x2}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776", 0x46}], 0x2}], 0x1, 0x20000000) 07:42:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r4 = syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r3, r4, 0x0, 0x1) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f00000000c0)) 07:42:54 executing program 3: clone(0x40000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 728.540448] audit: type=1804 audit(1567410174.612:6735): pid=2112 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/724/bus" dev="sda1" ino=16757 res=1 07:42:54 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) 07:42:54 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000440)={'nr0\x01\x00', 0x2}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 07:42:54 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x2}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d", 0x52}], 0x2}], 0x1, 0x20000000) 07:42:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r4 = syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r3, r4, 0x0, 0x1) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f00000000c0)) 07:42:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x2}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d", 0x52}], 0x2}], 0x1, 0x20000000) 07:42:54 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) [ 728.802702] IPVS: ftp: loaded support on port[0] = 21 [ 728.808002] audit: type=1804 audit(1567410174.892:6736): pid=2136 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/725/bus" dev="sda1" ino=16782 res=1 07:42:55 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x5) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) tkill(r1, 0x401004000000016) 07:42:55 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000440)={'nr0\x01\x00', 0x2}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 07:42:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x2}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d", 0x52}], 0x2}], 0x1, 0x20000000) 07:42:55 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) [ 729.441510] IPVS: ftp: loaded support on port[0] = 21 07:42:56 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0xd10c) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) 07:42:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x2}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f0", 0x58}], 0x2}], 0x1, 0x20000000) 07:42:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000440)={'nr0\x01\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x30a) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, 0x0) 07:42:56 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:42:56 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x2}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f0", 0x58}], 0x2}], 0x1, 0x20000000) 07:42:56 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:42:56 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x0) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 730.525383] audit: type=1804 audit(1567410176.602:6737): pid=2204 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/727/bus" dev="sda1" ino=16784 res=1 [ 731.110226] protocol 88fb is buggy, dev hsr_slave_0 [ 731.115335] protocol 88fb is buggy, dev hsr_slave_1 07:42:58 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) dup3(r0, r1, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)) 07:42:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000440)={'nr0\x01\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x30a) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, 0x0) 07:42:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x2}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f0", 0x58}], 0x2}], 0x1, 0x20000000) 07:42:58 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:42:58 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x0) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:58 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0xd10c) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) 07:42:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x2}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f8", 0x5b}], 0x2}], 0x1, 0x20000000) 07:42:58 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:42:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x2}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f8", 0x5b}], 0x2}], 0x1, 0x20000000) 07:42:58 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) 07:42:58 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x0) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:42:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000440)={'nr0\x01\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x30a) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, 0x0) [ 732.310111] protocol 88fb is buggy, dev hsr_slave_0 [ 732.315309] protocol 88fb is buggy, dev hsr_slave_1 [ 732.400448] audit: type=1804 audit(1567410178.482:6738): pid=2248 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/729/bus" dev="sda1" ino=17435 res=1 07:42:58 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@mcast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000000c0)=0xe8) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f0000000400)={@remote, @empty, r2}, 0xc) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000380)={0x0, 0x0, 0x0}) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/status\x00', 0x0, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) clock_gettime(0x6, &(0x7f0000000840)={0x0, 0x0}) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000100)={0x0, 0x8, 0x7fffffff}, 0xc) ppoll(&(0x7f0000000300)=[{r3, 0x41a}], 0x1, &(0x7f0000000140)={0x0, r5+30000000}, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) vmsplice(r3, 0x0, 0x0, 0xb) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000340)={&(0x7f0000000180)='./file0\x00'}, 0x10) fstat(r3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000580)={'nr0\x00', r2}) syz_genetlink_get_family_id$tipc(0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='trusted.overlay.redirect\x00', &(0x7f0000000800)='./file0\x00', 0x8, 0x2) ioctl$KDSKBMODE(r4, 0x4b45, &(0x7f0000000000)=0x100000000) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000440)) write(0xffffffffffffffff, 0x0, 0x0) shutdown(r0, 0x0) 07:42:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x2}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f8", 0x5b}], 0x2}], 0x1, 0x20000000) 07:42:58 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) 07:42:58 executing program 0: syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) 07:42:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x2}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f833", 0x5c}], 0x2}], 0x1, 0x20000000) 07:42:59 executing program 3: 07:42:59 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) 07:42:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x2}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f833", 0x5c}], 0x2}], 0x1, 0x20000000) 07:42:59 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) 07:42:59 executing program 3: 07:42:59 executing program 0: syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) 07:42:59 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 733.256455] audit: type=1804 audit(1567410179.342:6739): pid=2290 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/730/bus" dev="sda1" ino=17427 res=1 07:42:59 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@mcast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000000c0)=0xe8) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f0000000400)={@remote, @empty, r2}, 0xc) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000380)={0x0, 0x0, 0x0}) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/status\x00', 0x0, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) clock_gettime(0x6, &(0x7f0000000840)={0x0, 0x0}) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000100)={0x0, 0x8, 0x7fffffff}, 0xc) ppoll(&(0x7f0000000300)=[{r3, 0x41a}], 0x1, &(0x7f0000000140)={0x0, r5+30000000}, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) vmsplice(r3, 0x0, 0x0, 0xb) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000340)={&(0x7f0000000180)='./file0\x00'}, 0x10) fstat(r3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000580)={'nr0\x00', r2}) syz_genetlink_get_family_id$tipc(0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='trusted.overlay.redirect\x00', &(0x7f0000000800)='./file0\x00', 0x8, 0x2) ioctl$KDSKBMODE(r4, 0x4b45, &(0x7f0000000000)=0x100000000) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000440)) write(0xffffffffffffffff, 0x0, 0x0) shutdown(r0, 0x0) 07:42:59 executing program 0: 07:42:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x2}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f833", 0x5c}], 0x2}], 0x1, 0x20000000) 07:42:59 executing program 3: 07:42:59 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) 07:42:59 executing program 0: 07:42:59 executing program 3: 07:42:59 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) 07:42:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x5d}], 0x1}], 0x1, 0x20000000) 07:42:59 executing program 0: 07:42:59 executing program 3: 07:43:00 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 734.059074] audit: type=1804 audit(1567410180.142:6740): pid=2340 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/731/bus" dev="sda1" ino=17430 res=1 07:43:00 executing program 2: 07:43:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x5d}], 0x1}], 0x1, 0x20000000) 07:43:00 executing program 3: 07:43:00 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:00 executing program 0: 07:43:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x5d}], 0x1}], 0x1, 0x20000000) 07:43:00 executing program 0: 07:43:00 executing program 3: 07:43:00 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:43:00 executing program 0: 07:43:00 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x5d}], 0x2}], 0x1, 0x20000000) 07:43:00 executing program 2: 07:43:00 executing program 3: 07:43:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x5d}], 0x2}], 0x1, 0x20000000) 07:43:00 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:00 executing program 0: [ 734.752763] audit: type=1804 audit(1567410180.842:6741): pid=2366 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/732/bus" dev="sda1" ino=16641 res=1 07:43:00 executing program 2: 07:43:00 executing program 3: 07:43:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x5d}], 0x2}], 0x1, 0x20000000) 07:43:01 executing program 0: 07:43:01 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:01 executing program 2: 07:43:01 executing program 3: 07:43:01 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:43:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x5d}], 0x2}], 0x1, 0x20000000) 07:43:01 executing program 0: 07:43:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x5d}], 0x2}], 0x1, 0x20000000) 07:43:01 executing program 3: 07:43:01 executing program 2: r0 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/user\x00', 0x2, 0x0) write$binfmt_script(r0, 0x0, 0x0) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x80000800000d802}) recvmmsg(r1, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 07:43:01 executing program 0: 07:43:01 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:01 executing program 3: 07:43:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x5d}], 0x2}], 0x1, 0x20000000) [ 735.469958] audit: type=1804 audit(1567410181.552:6742): pid=2410 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/733/bus" dev="sda1" ino=16594 res=1 07:43:01 executing program 0: 07:43:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x5d}], 0x2}], 0x1, 0x20000000) 07:43:02 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:43:02 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:02 executing program 3: 07:43:02 executing program 2: 07:43:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x5d}], 0x2}], 0x1, 0x20000000) 07:43:02 executing program 0: 07:43:02 executing program 3: 07:43:02 executing program 2: 07:43:02 executing program 0: 07:43:02 executing program 1: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r0, 0x540a, 0x3) 07:43:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00', 0x1}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x5d}], 0x2}], 0x1, 0x20000000) 07:43:02 executing program 3: [ 736.174697] audit: type=1804 audit(1567410182.262:6743): pid=2450 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/734/bus" dev="sda1" ino=16617 res=1 07:43:02 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:43:02 executing program 1: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r0, 0x540a, 0x3) 07:43:02 executing program 2: 07:43:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x2}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x5d}], 0x2}], 0x1, 0x0) 07:43:02 executing program 0: 07:43:02 executing program 3: 07:43:02 executing program 1: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r0, 0x540a, 0x3) 07:43:02 executing program 0: 07:43:02 executing program 2: 07:43:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x2}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x5d}], 0x2}], 0x1, 0x0) 07:43:02 executing program 3: 07:43:02 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) [ 736.922463] audit: type=1804 audit(1567410183.002:6744): pid=2480 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/735/bus" dev="sda1" ino=17105 res=1 07:43:03 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:03 executing program 0: 07:43:03 executing program 2: 07:43:03 executing program 3: 07:43:03 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(0xffffffffffffffff, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:43:03 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\x00Z', 0x2}, {&(0x7f0000000200)="31c8e42520d106b2796215c6ed1ffd052ff7331c8541e86d0604e9f50f3b1851b253c377ff052db62e57b14e4e6e8cfb76e9e3e4be15692e8b48f97c16c5c4c3d5e13772a776360f36ea7eb51f4a42e3b61d0c05000000f00139f83365", 0x5d}], 0x2}], 0x1, 0x0) 07:43:03 executing program 2: 07:43:03 executing program 3: 07:43:03 executing program 0: 07:43:03 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:03 executing program 5: [ 737.427313] audit: type=1804 audit(1567410183.512:6745): pid=2510 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/736/bus" dev="sda1" ino=16594 res=1 07:43:03 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r0 = getpid() rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace(0x4206, r0) ptrace$setregset(0x4205, r0, 0x0, 0x0) 07:43:03 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x10020000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) close(r0) 07:43:03 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(0xffffffffffffffff, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:43:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x20000) 07:43:03 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:03 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x10020000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = dup2(r0, r0) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[@ANYRESOCT=0x0], 0x1}}, 0x0) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0xfffffebd) 07:43:03 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:03 executing program 3: r0 = creat(&(0x7f0000000000)='./file1\x00', 0x91) r1 = creat(&(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) dup2(r1, r0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 07:43:03 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(0xffffffffffffffff, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 737.673417] audit: type=1804 audit(1567410183.752:6746): pid=2533 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/737/bus" dev="sda1" ino=17233 res=1 07:43:03 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:03 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x10020000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = dup2(r0, r0) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0xfffffebd) 07:43:03 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) [ 737.830599] audit: type=1804 audit(1567410183.912:6747): pid=2550 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/738/bus" dev="sda1" ino=17041 res=1 07:43:04 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) 07:43:04 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x0) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:43:04 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:04 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x10020000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = dup2(r0, r0) ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x7fff) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0xfffffebd) 07:43:04 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:04 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000180), 0x4) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x10020000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = dup2(r0, r0) ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x7fff) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0xfffffebd) 07:43:04 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x0) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:43:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f00000011c0)=[{&(0x7f0000000000)=""/36, 0x24}], 0x1, 0x6c00000000000000) [ 738.495496] audit: type=1804 audit(1567410184.572:6748): pid=2581 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/739/bus" dev="sda1" ino=17057 res=1 07:43:04 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000100)) 07:43:04 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:04 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000180), 0x4) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x10020000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='syz_tun\x00\x00\x00\x00\x000\x00', 0xfd5a) r1 = dup2(r0, r0) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0xfffffebd) shutdown(r0, 0x1) 07:43:04 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000180), 0x4) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x10020000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = dup2(r0, r0) ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x7fff) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0xfffffebd) 07:43:04 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x0) sendfile(r2, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:43:04 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:04 executing program 2: [ 738.881679] audit: type=1804 audit(1567410184.962:6749): pid=2615 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/741/bus" dev="sda1" ino=17473 res=1 07:43:05 executing program 5: 07:43:05 executing program 2: 07:43:05 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:05 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) clone(0x80a102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit(0x0) 07:43:05 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(0xffffffffffffffff, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:43:05 executing program 3: 07:43:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x8001, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[], 0xffdc) 07:43:05 executing program 5: 07:43:05 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:05 executing program 2: 07:43:05 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(0xffffffffffffffff, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 739.395139] audit: type=1804 audit(1567410185.462:6750): pid=2639 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/742/bus" dev="sda1" ino=17490 res=1 07:43:05 executing program 5: 07:43:05 executing program 2: 07:43:05 executing program 0: 07:43:05 executing program 3: 07:43:05 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:05 executing program 5: 07:43:05 executing program 2: 07:43:05 executing program 3: 07:43:05 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:05 executing program 2: 07:43:05 executing program 0: [ 739.656469] audit: type=1804 audit(1567410185.742:6751): pid=2663 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/743/bus" dev="sda1" ino=17457 res=1 07:43:05 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(0xffffffffffffffff, r4, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:43:05 executing program 5: 07:43:05 executing program 3: 07:43:05 executing program 2: 07:43:05 executing program 5: 07:43:05 executing program 0: 07:43:05 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:05 executing program 3: 07:43:06 executing program 2: 07:43:06 executing program 3: 07:43:06 executing program 0: 07:43:06 executing program 5: 07:43:06 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, 0xffffffffffffffff, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:43:06 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:06 executing program 2: 07:43:06 executing program 5: 07:43:06 executing program 2: 07:43:06 executing program 3: 07:43:06 executing program 0: 07:43:06 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) [ 740.115857] audit: type=1804 audit(1567410186.202:6752): pid=2715 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/745/bus" dev="sda1" ino=17249 res=1 07:43:06 executing program 5: 07:43:06 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, 0xffffffffffffffff, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:43:06 executing program 2: 07:43:06 executing program 0: 07:43:06 executing program 3: 07:43:06 executing program 5: 07:43:06 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400"], 0xe) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:06 executing program 2: [ 740.323354] audit: type=1804 audit(1567410186.202:6753): pid=2710 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/745/bus" dev="sda1" ino=17249 res=1 07:43:06 executing program 0: 07:43:06 executing program 3: 07:43:06 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, 0xffffffffffffffff, 0x0, 0x40d09) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:43:06 executing program 5: 07:43:06 executing program 3: 07:43:06 executing program 0: 07:43:06 executing program 2: 07:43:06 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400"], 0xe) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:06 executing program 5: 07:43:06 executing program 3: 07:43:06 executing program 0: 07:43:06 executing program 2: 07:43:06 executing program 5: 07:43:06 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400"], 0xe) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) [ 740.679514] audit: type=1804 audit(1567410186.762:6754): pid=2767 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/747/bus" dev="sda1" ino=16641 res=1 07:43:06 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340)) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), 0x4) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x5) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x8400, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:43:06 executing program 0: 07:43:06 executing program 3: 07:43:06 executing program 2: 07:43:06 executing program 5: 07:43:06 executing program 3: 07:43:07 executing program 0: 07:43:07 executing program 2: 07:43:07 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c7600"], 0x15) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:07 executing program 5: 07:43:07 executing program 3: [ 740.923862] audit: type=1804 audit(1567410187.002:6755): pid=2796 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir267424256/syzkaller.6FDbTs/748/bus" dev="sda1" ino=16618 res=1 07:43:07 executing program 4: 07:43:07 executing program 2: 07:43:07 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000a40)) 07:43:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd43307c529a4ce6be614c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0x0, 0x16, 0x0, &(0x7f0000000280)=""/22}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400}, 0x28) 07:43:07 executing program 0: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000002d0000000000000000019500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000140)={r0, r1}) 07:43:07 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c7600"], 0x15) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') 07:43:07 executing program 4: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@umask={'umask'}}]}) 07:43:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffd57, 0x20000004, &(0x7f0000b63fe4), 0x1c) 07:43:07 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c7600"], 0x15) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) [ 741.278283] [ 741.280028] ====================================================== [ 741.286344] WARNING: possible circular locking dependency detected [ 741.293180] 4.14.141 #37 Not tainted [ 741.296895] ------------------------------------------------------ [ 741.303214] kworker/u4:1/24468 is trying to acquire lock: [ 741.308743] (sk_lock-AF_INET){+.+.}, at: [] strp_sock_lock+0x2e/0x40 [ 741.316909] [ 741.316909] but task is already holding lock: [ 741.322872] ((&strp->work)){+.+.}, at: [] process_one_work+0x7ab/0x1600 [ 741.331266] [ 741.331266] which lock already depends on the new lock. [ 741.331266] [ 741.339572] [ 741.339572] the existing dependency chain (in reverse order) is: [ 741.347173] [ 741.347173] -> #1 ((&strp->work)){+.+.}: [ 741.352697] lock_acquire+0x16f/0x430 [ 741.356995] flush_work+0xae/0x730 [ 741.361128] __cancel_work_timer+0x2f0/0x480 [ 741.366032] cancel_work_sync+0x18/0x20 [ 741.370503] strp_done+0x58/0xe0 [ 741.374376] kcm_ioctl+0x8d9/0x1120 [ 741.378499] sock_do_ioctl+0x64/0xb0 [ 741.382707] sock_ioctl+0x2a6/0x470 [ 741.386836] do_vfs_ioctl+0x7ae/0x1060 [ 741.391233] SyS_ioctl+0x8f/0xc0 [ 741.395099] do_syscall_64+0x1e8/0x640 [ 741.399502] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 741.405185] [ 741.405185] -> #0 (sk_lock-AF_INET){+.+.}: [ 741.410895] __lock_acquire+0x2cb3/0x4620 [ 741.415556] lock_acquire+0x16f/0x430 [ 741.419855] lock_sock_nested+0xbd/0x110 [ 741.424412] strp_sock_lock+0x2e/0x40 [ 741.428797] strp_work+0x43/0x100 [ 741.432746] process_one_work+0x863/0x1600 [ 741.437480] worker_thread+0x5d9/0x1050 [ 741.441952] kthread+0x319/0x430 [ 741.445817] ret_from_fork+0x24/0x30 [ 741.450024] [ 741.450024] other info that might help us debug this: [ 741.450024] [ 741.458227] Possible unsafe locking scenario: [ 741.458227] [ 741.464264] CPU0 CPU1 [ 741.468904] ---- ---- [ 741.473640] lock((&strp->work)); [ 741.477158] lock(sk_lock-AF_INET); [ 741.483449] lock((&strp->work)); [ 741.489483] lock(sk_lock-AF_INET); [ 741.493181] [ 741.493181] *** DEADLOCK *** [ 741.493181] [ 741.499214] 2 locks held by kworker/u4:1/24468: [ 741.503865] #0: ("%s""kstrp"){+.+.}, at: [] process_one_work+0x76e/0x1600 [ 741.512517] #1: ((&strp->work)){+.+.}, at: [] process_one_work+0x7ab/0x1600 [ 741.521333] [ 741.521333] stack backtrace: [ 741.525807] CPU: 1 PID: 24468 Comm: kworker/u4:1 Not tainted 4.14.141 #37 [ 741.534701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 741.544127] Workqueue: kstrp strp_work [ 741.547994] Call Trace: [ 741.550562] dump_stack+0x138/0x197 [ 741.554167] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 741.559656] __lock_acquire+0x2cb3/0x4620 [ 741.563783] ? trace_hardirqs_on+0x10/0x10 [ 741.568089] ? save_trace+0x290/0x290 [ 741.571879] ? save_trace+0x290/0x290 [ 741.575668] ? lock_sock_nested+0x9e/0x110 [ 741.579883] ? lock_sock_nested+0x9e/0x110 [ 741.584441] lock_acquire+0x16f/0x430 [ 741.589084] ? strp_sock_lock+0x2e/0x40 [ 741.593034] lock_sock_nested+0xbd/0x110 [ 741.597072] ? strp_sock_lock+0x2e/0x40 [ 741.601055] strp_sock_lock+0x2e/0x40 [ 741.604928] strp_work+0x43/0x100 [ 741.608378] process_one_work+0x863/0x1600 [ 741.612598] ? pwq_dec_nr_in_flight+0x2e0/0x2e0 [ 741.617266] worker_thread+0x5d9/0x1050 [ 741.621223] kthread+0x319/0x430 [ 741.624654] ? process_one_work+0x1600/0x1600 07:43:07 executing program 2: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x122d, 0x0, 0x0, 0x0, 0x3a1, 0x0, 0xfffffffffffff192, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) gettid() write$cgroup_int(r0, &(0x7f0000000300)=0xfc9, 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) socketpair(0x0, 0x0, 0x8fe, &(0x7f0000000140)) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10121) bpf$MAP_CREATE(0x0, &(0x7f0000005580)={0x0, 0x653c, 0x6, 0x6, 0x10, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x3c) 07:43:07 executing program 3: perf_event_open(&(0x7f00000005c0)={0x0, 0x70, 0x2, 0xfffffffffffffffa, 0x0, 0x569, 0x0, 0x0, 0x8, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x9, 0x8001, 0x0, 0x0, 0xffffffff, 0x5, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x5, 0x0, 0xe33, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb28}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x122d, 0x0, 0x0, 0x0, 0x3a1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) gettid() write$cgroup_int(r0, &(0x7f0000000300)=0xfc9, 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) socketpair(0x0, 0x0, 0x8fe, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f00000000c0), 0x1802a140) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10121) bpf$MAP_CREATE(0x0, &(0x7f0000005580)={0x0, 0x653c, 0x6, 0x6, 0x10, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x3c) [ 741.629300] ? kthread_create_on_node+0xd0/0xd0 [ 741.633964] ret_from_fork+0x24/0x30 [ 741.654527] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env [ 741.657740] kobject: 'loop2' (ffff8880a49f12a0): kobject_uevent_env [ 741.665855] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' 07:43:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffd57, 0x20000004, &(0x7f0000b63fe4), 0x1c) 07:43:07 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072"], 0x19) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) [ 741.675088] kobject: 'loop2' (ffff8880a49f12a0): fill_kobj_path: path = '/devices/virtual/block/loop2' 07:43:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffd57, 0x20000004, &(0x7f0000b63fe4), 0x1c) [ 741.726814] kobject: 'loop3' (ffff8880a4a181e0): kobject_uevent_env [ 741.732054] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env [ 741.739728] kobject: 'loop3' (ffff8880a4a181e0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 741.739816] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 741.753367] kobject: 'loop5' (ffff8880a4a9a2e0): kobject_uevent_env 07:43:07 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072"], 0x19) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) [ 741.796443] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env [ 741.822574] kobject: 'loop5' (ffff8880a4a9a2e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 741.830726] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 741.840112] kobject: 'loop1' (ffff8880a49849a0): kobject_uevent_env [ 741.848608] kobject: 'loop1' (ffff8880a49849a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 741.880276] kobject: 'loop5' (ffff8880a4a9a2e0): kobject_uevent_env [ 741.888409] kobject: 'loop5' (ffff8880a4a9a2e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 741.910882] kobject: 'loop1' (ffff8880a49849a0): kobject_uevent_env [ 741.922881] kobject: 'loop1' (ffff8880a49849a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 741.937964] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env [ 741.949984] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 741.963436] kobject: 'loop1' (ffff8880a49849a0): kobject_uevent_env [ 741.970332] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env [ 741.977962] kobject: 'loop1' (ffff8880a49849a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 741.987738] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' 07:43:08 executing program 0: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000002d0000000000000000019500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000140)={r0, r1}) 07:43:08 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072"], 0x19) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffd57, 0x20000004, &(0x7f0000b63fe4), 0x1c) 07:43:08 executing program 4: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@umask={'umask'}}]}) [ 741.999744] kobject: 'loop5' (ffff8880a4a9a2e0): kobject_uevent_env [ 742.015051] kobject: 'loop5' (ffff8880a4a9a2e0): fill_kobj_path: path = '/devices/virtual/block/loop5' 07:43:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffd57, 0x20000004, &(0x7f0000b63fe4), 0x1c) 07:43:08 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b502"], 0x1b) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) [ 742.047326] kobject: 'loop0' (ffff888060768520): kobject_uevent_env [ 742.061948] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env [ 742.068600] kobject: 'loop0' (ffff888060768520): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 742.138910] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 742.203131] kobject: 'loop1' (ffff8880a49849a0): kobject_uevent_env [ 742.209855] kobject: 'loop1' (ffff8880a49849a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 742.230971] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env [ 742.237619] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' 07:43:08 executing program 2: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x122d, 0x0, 0x0, 0x0, 0x3a1, 0x0, 0xfffffffffffff192, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) gettid() write$cgroup_int(r0, &(0x7f0000000300)=0xfc9, 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) socketpair(0x0, 0x0, 0x8fe, &(0x7f0000000140)) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10121) bpf$MAP_CREATE(0x0, &(0x7f0000005580)={0x0, 0x653c, 0x6, 0x6, 0x10, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x3c) 07:43:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffd57, 0x20000004, &(0x7f0000b63fe4), 0x1c) 07:43:08 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b502"], 0x1b) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:08 executing program 4: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@umask={'umask'}}]}) 07:43:08 executing program 3: perf_event_open(&(0x7f00000005c0)={0x0, 0x70, 0x2, 0xfffffffffffffffa, 0x0, 0x569, 0x0, 0x0, 0x8, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x9, 0x8001, 0x0, 0x0, 0xffffffff, 0x5, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x5, 0x0, 0xe33, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb28}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x122d, 0x0, 0x0, 0x0, 0x3a1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) gettid() write$cgroup_int(r0, &(0x7f0000000300)=0xfc9, 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) socketpair(0x0, 0x0, 0x8fe, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f00000000c0), 0x1802a140) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10121) bpf$MAP_CREATE(0x0, &(0x7f0000005580)={0x0, 0x653c, 0x6, 0x6, 0x10, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x3c) 07:43:08 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b502"], 0x1b) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) [ 742.593692] kobject: 'loop2' (ffff8880a49f12a0): kobject_uevent_env [ 742.603306] kobject: 'loop2' (ffff8880a49f12a0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 742.619078] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env [ 742.626647] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 742.652404] kobject: 'loop3' (ffff8880a4a181e0): kobject_uevent_env [ 742.667457] kobject: 'loop3' (ffff8880a4a181e0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 742.680322] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env [ 742.686793] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 742.689381] kobject: 'loop1' (ffff8880a49849a0): kobject_uevent_env [ 742.705333] kobject: 'loop1' (ffff8880a49849a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 742.732750] kobject: 'loop5' (ffff8880a4a9a2e0): kobject_uevent_env [ 742.753640] kobject: 'loop5' (ffff8880a4a9a2e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 742.775647] kobject: 'loop1' (ffff8880a49849a0): kobject_uevent_env [ 742.786979] kobject: 'loop1' (ffff8880a49849a0): fill_kobj_path: path = '/devices/virtual/block/loop1' 07:43:08 executing program 0: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000002d0000000000000000019500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000140)={r0, r1}) 07:43:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffd57, 0x20000004, &(0x7f0000b63fe4), 0x1c) 07:43:08 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:08 executing program 2: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x122d, 0x0, 0x0, 0x0, 0x3a1, 0x0, 0xfffffffffffff192, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) gettid() write$cgroup_int(r0, &(0x7f0000000300)=0xfc9, 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) socketpair(0x0, 0x0, 0x8fe, &(0x7f0000000140)) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10121) bpf$MAP_CREATE(0x0, &(0x7f0000005580)={0x0, 0x653c, 0x6, 0x6, 0x10, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x3c) 07:43:08 executing program 4: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@umask={'umask'}}]}) [ 742.802101] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env [ 742.808899] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 742.822078] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env [ 742.829299] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 742.879199] kobject: 'loop0' (ffff888060768520): kobject_uevent_env [ 742.903443] kobject: 'loop0' (ffff888060768520): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 742.909004] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env 07:43:09 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffd57, 0x20000004, &(0x7f0000b63fe4), 0x1c) [ 742.930662] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 742.966517] kobject: 'loop5' (ffff8880a4a9a2e0): kobject_uevent_env 07:43:09 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) [ 742.984305] kobject: 'loop5' (ffff8880a4a9a2e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 743.017274] kobject: 'loop1' (ffff8880a49849a0): kobject_uevent_env [ 743.020978] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env 07:43:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffd57, 0x20000004, &(0x7f0000b63fe4), 0x1c) 07:43:09 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) [ 743.029421] kobject: 'loop1' (ffff8880a49849a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 743.045257] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 743.126893] kobject: 'loop5' (ffff8880a4a9a2e0): kobject_uevent_env [ 743.136777] kobject: 'loop5' (ffff8880a4a9a2e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 743.180982] kobject: 'loop1' (ffff8880a49849a0): kobject_uevent_env [ 743.187441] kobject: 'loop1' (ffff8880a49849a0): fill_kobj_path: path = '/devices/virtual/block/loop1' 07:43:09 executing program 3: perf_event_open(&(0x7f00000005c0)={0x0, 0x70, 0x2, 0xfffffffffffffffa, 0x0, 0x569, 0x0, 0x0, 0x8, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x9, 0x8001, 0x0, 0x0, 0xffffffff, 0x5, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x5, 0x0, 0xe33, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb28}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x122d, 0x0, 0x0, 0x0, 0x3a1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) gettid() write$cgroup_int(r0, &(0x7f0000000300)=0xfc9, 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) socketpair(0x0, 0x0, 0x8fe, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f00000000c0), 0x1802a140) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10121) bpf$MAP_CREATE(0x0, &(0x7f0000005580)={0x0, 0x653c, 0x6, 0x6, 0x10, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x3c) 07:43:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffd57, 0x20000004, &(0x7f0000b63fe4), 0x1c) [ 743.554849] kobject: 'loop3' (ffff8880a4a181e0): kobject_uevent_env [ 743.561567] kobject: 'loop3' (ffff8880a4a181e0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 743.593950] kobject: 'loop2' (ffff8880a49f12a0): kobject_uevent_env [ 743.601110] kobject: 'loop2' (ffff8880a49f12a0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 743.613211] kobject: 'loop5' (ffff8880a4a9a2e0): kobject_uevent_env [ 743.623050] kobject: 'loop5' (ffff8880a4a9a2e0): fill_kobj_path: path = '/devices/virtual/block/loop5' 07:43:09 executing program 0: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000002d0000000000000000019500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000140)={r0, r1}) 07:43:09 executing program 4: syz_mount_image$jfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@umask={'umask'}}]}) 07:43:09 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:09 executing program 2: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x122d, 0x0, 0x0, 0x0, 0x3a1, 0x0, 0xfffffffffffff192, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) gettid() write$cgroup_int(r0, &(0x7f0000000300)=0xfc9, 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) socketpair(0x0, 0x0, 0x8fe, &(0x7f0000000140)) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10121) bpf$MAP_CREATE(0x0, &(0x7f0000005580)={0x0, 0x653c, 0x6, 0x6, 0x10, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x3c) 07:43:09 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffd57, 0x20000004, &(0x7f0000b63fe4), 0x1c) [ 743.741748] kobject: 'loop0' (ffff888060768520): kobject_uevent_env [ 743.754158] kobject: 'loop0' (ffff888060768520): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 743.770583] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env 07:43:09 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:09 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffd57, 0x20000004, &(0x7f0000b63fe4), 0x1c) [ 743.786512] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 743.805543] kobject: 'loop1' (ffff8880a49849a0): kobject_uevent_env [ 743.814480] kobject: 'loop1' (ffff8880a49849a0): fill_kobj_path: path = '/devices/virtual/block/loop1' 07:43:09 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) [ 743.853524] kobject: 'loop5' (ffff8880a4a9a2e0): kobject_uevent_env [ 743.867336] kobject: 'loop5' (ffff8880a4a9a2e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 743.879647] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env [ 743.887354] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' 07:43:10 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffd57, 0x20000004, &(0x7f0000b63fe4), 0x1c) 07:43:10 executing program 4: syz_mount_image$jfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@umask={'umask'}}]}) [ 743.904826] kobject: 'loop1' (ffff8880a49849a0): kobject_uevent_env [ 743.935514] kobject: 'loop1' (ffff8880a49849a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 743.958834] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env [ 743.966077] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 743.988597] kobject: 'loop1' (ffff8880a49849a0): kobject_uevent_env [ 743.997638] kobject: 'loop1' (ffff8880a49849a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 744.008177] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env [ 744.016705] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 744.033476] kobject: 'loop5' (ffff8880a4a9a2e0): kobject_uevent_env [ 744.044770] kobject: 'loop5' (ffff8880a4a9a2e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 744.100402] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env [ 744.107107] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' 07:43:10 executing program 3: perf_event_open(&(0x7f00000005c0)={0x0, 0x70, 0x2, 0xfffffffffffffffa, 0x0, 0x569, 0x0, 0x0, 0x8, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x9, 0x8001, 0x0, 0x0, 0xffffffff, 0x5, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x5, 0x0, 0xe33, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb28}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x122d, 0x0, 0x0, 0x0, 0x3a1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) gettid() write$cgroup_int(r0, &(0x7f0000000300)=0xfc9, 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) socketpair(0x0, 0x0, 0x8fe, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f00000000c0), 0x1802a140) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10121) bpf$MAP_CREATE(0x0, &(0x7f0000005580)={0x0, 0x653c, 0x6, 0x6, 0x10, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x3c) 07:43:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) [ 744.436500] kobject: 'loop3' (ffff8880a4a181e0): kobject_uevent_env [ 744.448584] kobject: 'loop3' (ffff8880a4a181e0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 744.469256] kobject: 'loop1' (ffff8880a49849a0): kobject_uevent_env [ 744.476593] kobject: 'loop1' (ffff8880a49849a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 744.494963] kobject: 'loop2' (ffff8880a49f12a0): kobject_uevent_env [ 744.504102] kobject: 'loop2' (ffff8880a49f12a0): fill_kobj_path: path = '/devices/virtual/block/loop2' 07:43:10 executing program 0: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000002d0000000000000000019500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000140)={r0, r1}) 07:43:10 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffd57, 0x20000004, &(0x7f0000b63fe4), 0x1c) 07:43:10 executing program 4: syz_mount_image$jfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@umask={'umask'}}]}) 07:43:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:10 executing program 2: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x122d, 0x0, 0x0, 0x0, 0x3a1, 0x0, 0xfffffffffffff192, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) gettid() write$cgroup_int(r0, &(0x7f0000000300)=0xfc9, 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) socketpair(0x0, 0x0, 0x8fe, &(0x7f0000000140)) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10121) 07:43:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:10 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffd57, 0x20000004, &(0x7f0000b63fe4), 0x1c) [ 744.598240] kobject: 'loop0' (ffff888060768520): kobject_uevent_env [ 744.607016] kobject: 'loop0' (ffff888060768520): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 744.628922] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env [ 744.643367] kobject: 'loop1' (ffff8880a49849a0): kobject_uevent_env [ 744.653250] kobject: 'loop1' (ffff8880a49849a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 744.662593] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 744.665108] kobject: 'loop5' (ffff8880a4a9a2e0): kobject_uevent_env 07:43:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:10 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffd57, 0x20000004, &(0x7f0000b63fe4), 0x1c) [ 744.704455] kobject: 'loop5' (ffff8880a4a9a2e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 744.730661] kobject: 'loop1' (ffff8880a49849a0): kobject_uevent_env 07:43:10 executing program 4: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@umask={'umask'}}]}) [ 744.747821] kobject: 'loop1' (ffff8880a49849a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 744.800688] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env [ 744.807151] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 744.825827] kobject: 'loop5' (ffff8880a4a9a2e0): kobject_uevent_env [ 744.832494] kobject: 'loop5' (ffff8880a4a9a2e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 744.855058] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env [ 744.862728] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 744.960265] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env [ 744.966942] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' 07:43:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffd57, 0x20000004, &(0x7f0000b63fe4), 0x1c) 07:43:11 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x3) [ 745.258028] kobject: 'loop2' (ffff8880a49f12a0): kobject_uevent_env [ 745.269656] kobject: 'loop2' (ffff8880a49f12a0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 745.290711] kobject: 'loop3' (ffff8880a4a181e0): kobject_uevent_env [ 745.299727] kobject: 'loop3' (ffff8880a4a181e0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 745.318604] kobject: 'loop1' (ffff8880a49849a0): kobject_uevent_env [ 745.326858] kobject: 'loop1' (ffff8880a49849a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 745.337787] kobject: 'loop5' (ffff8880a4a9a2e0): kobject_uevent_env [ 745.344373] kobject: 'loop5' (ffff8880a4a9a2e0): fill_kobj_path: path = '/devices/virtual/block/loop5' 07:43:11 executing program 2: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x122d, 0x0, 0x0, 0x0, 0x3a1, 0x0, 0xfffffffffffff192, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) gettid() write$cgroup_int(r0, &(0x7f0000000300)=0xfc9, 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) socketpair(0x0, 0x0, 0x8fe, &(0x7f0000000140)) 07:43:11 executing program 3: perf_event_open(&(0x7f00000005c0)={0x0, 0x70, 0x2, 0xfffffffffffffffa, 0x0, 0x569, 0x0, 0x0, 0x8, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x9, 0x8001, 0x0, 0x0, 0xffffffff, 0x5, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x5, 0x0, 0xe33, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb28}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x122d, 0x0, 0x0, 0x0, 0x3a1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) gettid() write$cgroup_int(r0, &(0x7f0000000300)=0xfc9, 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) socketpair(0x0, 0x0, 0x8fe, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f00000000c0), 0x1802a140) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10121) 07:43:11 executing program 4: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@umask={'umask'}}]}) 07:43:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffd57, 0x20000004, &(0x7f0000b63fe4), 0x1c) 07:43:11 executing program 0: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000002d0000000000000000019500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000140)={r0, r1}) 07:43:11 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:11 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) [ 745.446693] kobject: 'loop0' (ffff888060768520): kobject_uevent_env [ 745.465556] kobject: 'loop0' (ffff888060768520): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 745.465876] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env [ 745.485865] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' 07:43:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffd57, 0x20000004, &(0x7f0000b63fe4), 0x1c) 07:43:11 executing program 2: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x122d, 0x0, 0x0, 0x0, 0x3a1, 0x0, 0xfffffffffffff192, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) gettid() write$cgroup_int(r0, &(0x7f0000000300)=0xfc9, 0x12) socketpair(0x0, 0x0, 0x8fe, &(0x7f0000000140)) [ 745.513677] kobject: 'loop1' (ffff8880a49849a0): kobject_uevent_env [ 745.544929] kobject: 'loop1' (ffff8880a49849a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 745.555037] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env 07:43:11 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffd57, 0x20000004, &(0x7f0000b63fe4), 0x1c) 07:43:11 executing program 4: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@umask={'umask'}}]}) [ 745.562734] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 745.589491] kobject: 'loop5' (ffff8880a4a9a2e0): kobject_uevent_env 07:43:11 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)) ioctl$TCXONC(r1, 0x540a, 0x3) [ 745.631859] kobject: 'loop5' (ffff8880a4a9a2e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 745.650503] kobject: 'loop2' (ffff8880a49f12a0): kobject_uevent_env [ 745.657686] kobject: 'loop2' (ffff8880a49f12a0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 745.690594] kobject: 'loop5' (ffff8880a4a9a2e0): kobject_uevent_env [ 745.707370] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env [ 745.714254] kobject: 'loop5' (ffff8880a4a9a2e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 745.724396] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 745.738821] kobject: 'loop1' (ffff8880a49849a0): kobject_uevent_env [ 745.752584] kobject: 'loop1' (ffff8880a49849a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 745.767479] kobject: 'loop1' (ffff8880a49849a0): kobject_uevent_env [ 745.775066] kobject: 'loop1' (ffff8880a49849a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 745.785452] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env [ 745.793873] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 745.820193] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env [ 745.845573] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' 07:43:12 executing program 3: perf_event_open(&(0x7f00000005c0)={0x0, 0x70, 0x2, 0xfffffffffffffffa, 0x0, 0x569, 0x0, 0x0, 0x8, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x9, 0x8001, 0x0, 0x0, 0xffffffff, 0x5, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x5, 0x0, 0xe33, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb28}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x122d, 0x0, 0x0, 0x0, 0x3a1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) gettid() write$cgroup_int(r0, &(0x7f0000000300)=0xfc9, 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) socketpair(0x0, 0x0, 0x8fe, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f00000000c0), 0x1802a140) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10121) 07:43:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffd57, 0x20000004, &(0x7f0000b63fe4), 0x1c) 07:43:12 executing program 2: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x122d, 0x0, 0x0, 0x0, 0x3a1, 0x0, 0xfffffffffffff192, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) gettid() socketpair(0x0, 0x0, 0x8fe, &(0x7f0000000140)) 07:43:12 executing program 0: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000002d0000000000000000019500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000140)={r0, r1}) 07:43:12 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:12 executing program 4: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 746.282098] kobject: 'loop2' (ffff8880a49f12a0): kobject_uevent_env [ 746.288554] kobject: 'loop2' (ffff8880a49f12a0): fill_kobj_path: path = '/devices/virtual/block/loop2' 07:43:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffd57, 0x20000004, &(0x7f0000b63fe4), 0x1c) [ 746.328348] kobject: 'loop3' (ffff8880a4a181e0): kobject_uevent_env [ 746.338935] kobject: 'loop3' (ffff8880a4a181e0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 746.365006] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env [ 746.368288] kobject: 'loop0' (ffff888060768520): kobject_uevent_env 07:43:12 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)) ioctl$TCXONC(r1, 0x540a, 0x3) 07:43:12 executing program 2: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x122d, 0x0, 0x0, 0x0, 0x3a1, 0x0, 0xfffffffffffff192, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) socketpair(0x0, 0x0, 0x8fe, &(0x7f0000000140)) 07:43:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffd57, 0x20000004, &(0x7f0000b63fe4), 0x1c) [ 746.376545] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 746.392738] kobject: 'loop0' (ffff888060768520): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 746.434529] kobject: 'loop5' (ffff8880a4a9a2e0): kobject_uevent_env [ 746.441234] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env [ 746.455266] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 746.458795] kobject: 'loop5' (ffff8880a4a9a2e0): fill_kobj_path: path = '/devices/virtual/block/loop5' 07:43:12 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) 07:43:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffd57, 0x20000004, &(0x7f0000b63fe4), 0x1c) [ 746.479642] kobject: 'loop1' (ffff8880a49849a0): kobject_uevent_env [ 746.498540] kobject: 'loop1' (ffff8880a49849a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 746.512472] kobject: 'loop2' (ffff8880a49f12a0): kobject_uevent_env [ 746.543446] kobject: 'loop2' (ffff8880a49f12a0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 746.571704] kobject: 'loop5' (ffff8880a4a9a2e0): kobject_uevent_env [ 746.586440] kobject: 'loop5' (ffff8880a4a9a2e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 746.599482] kobject: 'loop1' (ffff8880a49849a0): kobject_uevent_env [ 746.609105] kobject: 'loop1' (ffff8880a49849a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 746.625875] kobject: 'loop5' (ffff8880a4a9a2e0): kobject_uevent_env [ 746.633905] kobject: 'loop5' (ffff8880a4a9a2e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 746.655233] kobject: 'loop1' (ffff8880a49849a0): kobject_uevent_env [ 746.668139] kobject: 'loop1' (ffff8880a49849a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 746.686679] kobject: 'loop5' (ffff8880a4a9a2e0): kobject_uevent_env [ 746.693828] kobject: 'loop5' (ffff8880a4a9a2e0): fill_kobj_path: path = '/devices/virtual/block/loop5' 07:43:13 executing program 2: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x122d, 0x0, 0x0, 0x0, 0x3a1, 0x0, 0xfffffffffffff192, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) socketpair(0x0, 0x0, 0x8fe, &(0x7f0000000140)) 07:43:13 executing program 4: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x122d, 0x0, 0x0, 0x0, 0x3a1, 0x0, 0xfffffffffffff192, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) gettid() write$cgroup_int(r0, &(0x7f0000000300)=0xfc9, 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) socketpair(0x0, 0x0, 0x8fe, &(0x7f0000000140)) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10121) bpf$MAP_CREATE(0x0, &(0x7f0000005580)={0x0, 0x653c, 0x6, 0x6, 0x10, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x3c) 07:43:13 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) 07:43:13 executing program 0: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000002d0000000000000000019500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000100)={r0, r1}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000140)={r0, r1}) 07:43:13 executing program 3: perf_event_open(&(0x7f00000005c0)={0x0, 0x70, 0x2, 0xfffffffffffffffa, 0x0, 0x569, 0x0, 0x0, 0x8, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x9, 0x8001, 0x0, 0x0, 0xffffffff, 0x5, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x5, 0x0, 0xe33, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb28}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x122d, 0x0, 0x0, 0x0, 0x3a1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) gettid() write$cgroup_int(r0, &(0x7f0000000300)=0xfc9, 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) socketpair(0x0, 0x0, 0x8fe, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f00000000c0), 0x1802a140) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10121) 07:43:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffd57, 0x20000004, &(0x7f0000b63fe4), 0x1c) 07:43:13 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) 07:43:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffd57, 0x20000004, &(0x7f0000b63fe4), 0x1c) [ 747.152169] kobject: 'loop2' (ffff8880a49f12a0): kobject_uevent_env [ 747.158712] kobject: 'loop2' (ffff8880a49f12a0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 747.174076] kobject: 'loop3' (ffff8880a4a181e0): kobject_uevent_env [ 747.185190] kobject: 'loop3' (ffff8880a4a181e0): fill_kobj_path: path = '/devices/virtual/block/loop3' 07:43:13 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x0) 07:43:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffd57, 0x20000004, &(0x7f0000b63fe4), 0x1c) [ 747.222234] kobject: 'loop0' (ffff888060768520): kobject_uevent_env [ 747.253412] kobject: 'loop0' (ffff888060768520): fill_kobj_path: path = '/devices/virtual/block/loop0' 07:43:13 executing program 2: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) socketpair(0x0, 0x0, 0x8fe, &(0x7f0000000140)) 07:43:13 executing program 4: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x122d, 0x0, 0x0, 0x0, 0x3a1, 0x0, 0xfffffffffffff192, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) gettid() write$cgroup_int(r0, &(0x7f0000000300)=0xfc9, 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) socketpair(0x0, 0x0, 0x8fe, &(0x7f0000000140)) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10121) bpf$MAP_CREATE(0x0, &(0x7f0000005580)={0x0, 0x653c, 0x6, 0x6, 0x10, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x3c) 07:43:13 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x0) 07:43:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffd57, 0x20000004, &(0x7f0000b63fe4), 0x1c) [ 747.291958] kobject: 'loop1' (ffff8880a49849a0): kobject_uevent_env [ 747.308773] kobject: 'loop1' (ffff8880a49849a0): fill_kobj_path: path = '/devices/virtual/block/loop1' 07:43:13 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000406cb6503636cd9739a830400e93143ec8c760000000072b50213"], 0x1c) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x20) ioctl$TCXONC(r1, 0x540a, 0x0) [ 747.363655] kobject: 'loop5' (ffff8880a4a9a2e0): kobject_uevent_env [ 747.386957] kobject: 'loop5' (ffff8880a4a9a2e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 747.431825] kobject: 'loop1' (ffff8880a49849a0): kobject_uevent_env [ 747.438286] kobject: 'loop1' (ffff8880a49849a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 747.468530] kobject: 'loop5' (ffff8880a4a9a2e0): kobject_uevent_env [ 747.477525] kobject: 'loop5' (ffff8880a4a9a2e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 747.488612] kobject: 'loop2' (ffff8880a49f12a0): kobject_uevent_env [ 747.497785] kobject: 'loop2' (ffff8880a49f12a0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 747.508784] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env [ 747.517653] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 747.528224] kobject: 'loop1' (ffff8880a49849a0): kobject_uevent_env [ 747.537003] kobject: 'loop1' (ffff8880a49849a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 747.547648] kobject: 'loop5' (ffff8880a4a9a2e0): kobject_uevent_env [ 747.556533] kobject: 'loop5' (ffff8880a4a9a2e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 747.567104] kobject: 'loop1' (ffff8880a49849a0): kobject_uevent_env [ 747.575971] kobject: 'loop1' (ffff8880a49849a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 747.586536] kobject: 'loop5' (ffff8880a4a9a2e0): kobject_uevent_env [ 747.595337] kobject: 'loop5' (ffff8880a4a9a2e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 747.612773] kobject: 'loop1' (ffff8880a49849a0): kobject_uevent_env [ 747.620604] kobject: 'loop1' (ffff8880a49849a0): fill_kobj_path: path = '/devices/virtual/block/loop1' 07:43:14 executing program 0: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000002d0000000000000000019500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000100)={r0, r1}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000140)={r0, r1}) [ 748.014400] kobject: 'loop0' (ffff888060768520): kobject_uevent_env [ 748.022961] kobject: 'loop0' (ffff888060768520): fill_kobj_path: path = '/devices/virtual/block/loop0' 07:43:14 executing program 3: perf_event_open(&(0x7f00000005c0)={0x0, 0x70, 0x2, 0xfffffffffffffffa, 0x0, 0x569, 0x0, 0x0, 0x8, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x9, 0x8001, 0x0, 0x0, 0xffffffff, 0x5, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x5, 0x0, 0xe33, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb28}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x122d, 0x0, 0x0, 0x0, 0x3a1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) gettid() write$cgroup_int(r0, &(0x7f0000000300)=0xfc9, 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) socketpair(0x0, 0x0, 0x8fe, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f00000000c0), 0x1802a140) bpf$MAP_CREATE(0x0, &(0x7f0000005580)={0x0, 0x653c, 0x6, 0x6, 0x10, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x3c) 07:43:14 executing program 2: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) socketpair(0x0, 0x0, 0x8fe, &(0x7f0000000140)) 07:43:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffd57, 0x0, &(0x7f0000b63fe4), 0x1c) 07:43:14 executing program 1: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x122d, 0x0, 0x0, 0x0, 0x3a1, 0x0, 0xfffffffffffff192, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) gettid() write$cgroup_int(r0, &(0x7f0000000300)=0xfc9, 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) socketpair(0x0, 0x0, 0x8fe, &(0x7f0000000140)) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10121) bpf$MAP_CREATE(0x0, &(0x7f0000005580)={0x0, 0x653c, 0x6, 0x6, 0x10, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x3c) 07:43:14 executing program 4: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x122d, 0x0, 0x0, 0x0, 0x3a1, 0x0, 0xfffffffffffff192, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) gettid() write$cgroup_int(r0, &(0x7f0000000300)=0xfc9, 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) socketpair(0x0, 0x0, 0x8fe, &(0x7f0000000140)) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10121) bpf$MAP_CREATE(0x0, &(0x7f0000005580)={0x0, 0x653c, 0x6, 0x6, 0x10, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x3c) 07:43:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffd57, 0x0, &(0x7f0000b63fe4), 0x1c) [ 748.134777] kobject: 'loop2' (ffff8880a49f12a0): kobject_uevent_env [ 748.155069] kobject: 'loop2' (ffff8880a49f12a0): fill_kobj_path: path = '/devices/virtual/block/loop2' 07:43:14 executing program 1: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000002d0000000000000000019500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000140)={r0, r1}) [ 748.194695] kobject: 'loop3' (ffff8880a4a181e0): kobject_uevent_env 07:43:14 executing program 2: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) socketpair(0x0, 0x0, 0x8fe, &(0x7f0000000140)) 07:43:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffd57, 0x0, &(0x7f0000b63fe4), 0x1c) [ 748.236015] kobject: 'loop3' (ffff8880a4a181e0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 748.257501] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env [ 748.265353] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' 07:43:14 executing program 1: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000002d0000000000000000019500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000140)={r0, r1}) [ 748.289167] kobject: 'loop5' (ffff8880a4a9a2e0): kobject_uevent_env [ 748.297976] kobject: 'loop5' (ffff8880a4a9a2e0): fill_kobj_path: path = '/devices/virtual/block/loop5' 07:43:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, 0x0, 0x0) [ 748.338997] kobject: 'loop1' (ffff8880a49849a0): kobject_uevent_env [ 748.355834] kobject: 'loop1' (ffff8880a49849a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 748.366541] kobject: 'loop2' (ffff8880a49f12a0): kobject_uevent_env [ 748.375470] kobject: 'loop2' (ffff8880a49f12a0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 748.388221] kobject: 'loop5' (ffff8880a4a9a2e0): kobject_uevent_env [ 748.410270] kobject: 'loop5' (ffff8880a4a9a2e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 748.423114] kobject: 'loop1' (ffff8880a49849a0): kobject_uevent_env [ 748.431857] kobject: 'loop1' (ffff8880a49849a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 748.464622] kobject: 'loop5' (ffff8880a4a9a2e0): kobject_uevent_env [ 748.474590] kobject: 'loop5' (ffff8880a4a9a2e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 748.491150] kobject: 'loop1' (ffff8880a49849a0): kobject_uevent_env [ 748.497874] kobject: 'loop1' (ffff8880a49849a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 748.508408] kobject: 'loop5' (ffff8880a4a9a2e0): kobject_uevent_env [ 748.515184] kobject: 'loop5' (ffff8880a4a9a2e0): fill_kobj_path: path = '/devices/virtual/block/loop5' 07:43:14 executing program 0: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000002d0000000000000000019500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000100)={r0, r1}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000140)={r0, r1}) [ 748.851369] kobject: 'loop0' (ffff888060768520): kobject_uevent_env [ 748.857914] kobject: 'loop0' (ffff888060768520): fill_kobj_path: path = '/devices/virtual/block/loop0' 07:43:15 executing program 3: perf_event_open(&(0x7f00000005c0)={0x0, 0x70, 0x2, 0xfffffffffffffffa, 0x0, 0x569, 0x0, 0x0, 0x8, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x9, 0x8001, 0x0, 0x0, 0xffffffff, 0x5, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x5, 0x0, 0xe33, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb28}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x122d, 0x0, 0x0, 0x0, 0x3a1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) gettid() write$cgroup_int(r0, &(0x7f0000000300)=0xfc9, 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) socketpair(0x0, 0x0, 0x8fe, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f00000000c0), 0x1802a140) bpf$MAP_CREATE(0x0, &(0x7f0000005580)={0x0, 0x653c, 0x6, 0x6, 0x10, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x3c) 07:43:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, 0x0, 0x0) 07:43:15 executing program 1: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000002d0000000000000000019500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000140)={r0, r1}) 07:43:15 executing program 4: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x122d, 0x0, 0x0, 0x0, 0x3a1, 0x0, 0xfffffffffffff192, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) gettid() write$cgroup_int(r0, &(0x7f0000000300)=0xfc9, 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) socketpair(0x0, 0x0, 0x8fe, &(0x7f0000000140)) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10121) 07:43:15 executing program 2: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) socketpair(0x0, 0x0, 0x8fe, &(0x7f0000000140)) [ 749.020834] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env [ 749.027375] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' 07:43:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, 0x0, 0x0) 07:43:15 executing program 1: r0 = socket$inet(0x2, 0x200000002, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x26) [ 749.065478] kobject: 'loop2' (ffff8880a49f12a0): kobject_uevent_env [ 749.095978] kobject: 'loop2' (ffff8880a49f12a0): fill_kobj_path: path = '/devices/virtual/block/loop2' 07:43:15 executing program 4: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x122d, 0x0, 0x0, 0x0, 0x3a1, 0x0, 0xfffffffffffff192, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) gettid() write$cgroup_int(r0, &(0x7f0000000300)=0xfc9, 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) socketpair(0x0, 0x0, 0x8fe, &(0x7f0000000140)) 07:43:15 executing program 2: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x8fe, &(0x7f0000000140)) 07:43:15 executing program 5: perf_event_open(&(0x7f00000005c0)={0x3, 0x70, 0x2, 0xfffffffffffffffa, 0x0, 0x569, 0x0, 0x81, 0x8, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0xffffffff, 0x5, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x5, 0x0, 0xe33, 0x5, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb28}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x122d, 0x0, 0x0, 0x0, 0x3a1, 0x0, 0xfffffffffffff192, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) gettid() write$cgroup_int(0xffffffffffffffff, &(0x7f0000000300)=0xfc9, 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10121) bpf$MAP_CREATE(0x0, &(0x7f0000005580)={0x0, 0x653c, 0x6, 0x6, 0x10, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x3c) [ 749.117689] kobject: 'loop3' (ffff8880a4a181e0): kobject_uevent_env [ 749.124904] kobject: 'loop3' (ffff8880a4a181e0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 749.165826] kobject: 'loop5' (ffff8880a4a9a2e0): kobject_uevent_env [ 749.187534] kobject: 'loop5' (ffff8880a4a9a2e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 749.206887] kobject: 'loop1' (ffff8880a49849a0): kobject_uevent_env 07:43:15 executing program 2: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x0, 0x8fe, &(0x7f0000000140)) [ 749.213623] kobject: 'loop1' (ffff8880a49849a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 749.224568] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env [ 749.238557] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 749.262004] kobject: 'loop5' (ffff8880a4a9a2e0): kobject_uevent_env [ 749.277589] kobject: 'loop5' (ffff8880a4a9a2e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 749.291175] kobject: 'loop2' (ffff8880a49f12a0): kobject_uevent_env [ 749.298795] kobject: 'loop2' (ffff8880a49f12a0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 749.375200] kobject: 'loop1' (ffff8880a49849a0): kobject_uevent_env [ 749.383613] kobject: 'loop1' (ffff8880a49849a0): fill_kobj_path: path = '/devices/virtual/block/loop1' 07:43:15 executing program 0: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000100)={r0}) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000140)={r0}) [ 749.685604] kobject: 'loop0' (ffff888060768520): kobject_uevent_env [ 749.700698] kobject: 'loop0' (ffff888060768520): fill_kobj_path: path = '/devices/virtual/block/loop0' 07:43:15 executing program 3: perf_event_open(&(0x7f00000005c0)={0x0, 0x70, 0x2, 0xfffffffffffffffa, 0x0, 0x569, 0x0, 0x0, 0x8, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x9, 0x8001, 0x0, 0x0, 0xffffffff, 0x5, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x5, 0x0, 0xe33, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb28}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x122d, 0x0, 0x0, 0x0, 0x3a1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) gettid() write$cgroup_int(r0, &(0x7f0000000300)=0xfc9, 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) socketpair(0x0, 0x0, 0x8fe, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f00000000c0), 0x1802a140) bpf$MAP_CREATE(0x0, &(0x7f0000005580)={0x0, 0x653c, 0x6, 0x6, 0x10, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x3c) 07:43:15 executing program 2: socketpair(0x0, 0x0, 0x8fe, &(0x7f0000000140)) 07:43:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x4) 07:43:15 executing program 4: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x122d, 0x0, 0x0, 0x0, 0x3a1, 0x0, 0xfffffffffffff192, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) gettid() write$cgroup_int(r0, &(0x7f0000000300)=0xfc9, 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) socketpair(0x0, 0x0, 0x8fe, &(0x7f0000000140)) 07:43:15 executing program 5: perf_event_open(&(0x7f00000005c0)={0x3, 0x70, 0x2, 0xfffffffffffffffa, 0x0, 0x569, 0x0, 0x81, 0x8, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0xffffffff, 0x5, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x5, 0x0, 0xe33, 0x5, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb28}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x122d, 0x0, 0x0, 0x0, 0x3a1, 0x0, 0xfffffffffffff192, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) gettid() write$cgroup_int(0xffffffffffffffff, &(0x7f0000000300)=0xfc9, 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10121) bpf$MAP_CREATE(0x0, &(0x7f0000005580)={0x0, 0x653c, 0x6, 0x6, 0x10, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x3c) 07:43:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x37, 0x0, &(0x7f0000000040)) [ 749.837913] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env [ 749.846634] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 749.868252] kobject: 'loop3' (ffff8880a4a181e0): kobject_uevent_env 07:43:16 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) 07:43:16 executing program 1: 07:43:16 executing program 2: socketpair(0x0, 0x0, 0x0, 0x0) [ 749.901211] kobject: 'loop3' (ffff8880a4a181e0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 749.935680] kobject: 'loop5' (ffff8880a4a9a2e0): kobject_uevent_env 07:43:16 executing program 4: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x122d, 0x0, 0x0, 0x0, 0x3a1, 0x0, 0xfffffffffffff192, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) gettid() write$cgroup_int(r0, &(0x7f0000000300)=0xfc9, 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) socketpair(0x0, 0x0, 0x8fe, &(0x7f0000000140)) 07:43:16 executing program 1: [ 749.966271] kobject: 'loop5' (ffff8880a4a9a2e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 749.978953] kobject: 'loop1' (ffff8880a49849a0): kobject_uevent_env [ 749.997097] kobject: 'loop1' (ffff8880a49849a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 750.032058] kobject: 'loop2' (ffff8880a49f12a0): kobject_uevent_env [ 750.038640] kobject: 'loop2' (ffff8880a49f12a0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 750.082459] kobject: 'loop1' (ffff8880a49849a0): kobject_uevent_env [ 750.089123] kobject: 'loop1' (ffff8880a49849a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 750.109999] kobject: 'loop2' (ffff8880a49f12a0): kobject_uevent_env [ 750.117919] kobject: 'loop2' (ffff8880a49f12a0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 750.129798] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env [ 750.137959] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 750.157697] kobject: 'loop1' (ffff8880a49849a0): kobject_uevent_env [ 750.164880] kobject: 'loop1' (ffff8880a49849a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 750.177478] kobject: 'loop2' (ffff8880a49f12a0): kobject_uevent_env [ 750.184655] kobject: 'loop2' (ffff8880a49f12a0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 750.204277] kobject: 'loop1' (ffff8880a49849a0): kobject_uevent_env [ 750.211038] kobject: 'loop1' (ffff8880a49849a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 750.371024] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env [ 750.377608] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 750.388065] kobject: 'loop3' (ffff8880a4a181e0): kobject_uevent_env [ 750.396393] kobject: 'loop3' (ffff8880a4a181e0): fill_kobj_path: path = '/devices/virtual/block/loop3' 07:43:16 executing program 5: perf_event_open(&(0x7f00000005c0)={0x3, 0x70, 0x2, 0xfffffffffffffffa, 0x0, 0x569, 0x0, 0x81, 0x8, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0xffffffff, 0x5, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x5, 0x0, 0xe33, 0x5, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb28}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x122d, 0x0, 0x0, 0x0, 0x3a1, 0x0, 0xfffffffffffff192, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) gettid() write$cgroup_int(0xffffffffffffffff, &(0x7f0000000300)=0xfc9, 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10121) bpf$MAP_CREATE(0x0, &(0x7f0000005580)={0x0, 0x653c, 0x6, 0x6, 0x10, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x3c) 07:43:16 executing program 0: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000100)={r0}) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000140)={r0}) 07:43:16 executing program 1: 07:43:16 executing program 2: 07:43:16 executing program 4: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x122d, 0x0, 0x0, 0x0, 0x3a1, 0x0, 0xfffffffffffff192, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) gettid() write$cgroup_int(r0, &(0x7f0000000300)=0xfc9, 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10121) 07:43:16 executing program 3: perf_event_open(&(0x7f00000005c0)={0x0, 0x70, 0x2, 0xfffffffffffffffa, 0x0, 0x569, 0x0, 0x0, 0x8, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x9, 0x8001, 0x0, 0x0, 0xffffffff, 0x5, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x5, 0x0, 0xe33, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb28}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x122d, 0x0, 0x0, 0x0, 0x3a1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) gettid() write$cgroup_int(r0, &(0x7f0000000300)=0xfc9, 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) socketpair(0x0, 0x0, 0x8fe, &(0x7f0000000140)) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10121) bpf$MAP_CREATE(0x0, &(0x7f0000005580)={0x0, 0x653c, 0x6, 0x6, 0x10, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x3c) 07:43:16 executing program 1: 07:43:16 executing program 2: [ 750.538285] kobject: 'loop0' (ffff888060768520): kobject_uevent_env [ 750.547025] kobject: 'loop0' (ffff888060768520): fill_kobj_path: path = '/devices/virtual/block/loop0' 07:43:16 executing program 1: 07:43:16 executing program 2: 07:43:16 executing program 4: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x122d, 0x0, 0x0, 0x0, 0x3a1, 0x0, 0xfffffffffffff192, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) gettid() write$cgroup_int(r0, &(0x7f0000000300)=0xfc9, 0x12) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10121) 07:43:16 executing program 3: perf_event_open(&(0x7f00000005c0)={0x0, 0x70, 0x2, 0xfffffffffffffffa, 0x0, 0x569, 0x0, 0x0, 0x8, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x9, 0x8001, 0x0, 0x0, 0xffffffff, 0x5, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x5, 0x0, 0xe33, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb28}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x122d, 0x0, 0x0, 0x0, 0x3a1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) gettid() write$cgroup_int(r0, &(0x7f0000000300)=0xfc9, 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) socketpair(0x0, 0x0, 0x8fe, &(0x7f0000000140)) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10121) bpf$MAP_CREATE(0x0, &(0x7f0000005580)={0x0, 0x653c, 0x6, 0x6, 0x10, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x3c) [ 750.592794] kobject: 'loop1' (ffff8880a49849a0): kobject_uevent_env [ 750.615216] kobject: 'loop1' (ffff8880a49849a0): fill_kobj_path: path = '/devices/virtual/block/loop1' 07:43:16 executing program 5: perf_event_open(&(0x7f00000005c0)={0x3, 0x70, 0x2, 0xfffffffffffffffa, 0x0, 0x569, 0x0, 0x81, 0x8, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0xffffffff, 0x5, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x5, 0x0, 0xe33, 0x5, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb28}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x122d, 0x0, 0x0, 0x0, 0x3a1, 0x0, 0xfffffffffffff192, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) gettid() write$cgroup_int(0xffffffffffffffff, &(0x7f0000000300)=0xfc9, 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10121) bpf$MAP_CREATE(0x0, &(0x7f0000005580)={0x0, 0x653c, 0x6, 0x6, 0x10, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x3c) [ 750.665631] kobject: 'loop2' (ffff8880a49f12a0): kobject_uevent_env [ 750.676195] kobject: 'loop2' (ffff8880a49f12a0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 750.698832] kobject: 'loop2' (ffff8880a49f12a0): kobject_uevent_env [ 750.719090] kobject: 'loop2' (ffff8880a49f12a0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 750.734094] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env [ 750.740866] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 750.762627] kobject: 'loop3' (ffff8880a4a181e0): kobject_uevent_env [ 750.775044] kobject: 'loop3' (ffff8880a4a181e0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 750.785194] kobject: 'loop2' (ffff8880a49f12a0): kobject_uevent_env [ 750.792796] kobject: 'loop2' (ffff8880a49f12a0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 750.803090] kobject: 'loop5' (ffff8880a4a9a2e0): kobject_uevent_env [ 750.809658] kobject: 'loop5' (ffff8880a4a9a2e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 750.820917] kobject: 'loop4' (ffff8880a4a60260): kobject_uevent_env [ 750.827424] kobject: 'loop4' (ffff8880a4a60260): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 750.837520] kobject: 'loop5' (ffff8880a4a9a2e0): kobject_uevent_env [ 750.844046] kobject: 'loop5' (ffff8880a4a9a2e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 750.853977] kobject: 'loop3' (ffff8880a4a181e0): kobject_uevent_env [ 750.860427] kobject: 'loop3' (ffff8880a4a181e0): fill_kobj_path: path = '/devices/virtual/block/loop3'