ridge_slave_0) entered disabled state [ 422.122721][ T2542] device hsr_slave_0 left promiscuous mode [ 422.172473][ T2542] device hsr_slave_1 left promiscuous mode [ 422.232750][ T2542] team0 (unregistering): Port device team_slave_1 removed [ 422.248532][ T2542] team0 (unregistering): Port device team_slave_0 removed [ 422.261265][ T2542] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 422.307327][ T2542] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 422.404035][ T2542] bond0 (unregistering): Released all slaves [ 422.531398][T15885] IPVS: ftp: loaded support on port[0] = 21 [ 422.658411][T15885] chnl_net:caif_netlink_parms(): no params data found [ 422.749480][T15885] bridge0: port 1(bridge_slave_0) entered blocking state [ 422.757691][T15885] bridge0: port 1(bridge_slave_0) entered disabled state [ 422.766710][T15885] device bridge_slave_0 entered promiscuous mode [ 422.776809][T15885] bridge0: port 2(bridge_slave_1) entered blocking state [ 422.785387][T15885] bridge0: port 2(bridge_slave_1) entered disabled state [ 422.794236][T15885] device bridge_slave_1 entered promiscuous mode [ 422.819317][T15885] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 422.831450][T15885] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 422.874308][T15885] team0: Port device team_slave_0 added [ 422.889510][T15885] team0: Port device team_slave_1 added [ 422.958471][T15885] device hsr_slave_0 entered promiscuous mode [ 423.012810][T15885] device hsr_slave_1 entered promiscuous mode [ 423.072278][T15885] debugfs: Directory 'hsr0' with parent '/' already present! [ 423.127408][T15885] bridge0: port 2(bridge_slave_1) entered blocking state [ 423.134568][T15885] bridge0: port 2(bridge_slave_1) entered forwarding state [ 423.141951][T15885] bridge0: port 1(bridge_slave_0) entered blocking state [ 423.149078][T15885] bridge0: port 1(bridge_slave_0) entered forwarding state [ 423.300474][T15885] 8021q: adding VLAN 0 to HW filter on device bond0 [ 423.351977][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 423.367302][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 423.387412][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 423.418274][T15885] 8021q: adding VLAN 0 to HW filter on device team0 [ 423.442694][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 423.451241][ T8902] bridge0: port 1(bridge_slave_0) entered blocking state [ 423.458451][ T8902] bridge0: port 1(bridge_slave_0) entered forwarding state [ 423.493169][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 423.501690][ T8892] bridge0: port 2(bridge_slave_1) entered blocking state [ 423.508966][ T8892] bridge0: port 2(bridge_slave_1) entered forwarding state [ 423.543504][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 423.552706][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 423.568560][T15885] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 423.580483][T15885] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 423.596748][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 423.609461][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 423.631575][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 423.640459][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 423.655062][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 423.664161][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 423.697396][T15885] 8021q: adding VLAN 0 to HW filter on device batadv0 10:14:00 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:14:00 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x77d) close(r1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x85) ioctl$PPPIOCSPASS(r2, 0x40107447, &(0x7f0000000080)={0x8, &(0x7f0000000040)=[{0x3f, 0x8000000000, 0x44c, 0x2}, {0x46c9, 0x81, 0x6, 0x9}, {0x5, 0xcac3, 0x8, 0xb089}, {0x3, 0xfa15, 0x7, 0x3}, {0x9, 0x6, 0x6, 0x101}, {0x0, 0x5, 0x100000001, 0x7}, {0x7381, 0x80000000, 0x4, 0xeaf1}, {0x3, 0x4, 0x9, 0x9}]}) 10:14:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000140)=0x1, &(0x7f0000000180)=0x2) getsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000080)=0x6dd, &(0x7f00000000c0)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_int(r0, 0x1, 0x15, &(0x7f000059dffc), &(0x7f0000000100)=0x4) 10:14:00 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000040)={0x0, 0x92, 0xffff, 0x100, 0x80000000, 0x1, 0x0, 0x1, {0x0, @in6={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x1c}, 0x5}}, 0xca2, 0x7, 0x100, 0x2, 0x20}}, &(0x7f0000000100)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={r2, 0x30, &(0x7f0000000140)=[@in={0x2, 0x4e23, @empty}, @in={0x2, 0x4e23, @remote}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, &(0x7f00000001c0)=0x10) connect$x25(r0, &(0x7f0000000000)={0x9, @null=' \x00'}, 0x12) getsockopt$X25_QBITINCL(r0, 0x106, 0x4, 0x0, 0x0) 10:14:00 executing program 5: mkdir(&(0x7f0000001c40)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) rt_sigreturn() openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x64487b3c42538ab9, 0x0) 10:14:00 executing program 0: r0 = socket$inet(0x2, 0x5, 0x2) fremovexattr(r0, &(0x7f0000000000)=@known='security.apparmor\x00') r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x9, 0x40080) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r2 = getpgid(0x0) ptrace$setsig(0x4203, r2, 0x5, &(0x7f0000000080)={0x9, 0x40, 0x2}) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000100)="657a087db86f0174b0973fc45f36efbf2f19f283881da6f34ac0c0e137079f6b6625a85b845178512fe8d8baa888b7dd2f4de4e704bd963d942d5732b6582fcf298b69cd02925b9770f4b1205dc44faf8f33133c481ed5f623a9fbbdf0642e643cb30720e289de514943bad07b4c20a925381c6c4c1dae74d6c6afe6db9ff2fc4c20806679516569f40b1e51eca813174093765b240790e321bafc8ac3efd284bfa95ffd2c9c9f2be49b524c6ba614") getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x4, 0xa9, [], 0x4, &(0x7f00000001c0)=[{}, {}, {}, {}], &(0x7f0000000200)=""/169}, &(0x7f0000000340)=0x78) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20400580}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r3, 0x200, 0x70bd27, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r4 = syz_open_dev$mouse(&(0x7f00000004c0)='/dev/input/mouse#\x00', 0xffff, 0x410100) ioctl$HDIO_GETGEO(r4, 0x301, &(0x7f0000000500)) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r1, 0xc040564a, &(0x7f0000000540)={0x2, 0x0, 0x2025, 0x9, 0x5, 0xa30b, 0x8, 0x1}) setsockopt$inet6_dccp_int(r4, 0x21, 0x6, &(0x7f0000000580)=0x1, 0x4) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1ff) ioctl$VFIO_SET_IOMMU(r1, 0x3b66, 0x3) ioctl$KVM_IRQ_LINE(r4, 0x4008ae61, &(0x7f00000005c0)={0x6, 0x4}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0xc1, 0x3, 0x2, "f43f331a6e7655c693cd9ae9836b3f3d", "aaa1dd5084596ab4e243b70e12b381c3640f7b0bbbe3b7d4f854818b74fc5dc2fd088659e6f3900063db648ed7c2d26261cda2616c84732f248369edc373ad41327ad658ed3faeb7aec977772df1357ce82bf3cfc63b9e0f24032567406c29a90d286accb4536e80308bae629898e0bccfe3fbb545b1dc30c6b4ae25085ef7c875b9c1863656eef7c31fc14f9530d432226a189c15898c1ff9253dd51f581339f6867861a3625a3bf30420c9"}, 0xc1, 0x2) ioctl$CAPI_NCCI_GETUNIT(r4, 0x80044327, &(0x7f0000000740)=0x1) bind$inet(r4, &(0x7f0000000780)={0x2, 0x4e22, @empty}, 0x10) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r4, 0x2) arch_prctl$ARCH_GET_CPUID(0x1011) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x200000, 0x0) getsockopt$sock_buf(r5, 0x1, 0x3b, &(0x7f0000000800)=""/4096, &(0x7f0000001800)=0x1000) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$VIDIOC_G_STD(r5, 0x80085617, &(0x7f0000001840)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000001880)=r6) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f00000018c0), 0x4) 10:14:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r1, 0x2, 0x70bd29, 0x0, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x5d, @link='broadcast-link\x00\xabA\x00'}}}}, 0x68}}, 0x0) 10:14:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000), 0x14d) 10:14:00 executing program 3: r0 = accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f00000000c0)=0x10, 0x800) r1 = dup3(r0, r0, 0x80000) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'bcsf0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@ipv4}}, &(0x7f0000000180)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bond0\x00', r2}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000140)={0x2000000000000252, &(0x7f0000000040)=[{0x3, 0x0, 0x0, 0x1f}]}) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'vet\x00\x06\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 10:14:00 executing program 4: r0 = socket(0x11, 0x800000003, 0x81) getsockname(r0, &(0x7f0000000080)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000002340)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888}, "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", [[], [], [], []]}, 0xff0) 10:14:01 executing program 0: syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = dup3(r0, r1, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000040)=@assoc_value={0x0}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f00000000c0)={r3, 0x400, 0xcd, "abf562d71362717b6505447ca877f2a5214e1ef769f1b0c31b690e361ef60728962371daded1a5bbf33f8c1a5dc3c4665b7a548819ef8547b7cb33b1a78f9f101126d792c0c0035b122adfc376365b42631323251c08e5eac8beef4a63d6414da9f9cdf012df1e6e3aa5c7814418c1ffc2558fb27dd3f3f6091afc216409354874be2b3eb63cbf8826934a881f961e6cf1968d785db0e6da169814880d2012ef870b22b32880fe56b6b3c3935df5bc3912060e193b0538eb5a9db7f53ca26007586ad7f30a59074a3cf6f0a4d3"}, 0xd5) 10:14:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 10:14:01 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:14:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r0, 0x0, 0x0) signalfd4(r2, &(0x7f0000000040)={0xffffffff}, 0x8, 0x800) sendmsg$alg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="9f9b8a8827665980cd3a3a1f851bae1f", 0x10}], 0x1c2}, 0x4) recvmsg(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x80000, 0x0) ioctl$VHOST_SET_VRING_ADDR(r3, 0x4028af11, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000200)=""/224, &(0x7f0000000380)=""/169, &(0x7f0000000440)=""/200, 0x4000}) 10:14:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000009c0)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x418000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) 10:14:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha384\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a75b00f", 0x4) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x6, 0x8000) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000140)={0x1, 0x7, 0x3, "f36f5d15d2d61adc3eb99794fb402a6e9f2b05281a140c6fe8d59a4719ea4ea3", 0x32314142}) fsconfig$FSCONFIG_SET_FLAG(r1, 0x0, &(0x7f0000000080)='async\x00', 0x0, 0x0) 10:14:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x8000000004) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000040)=0xda, 0xfffffffffffffd46) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000140)="580000001400192340834b80043f679a10ff00804824ca945f640094000500289d5aaa000000000000008449bb06d383d537b300f0fffeff2c707f8f00ff200000000010000100090a00"/88, 0x58}], 0x1) 10:14:01 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000480)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000200)="fbbe22cf104c948f665e6007769d", 0x0, 0x2b1}, 0x28) 10:14:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x40000000000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r3) sendmsg$netlink(r4, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r1], 0x14}, 0x0) recvmmsg(r2, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x0, 0x0) 10:14:01 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:14:01 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000645000/0x4000)=nil, 0x4000}, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xf8, 0x400000) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000100)=0x1, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) 10:14:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_robust_list(&(0x7f0000000080)={0x0, 0x200}, 0x18) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0x20}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) 10:14:01 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, 0x0, 0x0) msgget(0x3, 0x0) 10:14:01 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) capset(&(0x7f00000fc000)={0x19980330}, &(0x7f000047efe8)) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0xb9156d053992a09c, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f00000000c0)=0x10001, 0x4) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r3, &(0x7f0000000000)=0x100000, 0x100000008008) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00', @ifru_flags}) 10:14:01 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80000, 0x1) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={@default, @default, 0x5, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000013c0)={0x0, 0x0, 0x0}, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80000000, 0x7}) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000200)) r2 = syz_open_pts(r1, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000140)=0x1f, 0x4) readv(r2, &(0x7f0000000400)=[{&(0x7f0000000440)=""/165, 0xa5}, {&(0x7f0000000280)=""/243, 0xf3}, {0x0}, {&(0x7f0000000380)=""/124, 0x7c}], 0x4) 10:14:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000000)) ioctl(r0, 0x1000008912, &(0x7f0000000180)="08dca50d5e0bcfe47bf070") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x1000001a2) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r1, 0x0, r5, 0x0, 0x1ffffd, 0x0) 10:14:01 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f00000000c0)={0x0, 0x2}) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) 10:14:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) r2 = syz_open_dev$media(&(0x7f0000000480)='/dev/media#\x00', 0x100000000, 0xc00) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000004c0)=@assoc_id=0x0, &(0x7f0000000500)=0x4) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000540)={r3, 0x7ed, 0x10, 0x401, 0x10000}, &(0x7f0000000580)=0x18) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) r4 = accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x8a80, @rand_addr="2ff22382cd1ccc557f63dadae000b7e1", 0x7f000000000}}, 0xffffffffffffffff, 0x6}, &(0x7f0000000380)=0x90) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f00000003c0)={r5, 0x3, 0x3, [0x68, 0x3ff, 0x6]}, &(0x7f0000000400)=0xe) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5", 0x4) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x100, 0x0) sendto$unix(r4, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) sendmsg$alg(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)="f87584ca454e1cdaceaf", 0xa}, {&(0x7f00000000c0)="37ea72ab306310fe78727728a6327b5393912dad2ac77789a6c3117a13ade8765172341f727e64ee9cdafc", 0x2b}, {&(0x7f0000000180)="b00ff240911a8b94d826db3bf998c510502e8fa68440fd25965fb44637d229b2b7328b51a4ab75b81c406a53de9af874c3e8152481aa96915e2fb1fe9f999b955ccf251bb07053ad3ea0da5e67e933c6d320a120a32a67f2cb7c354d783d713d5a759bca3bd419d553994f942423e622aac42dc58ec78bde8dfaf9d87caf48fcd6816906a65409ba57c150fbcf612067ff1a675b9901", 0x96}], 0x3, 0x0, 0x0, 0x8000}, 0x40) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000440)) recvfrom(r4, &(0x7f0000001240)=""/4096, 0xfffffffffffffeb8, 0x0, 0x0, 0x0) 10:14:02 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") write(r0, &(0x7f0000000000)="2600000013003ff1eb14c1f8030322ff001000e313000000090000680000000006000300124b", 0x26) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000040)={0x77359400}, 0x10) [ 425.942251][T15998] K: renamed from caif0 10:14:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d353ff072d68b2e4dc14aa5fa8b3d94c22") r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x4040, 0x0) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000040)=0x3) 10:14:02 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f00000001c0)=0x1) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f0000000280)={0x2, {0x1, 0x3, 0x6, 0xbc}}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x8f04}, &(0x7f0000000100)=0xfffffffffffffdac) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r2, 0x80000000}, 0x8) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) ioctl$IMHOLD_L1(r0, 0x80044948, &(0x7f0000000240)=0x40) recvmmsg(r1, &(0x7f0000002680)=[{{0x0, 0x6c, &(0x7f0000000880), 0x1}}], 0x3ffffff000000f1, 0x0, 0x0) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f0000000200)) [ 426.022347][T15998] A link change request failed with some changes committed already. Interface K may have been left with an inconsistent configuration, please check. [ 426.242758][T15998] A link change request failed with some changes committed already. Interface K may have been left with an inconsistent configuration, please check. [ 427.118806][T16023] IPVS: ftp: loaded support on port[0] = 21 [ 427.146065][ T2542] device bridge_slave_1 left promiscuous mode [ 427.152757][ T2542] bridge0: port 2(bridge_slave_1) entered disabled state [ 427.203203][ T2542] device bridge_slave_0 left promiscuous mode [ 427.210294][ T2542] bridge0: port 1(bridge_slave_0) entered disabled state [ 429.082918][ T2542] device hsr_slave_0 left promiscuous mode [ 429.122433][ T2542] device hsr_slave_1 left promiscuous mode [ 429.171463][ T2542] team0 (unregistering): Port device team_slave_1 removed [ 429.185946][ T2542] team0 (unregistering): Port device team_slave_0 removed [ 429.198874][ T2542] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 429.238765][ T2542] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 429.339083][ T2542] bond0 (unregistering): Released all slaves [ 429.526797][T16023] chnl_net:caif_netlink_parms(): no params data found [ 429.558788][T16023] bridge0: port 1(bridge_slave_0) entered blocking state [ 429.566108][T16023] bridge0: port 1(bridge_slave_0) entered disabled state [ 429.574188][T16023] device bridge_slave_0 entered promiscuous mode [ 429.582676][T16023] bridge0: port 2(bridge_slave_1) entered blocking state [ 429.589823][T16023] bridge0: port 2(bridge_slave_1) entered disabled state [ 429.598012][T16023] device bridge_slave_1 entered promiscuous mode [ 429.618450][T16023] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 429.634735][T16023] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 429.654684][T16023] team0: Port device team_slave_0 added [ 429.662030][T16023] team0: Port device team_slave_1 added [ 429.754949][T16023] device hsr_slave_0 entered promiscuous mode [ 429.792519][T16023] device hsr_slave_1 entered promiscuous mode [ 429.832487][T16023] debugfs: Directory 'hsr0' with parent '/' already present! [ 429.879136][T16023] bridge0: port 2(bridge_slave_1) entered blocking state [ 429.886264][T16023] bridge0: port 2(bridge_slave_1) entered forwarding state [ 429.893784][T16023] bridge0: port 1(bridge_slave_0) entered blocking state [ 429.900859][T16023] bridge0: port 1(bridge_slave_0) entered forwarding state [ 429.998257][T16023] 8021q: adding VLAN 0 to HW filter on device bond0 [ 430.022509][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 430.040150][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 430.048751][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 430.075222][T16023] 8021q: adding VLAN 0 to HW filter on device team0 [ 430.092810][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 430.101444][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 430.108559][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 430.157558][T12604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 430.172424][T12604] bridge0: port 2(bridge_slave_1) entered blocking state [ 430.179492][T12604] bridge0: port 2(bridge_slave_1) entered forwarding state [ 430.216400][T12604] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 430.227449][T12604] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 430.237150][T12604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 430.247025][T12604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 430.258417][T16023] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 430.268919][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 430.315633][T16023] 8021q: adding VLAN 0 to HW filter on device batadv0 10:14:07 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:14:07 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) r2 = getpgid(0x0) r3 = getpgrp(r2) move_pages(r3, 0x0, 0x0, 0x0, 0x0, 0x0) 10:14:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x800, 0x0) r2 = fcntl$dupfd(r0, 0x406, r0) r3 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x2, 0x2) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000140)={r2, 0x6d5, 0x1000, r3}) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff0100000000000000000000000020000000000000000000000000000000000000000000000000000a00594e34420000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000643e768303c28f10d24c4500500"/112], 0xb8}}, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000000)=0x1ff, 0x4) 10:14:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x1, 0x80000) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000240)=0xfffffffffffff001, 0x4) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000480)={'broute\x00', 0x0, 0x3, 0xd6, [], 0xa, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000380)=""/214}, &(0x7f0000000500)=0x78) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r2, 0xc0305602, &(0x7f0000000280)={0x0, 0x7, 0x201a, 0x1}) ioctl$VIDIOC_S_PARM(r2, 0xc0cc5616, &(0x7f0000000100)={0x1, @output={0x1000, 0x1, {0x6fad, 0x3}, 0x3, 0x199a}}) r3 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080)="6a4d4c06282be207d067190b9472aef8f7889f8f71c162b11ce05f9655eb3ad8", 0x20) bind$can_raw(r3, &(0x7f0000000040), 0x10) setsockopt(r3, 0x65, 0x1, &(0x7f0000000080), 0x1d0) 10:14:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') write$FUSE_IOCTL(0xffffffffffffffff, 0x0, 0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) socket$vsock_stream(0x28, 0x1, 0x0) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f00000000c0)) ioctl$VIDIOC_S_STD(r0, 0x40085618, 0x0) shutdown(r0, 0x1) 10:14:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d353ff072d68b2e4dc14aa5fa8b3d94c22") r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x4040, 0x0) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000040)=0x3) 10:14:07 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4}, 0x3c) r1 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000180)=[{&(0x7f0000000240)="8105", 0x2}], 0x1}, 0x8000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000080)) 10:14:07 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r2, &(0x7f0000000000), &(0x7f0000000440)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r2, &(0x7f0000000000)='@', &(0x7f0000000180)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r2, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r2, 0x0, &(0x7f0000000200)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r2, &(0x7f0000000200), &(0x7f0000000180)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r2, &(0x7f0000000040), &(0x7f0000000140)}, 0x20) sendmsg(r0, &(0x7f00000003c0)={0x0, 0x3f, 0x0}, 0x0) connect(r0, &(0x7f0000000140)=@nfc={0x27, 0x0, 0x1, 0x1}, 0x80) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="2e0000002d000500d25a80648c63940d0200fc001000024002020000053582c137153e3709000180f0000000d1bd", 0x2e}], 0x1}, 0x0) 10:14:07 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x1, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000080)={0x0, 0x80000}) ioctl$DRM_IOCTL_GEM_FLINK(r2, 0xc008640a, &(0x7f0000000100)={r3}) openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x101000, 0x0) socket$caif_stream(0x25, 0x1, 0x3) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, '\x00\x88\xa2', 0x7}]}, 0x13a) 10:14:07 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000001540), 0x0, 0xfffffffffffffffe) r1 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x40000) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x2010002, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@debug={'debug', 0x3d, 0xffff}}], [{@permit_directio='permit_directio'}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, 'xfs\x00'}}, {@obj_user={'obj_user', 0x3d, 'xfs\x00'}}, {@hash='hash'}, {@pcr={'pcr', 0x3d, 0x14}}]}}) 10:14:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0775b0d5e383e5b3c06639d476a0bf", 0x10) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x8000) r2 = accept$packet(r1, 0x0, 0xffffffffffffffff) r3 = dup3(r1, r2, 0x80000) write$P9_RXATTRWALK(r3, &(0x7f0000000000)={0xf, 0x1f, 0x2}, 0xf) 10:14:07 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x1000, 0x0) ppoll(&(0x7f0000000280)=[{r0}], 0x1, 0x0, 0x0, 0x0) [ 431.558385][T16062] device nr0 entered promiscuous mode 10:14:08 executing program 3: r0 = open(&(0x7f0000000000)='./file0\x00', 0x20000, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xea1578157fde0082, 0x0, 0x2, 0x0, 0x101, 0xffffffffffffffff, 0x0, [], 0x0, r0, 0x0, 0x40000000}, 0x3c) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f0000000040)={0x3ff, 0x8, 0x4, 0x5, 0x6}) 10:14:08 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:14:08 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB='V'], 0x1) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x8da96bc2) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000000400)=ANY=[@ANYBLOB="0f226c7951000000"]) [ 431.726524][T16059] device nr0 entered promiscuous mode [ 431.773769][ T26] audit: type=1804 audit(1567160048.413:51): pid=16086 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir392602896/syzkaller.jS0Tip/308/file0" dev="sda1" ino=16648 res=1 10:14:08 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x1, 0x100000000013, 0x8, 0x8}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000200), &(0x7f0000000340)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, &(0x7f0000000080)='D', &(0x7f0000000200)=""/240}, 0x18) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x1510c0, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x5) 10:14:08 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="6e31bfd72c89323c0c80b5167329292c"}]}, &(0x7f0000000100)=0x10) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0xc0d00, 0x0) ioctl$KVM_GET_PIT(r3, 0xc048ae65, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x70, &(0x7f00000002c0)={r2}, &(0x7f0000000300)=0x14) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/rt_acct\x00') setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r4, 0x111, 0x2, 0x0, 0x4) getsockopt$inet_tcp_int(r4, 0x6, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) 10:14:08 executing program 0: mremap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000005000/0x1000)=nil) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0xe6b2a0d781fa6e41, 0x0) mmap$xdp(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 10:14:08 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:14:08 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) connect$rose(r0, &(0x7f0000000040)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, @default}, 0x1c) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000000)=0x7, 0x4) close(r0) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000080)=0x6) 10:14:08 executing program 4: r0 = socket(0x10, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000780)={0x0, 0x8}, &(0x7f00000007c0)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000800)={r1, 0x9}, &(0x7f0000000840)=0x8) r2 = syz_open_dev$midi(&(0x7f0000000880)='/dev/midi#\x00', 0xfffffffffffffffe, 0x280000) write$P9_RUNLINKAT(r2, &(0x7f00000008c0)={0x7, 0x4d, 0x1}, 0x7) write(r0, &(0x7f0000000000)="2400000058001f03ff07f4f9002304000a04f51107000100030100020800038005000000", 0x24) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f0000000a40)=""/236, &(0x7f0000000a00)=0xec) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) capset(&(0x7f0000000080)={0x19980330, r3}, &(0x7f00000000c0)={0x7d1ac447, 0xffffffffffffff01, 0x1, 0x219, 0x0, 0x5}) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x5b8, 0x0, 0x0, 0x0, 0x0, 0x268, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4, &(0x7f0000000100), {[{{@uncond, 0x0, 0x230, 0x268, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d4, 0x4d4, 0x764, 0xffffffffffffff84, 0x2}}, @common=@rt={0x138, 'rt\x00', 0x0, {0x9, 0x60, 0x6, 0x644e4b2b, 0x34, 0x2, [@dev={0xfe, 0x80, [], 0x21}, @mcast1, @dev={0xfe, 0x80, [], 0x22}, @dev={0xfe, 0x80, [], 0x15}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @mcast1, @empty, @mcast1, @dev={0xfe, 0x80, [], 0xd}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @remote, @mcast2, @ipv4={[], [], @multicast1}, @mcast2, @mcast1, @loopback], 0x4}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x8, 0x7fffffff, 0x6}, {0x20, 0x413a}, {0x3, 0x8, 0xfff}, 0x80000000, 0xfffffffffffff34e}}}, {{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x1d}, [0xff0000ff, 0xffffffff, 0xffffffff, 0xffffffff], [0xffffff00, 0xffffffff, 0x0, 0xffffff00], 'bond_slave_1\x00', 'ip_vti0\x00', {}, {0xff}, 0x8, 0x5f5b, 0x1, 0x2}, 0x0, 0x140, 0x168, 0x0, {}, [@common=@inet=@ipcomp={0x30, 'ipcomp\x00', 0x0, {0x4d2, 0x4d2, 0x1}}, @common=@unspec=@limit={0x48, 'limit\x00', 0x0, {0x1, 0x80000000, 0x3, 0xdc1d, 0x1f, 0x9, 0x1}}]}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x2, 0x40, 0x5}, {0x67, 0x11f0, 0x3}}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x2}}]}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x618) 10:14:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x200, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x54, 0x6, 0xad7, 0x0, 0x17, 0x5, 0x4, 0xbd8, 0x964, 0x1, 0x4, 0x80000001}) prctl$PR_MCE_KILL(0x21, 0x1, 0x2) 10:14:08 executing program 5: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[@ANYRESDEC], 0x14) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-generic\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x1, &(0x7f0000000100)={0x6, &(0x7f00000000c0)=[{0xdf, 0x8, 0x2, 0xffff}, {0x1, 0x4, 0x5d, 0x4}, {0x8, 0xffffffffffffff00, 0x7}, {0x1, 0x2, 0x80, 0x7fff}, {0xffffffffffffff80, 0x84, 0x4, 0x5}, {0x2, 0x5, 0xff, 0x1000}]}) splice(r0, 0x0, r3, 0x0, 0x80000000e, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000180)={0x6, 0x3}) fsetxattr$security_selinux(r2, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000040)='system_u:object_r:systemd_unit_file_t:s0\x00', 0x29, 0x2) 10:14:08 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mmap(&(0x7f00005d6000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0xffffffffffffffff) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xb7, 0x0) [ 432.295307][T16106] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 10:14:09 executing program 0: mlockall(0x5cf76d2032b8aa56) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000040)=0x7) [ 432.372909][T16106] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 10:14:09 executing program 4: setxattr$security_evm(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.evm\x00', &(0x7f0000000140)=@v1={0x2, "167bff3aecbe77fc0204b07761"}, 0xe, 0x2) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@ng={0x4, 0x13, "2ca3d22206e2191d5799596f9092"}, 0x10, 0x2) prctl$PR_MCE_KILL(0x35, 0x0, 0x4) 10:14:09 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000340)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 10:14:09 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x2000000000000004, 0x0) ioctl(r0, 0x200000880004523, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x7, 0x80000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x7}}, 0xfffffffffffffddf) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000180), r2}}, 0x18) 10:14:09 executing program 0: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x2, &(0x7f0000000000)=0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f00000000c0)=0x4000000000000000) io_submit(r1, 0xe7c24a08418146f, &(0x7f00000003c0)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x610d20cb}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) r2 = fcntl$getown(r0, 0x9) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f0000000100)={0x9}) 10:14:09 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x101, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x2}) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r1, 0x0, 0x0, 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x400454d1, &(0x7f00000000c0)) fallocate(r1, 0x8, 0x0, 0x8001) [ 433.221247][T16141] device nr0 entered promiscuous mode [ 433.761582][T16136] device nr0 entered promiscuous mode [ 434.423231][T16154] IPVS: ftp: loaded support on port[0] = 21 [ 434.455481][ T2542] device bridge_slave_1 left promiscuous mode [ 434.464846][ T2542] bridge0: port 2(bridge_slave_1) entered disabled state [ 434.503095][ T2542] device bridge_slave_0 left promiscuous mode [ 434.509473][ T2542] bridge0: port 1(bridge_slave_0) entered disabled state [ 436.382732][ T2542] device hsr_slave_0 left promiscuous mode [ 436.442437][ T2542] device hsr_slave_1 left promiscuous mode [ 436.509892][ T2542] team0 (unregistering): Port device team_slave_1 removed [ 436.525879][ T2542] team0 (unregistering): Port device team_slave_0 removed [ 436.538592][ T2542] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 436.578389][ T2542] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 436.657882][ T2542] bond0 (unregistering): Released all slaves [ 436.830124][T16154] chnl_net:caif_netlink_parms(): no params data found [ 436.865685][T16154] bridge0: port 1(bridge_slave_0) entered blocking state [ 436.872925][T16154] bridge0: port 1(bridge_slave_0) entered disabled state [ 436.881007][T16154] device bridge_slave_0 entered promiscuous mode [ 436.889560][T16154] bridge0: port 2(bridge_slave_1) entered blocking state [ 436.896766][T16154] bridge0: port 2(bridge_slave_1) entered disabled state [ 436.905120][T16154] device bridge_slave_1 entered promiscuous mode [ 436.923495][T16154] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 436.938728][T16154] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 436.960346][T16154] team0: Port device team_slave_0 added [ 436.967928][T16154] team0: Port device team_slave_1 added [ 437.155393][T16154] device hsr_slave_0 entered promiscuous mode [ 437.192703][T16154] device hsr_slave_1 entered promiscuous mode [ 437.372299][T16154] debugfs: Directory 'hsr0' with parent '/' already present! [ 437.427552][T16154] bridge0: port 2(bridge_slave_1) entered blocking state [ 437.434695][T16154] bridge0: port 2(bridge_slave_1) entered forwarding state [ 437.442396][T16154] bridge0: port 1(bridge_slave_0) entered blocking state [ 437.449518][T16154] bridge0: port 1(bridge_slave_0) entered forwarding state [ 437.515511][T16154] 8021q: adding VLAN 0 to HW filter on device bond0 [ 437.537131][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 437.562699][ T2999] bridge0: port 1(bridge_slave_0) entered disabled state [ 437.570509][ T2999] bridge0: port 2(bridge_slave_1) entered disabled state [ 437.601167][T16154] 8021q: adding VLAN 0 to HW filter on device team0 [ 437.619224][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 437.630624][ T2999] bridge0: port 1(bridge_slave_0) entered blocking state [ 437.637873][ T2999] bridge0: port 1(bridge_slave_0) entered forwarding state [ 437.668529][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 437.681313][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 437.688461][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 437.725432][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 437.743169][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 437.751764][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 437.773811][T16154] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 437.791812][T16154] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 437.800726][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 437.820317][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 437.841391][T16154] 8021q: adding VLAN 0 to HW filter on device batadv0 10:14:14 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:14:14 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x40002, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x18) r1 = getuid() mount$9p_virtio(&(0x7f0000000080)='{,).\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x2, &(0x7f0000000140)={'trans=virtio,', {[{@uname={'uname'}}, {@loose='loose'}, {@fscache='fscache'}, {@version_L='version=9p2000.L'}, {@version_u='version=9p2000.u'}], [{@seclabel='seclabel'}, {@seclabel='seclabel'}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@fowner_gt={'fowner>', r1}}]}}) 10:14:14 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) bind(r0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x401, 0x42000) ioctl$UI_END_FF_UPLOAD(r1, 0x406855c9, &(0x7f0000000100)={0x4, 0x1, {0x0, 0x4, 0x1, {0x800, 0x7fffffff}, {0xfffffffffffffff7, 0x5}, @const={0x6, {0x51f, 0xfff, 0x8, 0x2}}}, {0x51, 0x0, 0x7, {0x6, 0x6}, {0x1}, @period={0xf2c4221ee6fcee40, 0x9, 0x3, 0x3800000000000, 0x1ff, {0x3, 0x7ff, 0x8, 0x7}, 0x9, &(0x7f00000000c0)=[0xfffffffffffffeff, 0x3, 0x2, 0x8000, 0x228, 0x9, 0x7, 0x1, 0x4]}}}) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x200000, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x2) 10:14:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x7, &(0x7f0000000780)="11dca50d5e0bffff80f070cd2a70db054f57137aaf245b4cbf39ccd4bbe836cd4ac7f04f2e9b30f4fbba039a37692365ad71a90c472750643ba99f4adb80c316f55e6688da2df32333991df5a0b502d4544a7e5f5d67f9966b9b86bbd40a32aa3862bf8426209c099d5b6ba9324efae7c741636b169349ae6620385231fdb4343efa9e01d41f55ad1c6c4a28340b2aff5723dc255b4f13eeb30ccaa420f16d40dd8d4bf7e8163b8d7e17069e6b62d1fd39100ac8f1374fe48dadd5") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='syz_tun\x00', 0x10) io_setup(0x4, &(0x7f00000000c0)=0x0) fstatfs(r0, &(0x7f0000002980)=""/4096) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) io_pgetevents(r2, 0xffffffffffffffff, 0x2, &(0x7f0000000100)=[{}, {}], &(0x7f00000001c0)={r3, r4+10000000}, &(0x7f0000000240)={&(0x7f0000000200)={0x80}, 0x8}) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @multicast1}, 0x10) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000380)={'ipvs\x00'}, &(0x7f0000000740)=0x1e) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000180)={@multicast1, @local, @multicast2}, 0xc) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x18000, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r5, 0x80045300, &(0x7f00000002c0)) setsockopt$inet_mreqn(r1, 0x0, 0xc, 0x0, 0x0) writev(r1, &(0x7f00000028c0)=[{&(0x7f0000000440)="208aa1304a7b62d5ea868008113ebf2d4a5c1854a470e4bd54390e0c08ea5aacc7fd7181a147216287be7626e504273a61e2da18bb87c0ee2e9e50e614b626459dc6b243e60e2ee6720df768b91a445ba8b0cf04fac5f345c7e90177", 0x5c}, {&(0x7f00000004c0)="2f349bf542b192c3a65af2f2c6355974f82a757ada7d4490f3ae1f8f0ff4c43a5759245bb94e1d9954e89db81577be104a56745afb754af417831067b7f038ab5ab9a748d2a6d7714929954c5c10a24b56dc09c6f2b0f89d5ffa8d1bed2daa83f9c24206e0486c71db21b394923f2efd597c0b7c925e7e0d9a8fd45707d5097258c89d353db62a76e661b9251153e4db21b5acd05ecbbc4cc0ef3856b158c38f92ecd9", 0xa3}, {&(0x7f0000000580)="e677bbeffc1ade12617396025ae4db8556e195519bcf3f85e15a43e9b1920b027c59183af17593c2324bdd8415d036f1fa948e1ee39af8df14ff7454709569b21ecc454d1ae5042f3c1da03febb89c95dea847dc5b9a5feb08994b8eaefc8615140b1a525ed43909b41f3ed7d0c75380836b6481271c62a13aa8cb0ba5249e36c903cabf82db7745c20e0248a853f7e94219545883d42139dd6c81f362bc824bda859db7ceece77b062d09c0428275c5c90b0b671e36015fe4f695d53c672eeb476439e6b661261fd8e2e6b94668277c510acd47cae5e38d26f53ebce82110dc0ce42dd3e20555bc09486cf6c97254936447e231", 0xf4}, {&(0x7f0000000040)="3b533bff65da072072b96f588a9359481e98a01ddde3c11b2881648ec28e687caf109a84a0cb4c1c2b6ae48f6b879508", 0x30}, {&(0x7f0000000840)="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", 0x1000}, {&(0x7f0000000680)="93da27740d459bee8a5290a5c193ab5a9b556d4fa41392", 0x17}, {&(0x7f0000001840)="b75148b216ac7e64c88111d7b9a1ad31e1defd45eeaa2a5187c3bd4e1471c5427f11b5f6831d9a354548d0d093b9db601d72f2532b8fdf69088e10ecd108a899d43e8b8be93f7ed524ed7cec4e0aaa1efbdc5888cff52c3c3b98df2194e3336ecbecde49d7947e5e0accd160911e2408a7503223818701a562d3c8ddcc62610aa421707c15ef9c071fe7e8bd815b3d831373f0193c4c8484b124342bd0d9a97e4bfe2e88a9c69cc4b87d5f9e404f587b82ef15172346f1c09155489aa3f99af137506d1f656f8ca8c42b2ee6c80c8b906bbb47210264597a45b2ee251f0b1091f1054a2ae15790fbc1b2e341656750358a893d560058cd9e421fad8d215a3986ad98130eb56a420104acc149e56b9a0d7c238be3bbeadea4a8d2f9800cc8d5c786cf1c01a172e340587d2401f4fa5f5e22afd7ccdf0be2372adc1c0b1262b3f049399fe030c4db14ee9c209555a6b4c3d768b9742f78f22f745a7136bf139516f67bb9b83a94b3b31c52f3f2a4a8d4681afc90b18953b447bf75611c924f0cc4030aa9408de46bce395b2adf0f7a655f9626bf2d46ad7e04785d5af1e3d94d8437d7029f4611261bde1fd8918ac91fc18a8d22b6f66e91ef8365af319bed73ab267ff19c373af82ba8cb440c42633e3c655a3c1b5606e4a780b341ea6497f56ae66374f43a6bc0490b7d5af5cd68dc4ea9abdef860600ea7300ac68db1c034ce034c84c2e6e5214fcac1a6b9622c71033580122f55fe3e9e2af7c889ca78fa585efbf4848cb899605f9966a2363b49c478c4eb001c4cf6007ba1af8c6995b66b0ecc16b6e472e609ab3822b8f99db544950bcd4b3acc1a486393afb3b4b5e36b15201bcf20aedcbab185322ad76d4477f4f3c0a76264e53a77daa0076369ea5479d0f214ce2389f98f8f46f5d56eb02a36f65ed4d06d4e745d4948fce8b8143a9e21b2a96dc483a2f2f549a9fb8df748618f60d294734d61b3be416c74be37ebad68d6f94a75cd9bbb55c54150c0f61bfc58a2732438df5afe70a9106ea46de35dd5d6520bf20e038e6971c345a21b08ded67db141bef0716d40a82bcf77e6274dd73488befd24c72490a807dc0a3cb6bd1964a808d8a5b3a4135c4ab2fd1ea853a3a0779ee2a703ca59dd909656086614a61cf6e8e632de134ebe85ae46cd3bc9c2eecd58ac48b7b25fe214f3b9cb40f44c23160fb110292959c54413332362dca81982b67ccd1ff525dd951f4fc2608fa003d6baff52848dab063ef3ad34cb4711f5621a46a53db89bdb9502c3c80d03519dd21fb15bb4d6ac9b5958895ef963d6d68f99ac813d107ede9ea39c7ceca35795e2215ff4f7fd632b09bc91a3eec41a479a66482669b3a7b0e515492652e73e19604dfebc8d111d7158915c84fa25a59930588f0719b62950b98bd40304091c031cff89f78761e95b549c932752e0e176c4c267dacf9145d133f5ef3870b46f8d2af74feca72cd4c244f550b66236aeb59ce200034d7fe81f9fadf13983028fbff67e828927b70c4442288bc1efca889a5762a92f3e5b6d448cee8a9576e6a8ba4f2d675379c179ec93d52888ce8d790e0afb3001dbebcf122870843759e3eed86f81f51bf816bdaea70d1aa8215c8324908f5460b21df34e3c7a3d72ad8f321111af104620df6728452ab82ed6da1a08824406bb07ecf96595f60dcdf4043122105bb3f5e5d1c03193538708910cbf27b690fd1aa67d2f8e0376010898e184c2aaff4c839d4354af144f009ea023da52e884d6f84c1c581347c74186bbf08379699ea6036462ff253971a00fa126bcc571e1822ce97cab9256e194dc89e140b30b3710c98e8dd3b245f12ddbe6d98b69d8a0c4eba8fcf2161204ec6bb2bbd921dad4c25b02bd29f98e431bd49659d8e1cbe88c86179129cf8ae443949fc5473adb15521a9d7e04991403d4b1e24d1b30794d512e78096a81c99e11df45e7f22117e2a0e4a5ee471ac5258e2c8afd8365775128f8e552f34e44fd1681bcc7797a0d76c1327300dc79fc8347783b6f7eff69bdf7c7f980c17c1bfff5f92322fe301734542fe460b23d78c9196fa99c1eb3d88d29d3ea0aae5551e215e797321096e2b6e382a752836e81b1abcc4fa9d6e7dcf1a58a3b391feab1d8170da1f1c0ac7299df8acef8b8b16bd0253bea92c61213151fe314e2419dc9d6ed8cb3f9bb9ee7d0d57a294da8b44ee88582a0a329db1a535e7a7c353eb9c88f177fc324f3ecb7d75c51fdc66e4ba86f89e691585409796adcdb112b0ee284624620deb35df5e154df14e701ec7d6c1d0c9574803c0cfc42f022ace34f378e043c456652db4528c83af95a4dcbae761a547316f49d8e0318e5ed638e0ee6c7b65e122f1abc79e4fadb50b0f1963576d0be054b4561d0dcb6a6ff8ee14569678618bd5fe42ace2dd0107089726d55514487c4879c30082c4835301ab372daadfc00735297758e35cda822e9a8b955636c8a37441b56a0253616959f9ba0c0e8be23585c82bae896ec37c569a36164156a07ede8bbf942f17855e677c75d4ea7789d19401bb4d76ec60b05b4d414d4f150de7e997220722fe4eb7bf759dbac2b50f01d642465d4db66d7fcbdd1e55308c82db7a29d77db708ecfa86e55d9b512e9f645d615d1bea8206d413e115147532572e8469a79ced66481c9919293435f01f99577b53447440c0b7eaf7f959528bcdf221ef2bcb4e5edb3e2f64d63deb36386062eef167763c573e7ab8c879c2ae38bf56c08fc87627180f3e1dac1211aba645ecb937f3ce62fd1437e927a5a6c3c38fb0b7a15a31b7efe8979f3f436f36324ccac7abe48eacd2dda1e62ce38003c298b70d5fdece05dc68e75ddf6fe537aed47febd956416e76889967c159c4430375fc8da8223a58eb430462a207d630a632b10e6ec117645a739472905d618c1e846b65ecf8c65979af510622a66b7073776b1a9080328126693ce7bc75c5dd61c40c63b0c42c580f11235ddbc972b20d6cfa9634ae97550199da1270744863725e1d79d27e5d4c80382237fae1b1d40b225e20139609eacdeaa163947e22be4839a39a0904e9ba28688b4ed385d24403ba24711de738b423fb1a864980b4d3d49175e83f990e140a18513b96f0cff710369a8c9fddddc428568f4ce582d3e2650d9de079f7c7fd6517e26cdc9095ea9819f4de7c03d6b557859d645a26b5147d63ac04908c160cfbb90692c4996ef5e4f59a62d4fe1e6bbad76800b136dce127f398c5f8d711bbde7f66adce57c235ded9743f2a9aff3b6fe3ea3b38071c1eacfebc741ee195aab76c1edba04b3d318353ade2cec04590eba839ec9b88dd2413e7c91084a2d393ea7062f6e3cb01b812f78c28123a22efc465ab69642d101320ebe8aa3a53b61ca369065ff76aebd235165fc8c7496abdfcdb85638549f6bfcbf4c97037368458a27d603f1e672321c02e8bf9f756cb5739e445a9a40412552f8de40beed4f015aebae06821aaaf54382202c3041a1b04f81df966501c232715949042197d4425d0b16fb8711b72e38bbc78e124fe4898b5500fdbc63f2c53ecb9f91099ba62a1f386ea6392356ced74e0529d6c16c87d3b7661df1c973797a53bb61a2b5b15267ae8f51412d2d2833704bcc0c9c74a1ed006589e53652b85b58f9125895c42ef23f783297e973d5e5b77b658689d9e687869524bbf204effca4a510db18cc62209c2f6094c80b07c0883c39266c6014a2c73e83440b80e053e0f75345a5c930e32d8c85d613a5dc655d1ea577b51c8108037dba6ad58e70a56a08c4cc18d92d46d5dd1a809e0ba6a37271f59f069c7aac1df651cb4e44494f5cc924cbe13aeca685d42216316b61fc21a2418ba7639f1af78cd50dc6a0e21b245abd54151669b4d1a45e45801e03e4973b4b3d82368020082150436a3c9cb2d2f4681f61eb86101409ee3619873301e112b1707c26e86ad0e1d33f45709318efad882266a2ac2959cb208dfdc8e47de4fc855f8091f3d8cfa25da96f6c54780c4f536c881c4af36b273253ee94fc3afaa5e0d396011aa74b16bdd5023bbbab1f77c56e47e9a9a118efc26d51e1633f564ad360bdfe8810971d3b7302971e87f9159cc798881efb99321a69c12fddceeb24eafcf4997f2f21d03f0548d590ab50256094900fc8f8caf138bf1da8a7a5df4834b0d172e7e8c973a7d30e704de51f047940cc3fda22b24c648d7b6ac579c81f4a476e0f3633003c6a64e7329e70baac45e7c7092dd6aa5d8c4cbc83c4348021e732eac1f5366c27ddb2e5ec1ac3302e3fbfa5c7c1a8f70c1336b69c589f9a9294dd8b165e25556ea32e773fd92be022d19fbf7e80d418d763eeea3bb416381cdecac416f22d08ef30214f2f3a3ec7e81e1d33c2efffefcb2a6e619ea410409b62a25012a79ff368e39645b4d3c7d98caf7c79c1215315f24fe12bd1130ab1494e86dacfbd600736e08be0ca5cb7fbb7ec88111065369fe85e68a12aca8fd3c621393b3a761e60221750bc7a8a36c7fd7c7fc1238bbfa8536829781dba4727b5abe96d76974e8deeac2ac40da54b4bf0244d7d339284172a086fdf1530d622582ae6a1e1e1a2613691700e5bbda6701b65ef119ff363bf86127e0ac497fc8e6023fa044912315465c862da2c292e3d44edff0c1807ca1487a87bbe8c8f8d3426ce455b2073de9e48d7617affecb568bf5d751778bce4fa7785d49ad93bfbcd22ad79025f987861eee52a8fcc56d971f671f3e02dcac3d26734b1405314d17a1225a054b3e3f8203f0e94abfd507705a8bbc38ed722bba9e29efd1e78b5b4da8bfc2ca2622bf234e9319552bfe902b73a6cb52987f8162b28c3de53c54840b380176d1a05e835d9fd91ced4f5a3d7de2632aa55862de146937506e5b8b485dca8d01381dbcad7d566286a6534c9dabfec23f3d31618b03e4f5cfd0c274cfc951e50e14c064329a1529e0a06fd9d2aebbe20c36ebfdc7ad57b9f529feb29a8ca5a185a8891ce1534ff8b5a539a6fe722eff4b40acc41dd228c24e60a81d2087771f5bf72f300d13dbb5ab6ec0b71ae91ae669b843643262b03d652cb4079b4d5b306cb854eabbd2064db6c073949f6a7130975822f3543d6ed3aa1ae5301d6fb58285bb5d66437ebaf1a1a9d5b174400b9d2ca68155bda043476c431049deb09998646daedfd772a4d10163df7a495d7ac2abcaa233643ca98d81bd007d5221f950430cc1bb501065c4a130e8e040f28d29e4a2f0a04d700036bf26c7906e37341c983bcfd26204a2929bbbab8808e128b244ad4a32ee0c92547543c783e7a230d72fec3917720e61fda3cc868df48b382a662f1b23de31200bb4035d18c70f00df85bfde4dd3d9deccc5bcc2a22f1a647dad97d145077689c2904780ee1969dcdd9612ba21bcecccfb7e8f4b0cc1df99bbf73f2057818fc452b39cc1de19307bc94077c66d9a45cbc73e4ae89e6e9d03ba3176b78b26a4333e3e5309f35d857ca0e0ebe956189a99e4f14ced7813e1be9583474bda079be932bd8a62de94c6acfff2debdcf4f923db95f1c41dba05aa670e9ebf97d1f7efaf22abef78f272b784252d1b439b9731afc367e826e147199089e55e97de88683b0e8b67225f7e224d72f2fd130225170e9817f0bdf00b8c2e04575bdfb8d003e9274734706d5b190fb7c7acff9663c9fbba9913257bf6b48fc29b85bca8a348aafe2e0211a893c8cbf0c167dae716e0a3ce8f35d8a96b9723b84ee22ac624d112f3b11480b0fe9a765a5cb547eb26dd91078e3841e8a082c0c1", 0x1000}, {&(0x7f00000006c0)="525a1d28ccc31040ac623b4a7d0b79362f196b9a5032376947cd52278003c659e1ae20fc0f13d0d832b144e9952ca93a8de66ace8d3680a08757c74b7f19da00728416", 0x43}, {&(0x7f0000002840)="95a0e0f9af10a8cb28748fde35184917e418db7afad06a83642f0220fdf92e61313dd290b9b13393ec6a54f25ccb1c29e4386f9a85c1faa85d518671856b5172bae9fddca041ec3fbcc3ceca378355ace67e676038f418db0859", 0x5a}], 0x9) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000003980)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="020029bd7000fddbdf250100000000000000014100000018001700000000000008fa7564703a73797a300000000014ff643fd906440744cb62eae34260fca2178ba1e9489a8cb9c08eb63abdaeff93bd0dbc0620d16566151fcb6cb2e81a4c953b093cbc1dac60a7754b084b104dfbce"], 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 10:14:14 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@noquota='noquota'}]}) r0 = socket$inet6(0xa, 0x805, 0x0) sendmmsg$inet6(r0, &(0x7f0000000000)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000080)="b9", 0x1}], 0x1}}], 0x1, 0x0) 10:14:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = accept(r0, &(0x7f00000000c0)=@pppoe={0x18, 0x0, {0x0, @random}}, &(0x7f0000000140)=0x80) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r2, 0x7c6eebe37ec075b4, 0x70bd2d, 0x25dfdbfd, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x3d}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x8010) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002240)=ANY=[@ANYBLOB="cc0000001b0009010000000000000000ffffffff0000000000000000000000007f00000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00\b\x00\b\x00\b\x00\x00\x00\x00\x00'], 0xcc}}, 0x0) 10:14:14 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x1) shutdown(r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000, 0x92) ioctl$UI_DEV_DESTROY(r1, 0x5502) poll(&(0x7f0000000640)=[{r0}], 0x1, 0x0) [ 438.236141][T16170] syz-executor.2 (16170) used greatest stack depth: 20440 bytes left 10:14:14 executing program 2: r0 = openat$usbmon(0xffffffffffffff9c, &(0x7f0000000000)='/dev/usbmon0\x00', 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x5b1840, 0x0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000080)=0x5) 10:14:14 executing program 3: r0 = gettid() write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x12, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) process_vm_writev(r0, &(0x7f0000000000), 0x0, &(0x7f0000121000)=[{0x0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0xa2d) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000300)=""/64, &(0x7f0000000340)=0x40) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x100, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000380)='/dev/audio\x00', 0xa2bc4102cdc9e7f6, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000200)={0x78, 0x1fe0, 0xff, 'queue1\x00', 0x30}) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) r4 = getuid() r5 = geteuid() mount$overlay(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x807020, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',uid>', @ANYRESDEC=r5, @ANYBLOB="2c736d61636b66736465663d102c00"]) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r6 = syz_open_procfs(r0, &(0x7f0000000180)='pagemap\x00') r7 = add_key(&(0x7f0000000440)='syzkaller\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="eaf4dcd6041743ce84e9e9d574d31513e8cab4a4b760b5841d6dd6ec349e85410fe9893d6e93731199c46c1b776bb8e58ab6126fe25d94ccfc598bc1f9e77ee5d0b6bc8035f586654d91c6fac4fdc7e28b2b8a3472b738c6b5157cca985ab8c79bc71fc7887634a06031c706a4d630d0087df0d2351b40d4b695506643a47383c2d0e1c12c1c79ef74c9a150b3974931b47b3c615e1b90c594df321736cadd42379cfc498c507f284fadbc63865e7081399b22b39ba1f176a9613ea31b7942e65983251f9d6731f6f039adb9137a7758f9823be52adddded6f2e7156e1090b", 0xdf, 0xfffffffffffffff8) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000880)=0x0, &(0x7f00000008c0), &(0x7f0000000900)) r10 = getegid() getgroups(0x1, &(0x7f0000000940)=[0x0]) r12 = getegid() r13 = getegid() fstat(r1, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r3, &(0x7f0000000a00)={0x4d8, 0x0, 0x1, [{{0x4, 0x2, 0x6, 0xffff, 0x3, 0x1, {0x5, 0x0, 0x9d, 0x7, 0x9, 0x8, 0x5, 0x0, 0x3ff, 0x101, 0x7ff, r5, r8, 0x2, 0x20}}, {0x0, 0x2, 0xa, 0x80, '/dev/uhid\x00'}}, {{0x3, 0x0, 0x1, 0x3, 0x3a45, 0x80000000, {0x3, 0x7, 0x49c, 0x5, 0x0, 0x2, 0x8, 0x10001, 0x400, 0x101, 0xfffffffffffffffc, r4, r9, 0xfff, 0x2519}}, {0x0, 0x9, 0x8, 0x80, 'overlay\x00'}}, {{0x1, 0x2, 0x80000001, 0x2, 0x8, 0xb, {0x1, 0x100000000, 0xffffffffffffffff, 0x8, 0x0, 0x5, 0x7241, 0x4, 0x1ff, 0x6, 0x100000001, r4, r10, 0x5, 0x6}}, {0x2, 0x5, 0xa, 0xa2, '/dev/uhid\x00'}}, {{0x6, 0x2, 0x7fffffff, 0x0, 0x100, 0x8000, {0x2, 0xe, 0xfffffffffffffffc, 0x4, 0x5, 0xd44, 0xcb0, 0x100000001, 0x7, 0x7fffffff, 0x9de8, r4, r11, 0x7fffffff, 0x6}}, {0x0, 0x400, 0x1b, 0x8000, '/ppp1}(mime_typewlan1cpuset'}}, {{0x3, 0x2, 0x6, 0x80000001, 0x5, 0x1000, {0x1, 0x0, 0x8, 0x9, 0x8000, 0x9, 0x1000, 0x80000000, 0x200, 0x0, 0x20, r5, r12, 0x3, 0x100000001}}, {0x2, 0x5a8, 0xa, 0x0, 'selinux{+\''}}, {{0x3, 0x2, 0x4a, 0x8, 0xfffffffffffffff9, 0x7252, {0x1, 0x8, 0xff, 0x100000001, 0xfffffffffffffffc, 0x2000, 0x5, 0xaf15, 0x81, 0x0, 0x9, r4, r13, 0x200, 0x8a4}}, {0x5, 0xe03, 0xb, 0x39f, '/dev/audio\x00'}}, {{0x6, 0x2, 0x1, 0x2, 0x1, 0xfccb, {0x2, 0x9, 0xffffffffffffffff, 0x8, 0x2, 0x6, 0x7fffffff, 0x81, 0x800, 0x7, 0x8, r5, r14, 0xfff, 0x2}}, {0x6, 0xd20b, 0x37, 0x8, ',wlan0self]securityproc@wlan1vmnet0&posix_acl_access.\xa6!'}}]}, 0x4d8) add_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r7) openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x2, 0x0) fchmod(r1, 0x80) sendfile(r1, r6, &(0x7f0000000040)=0x100060, 0xa808) 10:14:14 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GSUBSCRIP(r0, 0x89e1, &(0x7f0000000340)={'eth0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\r\xbb?\x89\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00$\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x17\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00S0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_/0\xc4\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x03\x00\x00\x00\x00\x00\x00\xf4\xff\xff\xff\x00\xee\xff\xff\xff\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h\xe2\x00', 0x0, 0x8}) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40200, 0x10) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000), &(0x7f0000000040)=0x4) 10:14:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x80000) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 10:14:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1800000064000905000000000000000002000000017d63533a53688abef847f6569d82e284a27209bfe14be5098442292841", @ANYRES32=0x0], 0x18}}, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000240)={0x164, r2, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xe8, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0xaa, @rand_addr="3d108660df61ae5e8f00a4244f181a42", 0x1f}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x4, @dev={0xfe, 0x80, [], 0x24}, 0x2}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x80000000, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfff}}, {0x14, 0x2, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'tunl0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x81}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffffffffffffb7b0}]}, @TIPC_NLA_BEARER={0x44, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}]}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x164}, 0x1, 0x0, 0x0, 0x10}, 0x80) 10:14:15 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:14:15 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r0, 0x80000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0106418, &(0x7f00000000c0)={0x8, 0x85d, 0xfffffffffffffffe, 0x6, 0x2, 0xfffffffffffffff9}) mq_open(&(0x7f0000000100)='\xa9.security\x00', 0xc3, 0xb831abaa8273a3fe, &(0x7f0000000140)={0x8, 0x9, 0xffffffffffff3279, 0x8, 0x6, 0x9, 0x101, 0x8}) 10:14:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") futex(&(0x7f0000000040), 0x4, 0x1, 0x0, 0x0, 0xfffffffffffffffc) 10:14:15 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f00000000c0)={0x1}) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000080)="390000001100090468fe0700001b00000700ff0003000000450001070000001419001a0006000000000000000001000800005c14dfb51571a4", 0x39}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 10:14:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x95, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f0000000000)=[{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000480)="8cab02ccf9cc5403b0d5b85f5c6fefac3291695a513feab93e539dbad181d614e924d6c4821c24bae1d8ae9c08aa3f0c890ebd62f1f905b57e42e330d52bc15c218be0351cc7749dba5e8a68a24e67c39b730fa953a7236515ef23df3ade12fd0ae4253afcd4cd9139d14c7bcee58fd8c0dd1d0bded30b74431d24b60afb3d86aa", 0x81}], 0x1, 0x0, 0xfd7e}], 0x1, 0x8000) recvmmsg(r2, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0xfffffffffffff06}}], 0x1ae, 0x0, 0x0) 10:14:15 executing program 4: madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0xc) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) 10:14:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") fchmod(r0, 0x100) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x240, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000000080)={0x0, 0x0, [], @bt={0xffff, 0x8000, 0x5, 0x401, 0x0, 0x3, 0x4, 0x4}}) prctl$PR_MCE_KILL(0x35, 0x0, 0x4) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000140)={{0x8, 0x1000, 0x78763de7, 0x2}, 'syz0\x00', 0xa}) 10:14:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) perf_event_open(&(0x7f0000000600)={0x3, 0x70, 0xfffffffffffffffc, 0x0, 0x2, 0x0, 0x0, 0x6, 0x104, 0x0, 0x0, 0x9, 0x9, 0x4, 0x0, 0x2169e509, 0x9, 0x22, 0x4, 0xab, 0x1, 0x0, 0xfffffffffffffff9, 0x9b7, 0x0, 0x9, 0x0, 0x0, 0xe6c, 0x2, 0x1000, 0x0, 0x0, 0x0, 0xd351, 0x80000001, 0x5, 0x7, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f00000005c0), 0x4}, 0x8800, 0x4, 0xe5b, 0x5, 0x1ff}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000680)='/dev/null\x00', 0x80200, 0x0) r2 = openat$cgroup(r1, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) setxattr$trusted_overlay_upper(0x0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000a00)=ANY=[], 0x0, 0x1) bind$inet6(r3, 0x0, 0x47) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) renameat(r2, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000100)='./file0/../file0\x00') mount(0x0, &(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='proc\x00', 0x0, 0x0) getrlimit(0x7, &(0x7f0000000140)) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r4, &(0x7f0000002a40)=""/4096, 0x1000) clock_adjtime(0x6, &(0x7f00000004c0)={0x3f, 0x2, 0x0, 0x0, 0x0, 0x9, 0xffffffff, 0x5, 0x8463, 0x5, 0x20, 0x34d, 0x2, 0x9, 0x9, 0x100, 0xffff, 0x20, 0x0, 0x10001, 0x0, 0x5, 0x3, 0x100, 0xfffffffffffffff4}) mknodat(r1, &(0x7f0000000180)='./file0\x00', 0x2, 0xa479) 10:14:15 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000000c0)=[{0x2b}], r1, 0x1, 0x1, 0x48}}, 0x20) fcntl$notify(r0, 0x402, 0x8) 10:14:15 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:14:16 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0xfffffffffffffea0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, &(0x7f0000000100)) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x80000, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r2, 0xc008640a, 0x0) syslog(0x0, 0x0, 0xfffffffffffffeb5) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x7}, 0x8) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffd39) pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) prctl$PR_GET_PDEATHSIG(0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x715d1550cb74765a) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) renameat(r0, 0x0, r2, &(0x7f00000000c0)='./file0\x00') setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x77) setfsuid(0x0) sendto$inet(r1, &(0x7f0000000240)="1b", 0x1, 0x8000, 0x0, 0x0) close(r1) 10:14:16 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e65772064656661756c7420747275737465643a656d3120303030303030303030303030303030303335383000289c2411a45e180086417bce7667eb6c3bd39d27dfe4a0b3573eba99c8c540c9a362a817fb32425ebbc2d528a0d636ee5112449cb065598ce9224d038c07c47449029796b31df77d6b34c74295c4faf7eea352b39d3dbaf9a5f841478d49d1b1fe0e16e51e08eb5a092d03ad93f17e00f6d5f2830e46cd9d57071777196c7c745d30357889587753a0f4683a41df"], 0x10, 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) clone(0xffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000000c0)='.dead\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) prctl$PR_GET_DUMPABLE(0x3) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x4000, 0x0) read$char_usb(r0, &(0x7f0000000200)=""/192, 0xc0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:14:16 executing program 3: r0 = socket(0x400000000010, 0x2, 0x0) write(r0, &(0x7f00000002c0)="2400000021002551075c0165ff0ffc020200000300100f0000e1000c08000e008000a000", 0x24) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x3f) 10:14:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0xa2762718ec785d0, 0x0, 0x0, 0x342) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$SG_GET_SG_TABLESIZE(r4, 0x227f, &(0x7f0000000180)) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000100)={0xb, 0x0, "1b975b"}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) accept4(0xffffffffffffffff, &(0x7f0000000580)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, &(0x7f0000000000)=0x80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 439.450654][T16250] encrypted_key: insufficient parameters specified [ 439.541456][T16250] encrypted_key: insufficient parameters specified 10:14:16 executing program 4: r0 = socket$inet6(0xa, 0x400000000000002, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000040)=0xffffff53) r1 = socket$inet6(0xa, 0x7, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x1, 0x0, 0xf}, 0x20) r2 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x2000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r2, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x98, r3, 0x800, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'gre0\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x16}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x60}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @remote}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x32}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3ff}]}, 0x98}}, 0x8000) accept$nfc_llcp(r2, &(0x7f0000000140), &(0x7f00000000c0)=0x60) fchmod(r1, 0xfd1c42079e2de099) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000001c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xed24, 0x1, 0x3, 0x2, 0x3, 0x9d8}, 0x20) [ 439.583669][T16250] encrypted_key: insufficient parameters specified 10:14:16 executing program 3: r0 = socket(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000000)=0x100, 0x4) getsockopt(r0, 0x0, 0x53, &(0x7f0000000000)=""/8, &(0x7f0000000ffc)=0x2f1) bind$rxrpc(r0, &(0x7f00000000c0)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @multicast1}}, 0x24) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000140)={0x3, r1, 0x1}) 10:14:16 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getpgrp(0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0xfffffffffffffea0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, &(0x7f0000000100)) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x80000, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r2, 0xc008640a, 0x0) syslog(0x0, 0x0, 0xfffffffffffffeb5) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x7}, 0x8) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffd39) pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) prctl$PR_GET_PDEATHSIG(0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x715d1550cb74765a) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) renameat(r0, 0x0, r2, &(0x7f00000000c0)='./file0\x00') setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x77) setfsuid(0x0) sendto$inet(r1, &(0x7f0000000240)="1b", 0x1, 0x8000, 0x0, 0x0) close(r1) 10:14:16 executing program 2: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x3, 0xffffffffffffffff, 0x3d21c8ef28d94b67) r1 = fanotify_init(0x0, 0x0) creat(0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) close(r1) 10:14:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa8040) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000480)) ioctl$sock_bt_hci(r0, 0x400448e4, &(0x7f0000000080)="cbf93a6ff5431b1d3a914902c4f54e6ca7c0c53c5e") r1 = socket$kcm(0x10, 0x27, 0x10) ioctl$TCSETX(r0, 0x5433, &(0x7f0000000000)={0x0, 0x4688, [0xc5e3, 0xffff, 0x5, 0x1, 0x7fff], 0x2}) sendmsg$kcm(r1, &(0x7f00000002c0)={0x0, 0x40, &(0x7f0000000140)=[{&(0x7f0000001900)="2e0000001d008104e00f80ecdb4cb9d902631912140002003b000000120001081506000040d819a90600150000ff", 0xfffffffffffffeb0}], 0x1}, 0x0) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000200)) ioctl$SIOCX25GCALLUSERDATA(r0, 0x89e4, &(0x7f0000000380)={0x7, "8f0b3eba39e125bd070cd9fcfa049f998787cf1bd2e9e52eddb435d20e57a9cd00d1620631d8f6cc7a6d550f021adac98f0f0c1fe39d32c798bf3b8164df7159f36702211bc9c5b09e8d682fe65a282e76b15e9b0bcc546a64010b4884356ecdcc840e468fa7627a22b3f3a2e7dd251812207fcc1b47fb7a6ae172d811847ad0"}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)=0x0) process_vm_readv(r2, &(0x7f0000000600)=[{&(0x7f0000000440)=""/47, 0x2f}, {&(0x7f00000004c0)=""/153, 0x99}, {&(0x7f0000000580)=""/81, 0x51}], 0x3, &(0x7f0000001780)=[{&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/5, 0x5}, {&(0x7f0000001680)=""/152, 0x98}, {&(0x7f0000001740)=""/26, 0x1a}], 0x4, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000100), 0x4) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000001000/0x4000)=nil) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000300)=""/88) [ 439.868385][T16265] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 10:14:16 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x5, 0x1) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x100, 0x126) ioctl$DRM_IOCTL_FREE_BUFS(r1, 0x4010641a, &(0x7f00000000c0)={0x7, &(0x7f0000000080)=[0xe6f, 0x3, 0x7fffffff, 0x5, 0x5, 0x8, 0x6]}) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000100)={0x9, 0x2}) ioctl$int_in(r0, 0xa9afdb0fb6509cb8, &(0x7f0000000140)=0x53b0705f) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000180)) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={'nr', 0x0}, 0x6, 'syz0\x00', @bcast, 0x6, 0x4, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) write$P9_RRENAME(r1, &(0x7f0000000240)={0x7, 0x15, 0x1}, 0x7) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$f2fs(&(0x7f0000000280)='f2fs\x00', &(0x7f00000002c0)='./file0\x00', 0x6, 0x9, &(0x7f0000000940)=[{&(0x7f0000000300)="507ac8a3318eb7c4cf0c6d3ffa0def1ca59053639d8e45edafbc802d9a3d8bcaf820f78d2506aae3d32bd5caf8acbacb351ab07b8f9bf6847f2f9cd578a7911726f52bb762f995e42ee8e414e375d9d642516dcee75af8461d3f43569f10609cdb4a", 0x62, 0x2}, {&(0x7f0000000380)="9650f8e47bf951d0cc27ce82dfd3a0c7a70a0f873e1efb85f3df23030e2f5bd6b9d2bcf2853d80db2a0daf56a06d55f746c0aff85c1a6a2beeabe097ff1d00cc2b56068f8614adbb0e3d0b1a86e3cd1bbf34d6b9ef41d4a69bf60a4219e23296571965efe5", 0x65, 0x7a9}, {&(0x7f0000000400)="b2edeb0e86aa2631ff34", 0xa, 0x7}, {&(0x7f0000000440)="ac384530ea4dc971c14eb39a3d360ab0121bb3e984ae701166aca561949b05f2128d8a16a34ddad161cc7dc03f330bb34f6e822a1cf680567b4a86fc3896c423c662b9c6ddc256e78a1ee717db04263c484b7746da062de58ca562ae464a076d8f489c7816a441c7b6eec15c9aa59ac344c88716fa4c82840ad024d2a486204fac97ba32af6ae81fe7d0e4e28ef1ea412ef2307278fdc99acea4017dff49984c4131c888f5193b6037bfbb0ea2f766138f65d1df95fa24ba1dd987801192a85bc43d01460a74d643fda42ab8da0d61302bc736381c9b31231dc84c1e102ac360f65e", 0xe2, 0x42}, {&(0x7f0000000540)="23ae6996d23ddd78f9920226c6cf81b6643f114cbc0f4979fb39524c2f52347d1dfb281cd041b161dd20faa8de76822628a841e9c8e82578cb45276f6c65ebd562f427920fdb7898be895e452e01624814cbbd09a7e003d0af00f3f7845086b264f23b9c8176712a9e8497036f4dcc0bf4cc97ec71336d3a1140d449ac4adac6914804aa032a3acfc91479f5bc8f591f50145e74a63083c2950616f113d86d6db3189236dcd0da32f7be7a63091775f5ea8c72c51516f9ebdc2d4332e34a4a349d7383c9c7e816a96f1a0d40308cee21b5", 0xd1, 0x7}, {&(0x7f0000000640)="46b96c3d7627ecc0e17957afe79e1adc11a6a65021770805f0d7ca72f78124abb1326e6cfd4aeb4a2bf2b0f16a6a05e51aeaf7339c3d54dadf520a4050a5f9cffd3613de50d37fd757", 0x49, 0x7}, {&(0x7f00000006c0)="d615a37e3bdb32cc7c3bfcf448274740e7f2ceb5b61b829dac0c755da8fcbede680c19cd0a63702eee4526bdea2840677e7a6e3c75c32dd02f6dd66ff792ee8a7bd5", 0x42, 0x3ff}, {&(0x7f0000000740)="1e49b9bca214eb4d09c4be0066492bd747ff8ce656bfbfb1e5b059ef3c5b2c4df6bc91b5517217ee4a56890d1a5f831f12c414b3addf8b866d6c5e5e69a64adcb5fd3e89a110ba1461ed28ff8cd0eeb2af0d618e3fc6e35a28bf89adf97ae77bf1580f858ec0145cd5f71e4e4abc5b3d4b6a177fba43933cf047464cbf656799a65c7f594d8c7c8ec637f15bea94e2c20ca0e9b29623affc083ba24b6949748afc339c328edb3325576a5bf8637cd6b81dcfb576d964f85bcdfb2a5a00e8e97af0cdd07e054c4aece77be005eba68a9c2d200f5d805d", 0xd6, 0x71aa}, {&(0x7f0000000840)="5406d88bda16b476fde13493dd58dcf8fbc7a039fa81a0340cf67a920f40b9927f410ce9c3cd226245603c0f055faea660fa1a99c20e942b7f47e5290e8b14a02f2405b29be62f1d4b9c2e523182bf5cd1352973dad05c1c4cb9d221e61c8dc6f2c8e562aed2830abdf311c25ce2e65d2c6e692725a7bd84aeba34f35967db23e27b9ba0809a2c07729a503e417e917f1b93df4ea239091965513e9e5e1bcfe37beeda14c059844fc8b4b400d7f79d757736b2510b06df98ddace6467707a7d7229ad48ec467e1e05385d6e8ddcd3d52e54945a2a9", 0xd5}], 0x1, &(0x7f0000000b00)={[{@alloc_mode_reuse='alloc_mode=reuse'}, {@noextent_cache='noextent_cache'}], [{@obj_type={'obj_type', 0x3d, '\\)selfsystem+('}}, {@euid_lt={'euid<', r2}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) ioctl$MON_IOCX_GET(r1, 0x40189206, &(0x7f0000000cc0)={&(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000bc0)=""/232, 0xe8}) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000d00)) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000d40)={0x3}) syz_mount_image$f2fs(&(0x7f0000000d80)='f2fs\x00', &(0x7f0000000dc0)='./file0\x00', 0x46, 0x7, &(0x7f00000022c0)=[{&(0x7f0000000e00)="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", 0x1000, 0x5}, {&(0x7f0000001e00)="ae4b6f33fe37135f44367fb8a87ef8d1e32f6c29c444bd6130c1b0c99212bf61e46bc5c33f73091e4d0180c5be8f0fba729f03e668129742db75863258f1bc00de38a7a53f2d4e8c75d7c3506dadf21ee7d8793a0f388ed43d070e937228bd28835cfa7660825d91f8153ebfd471d8f93a1fb6c5ca5acc9239cce85cc972d48ac196edafb4d4f30e91a3b258459e19bd22641b598d86059260eb981bb20d98f3164cde29bca73173c05ac636d3c585037e33be1a4c9258e2ac555c16faba55e2b389e8efd70741f4b3500dbc4c5b74ef19f5ce", 0xd3, 0x6}, {&(0x7f0000001f00), 0x0, 0x9}, {&(0x7f0000001f40)="2baf6ddf6eb82682e95540e8ec4f0f3d8cebd332990b2364b47d5f182411fa23ca5a18826cbbeffcb0190806040feb48a42d16833ca1e939610966058b71edc72f732f79bfd613c2c097eaad048b64029de48abd5d5bdcf751313a205adc42d7352eddd94ee4f9a82dc5debfed7cd3be505409518dbd6f23e8ca8c929f440c1748b2aee7f31d299e15e746502eec35de46ccbe4083cf1fcf159450cb3d3e8453a05c7f30f3a7ea92ddcac40e9716b749b96815c321d233497ffe7c2481291197f93705", 0xc3, 0xffff}, {&(0x7f0000002040)="967259c1f6de2a6f18ef3d04e75982fc45f03c88ea118f5adcda8d87d9705f81928a001a21f600ce07d7802a8f80800d73990572c339e5b6145568f067f8598e39c122613efc05d8074959a9eb4514ddc5e4720ef431d698e722d233d54a3a104923ce655fa157ecaba0", 0x6a, 0x101}, {&(0x7f00000020c0)="6116cdc485ae3434f95f5ff388710eda1cdb2c9902bdb288a8257553769f44ab5fd0d4c5880e51bf78a2a51f9dbae541247abee9e084836504f241e0ec6dc02a1e2e84534164ec02a6a3a1730b8b70283c837277f3a5554eeb4fde7a581090d0a0a3090b314aa11c2150da53e0dbf7b0235687c492c7368260190f22b6cb97f4f0f15ea84312ae480a0dd06c29169f11e91134463e5ebf0b99550e20d427bff5b5bb6c3eaccca9e85342a62ef4d43e2a5c3fb0dbea276f135a6f3539d1561d4b96", 0xc1, 0x7fff}, {&(0x7f00000021c0)="e7c61f2730bb698d1dc76bbca7b6548883aa67262dd76f4068b8ac0a7a09b36f2118d962c863a5cd0f7e69f0cace2790ec45f5652cd6574e4f795f2e9f548aba301c1652cf66b72f386f8d587752f5d56ebf2737d3d105cb480c07bbe43472fe655d40c6af82384ba4075f9432b573f502be43aeb4090c7e9240569b747f161dfa47e5fc5909cf4c45088fe24d2663af0aa6fe7c793858afb3eb36cab8170f83398c7ee474926e842ec7698d27986e528bfaaebc1dcee65134601376c1deb025f7ce0f339e564545fab0350081d230d599630b6e23b75a9cc01b3a5c", 0xdc, 0x1}], 0x2000, &(0x7f0000002380)={[{@six_active_logs='active_logs=6'}, {@whint_mode_off='whint_mode=off'}, {@fsync_mode_posix='fsync_mode=posix'}, {@norecovery='norecovery'}, {@resgid={'resgid', 0x3d, r3}}], [{@permit_directio='permit_directio'}, {@context={'context', 0x3d, 'user_u'}}, {@subj_role={'subj_role', 0x3d, ',#'}}, {@hash='hash'}, {@obj_type={'obj_type', 0x3d, 'noextent_cache'}}]}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000002480)={&(0x7f0000002440)='./file0/file0\x00', r1}, 0x10) clock_nanosleep(0x1, 0x1, &(0x7f00000024c0)={0x0, 0x989680}, &(0x7f0000002500)) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000002540)) ioctl$TIOCGDEV(r1, 0x80045432, &(0x7f0000002580)) syz_open_dev$sndctrl(&(0x7f00000025c0)='/dev/snd/controlC#\x00', 0x0, 0x0) timerfd_gettime(r1, &(0x7f0000002600)) socket$pppoe(0x18, 0x1, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f0000002640)='/dev/snd/pcmC#D#c\x00', 0xa3, 0x2000) r5 = accept$packet(r1, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000002700)={{{@in=@broadcast, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000002800)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000002840)={{{@in6=@local, @in=@multicast1, 0xfffffffffffffff7, 0x8, 0x4e21, 0x6, 0x2, 0x20, 0x0, 0x3a, r6, r7}, {0x80000001, 0x8001, 0x48, 0x9, 0x2, 0x6, 0x3550, 0x2}, {0x7, 0x8, 0xffff}, 0xffffffff, 0x6e6bb3, 0x2, 0x1, 0x2, 0x2}, {{@in=@remote, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x34ff, 0x2, 0x2, 0x7f, 0xdb, 0x730, 0x2}}, 0xe8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000002940)={0x0, 0x16, "0c1cf481cacbeadf5d615d9150708d1dc65fa3e21777"}, &(0x7f0000002980)=0x1e) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000029c0)={0x100, 0x206, 0xfffffffffffffff7, 0x7, r8}, 0x10) ioctl$RTC_UIE_ON(r5, 0x7003) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r4, 0x40505412, &(0x7f0000002a00)={0x1, 0x800, 0x400, 0x0, 0xe}) getpeername(r4, &(0x7f0000002a80)=@rc, &(0x7f0000002b00)=0x80) 10:14:16 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0xfffffffffffffdf9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10, 0x0, 0x1}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setxattr$system_posix_acl(0x0, &(0x7f00000005c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, 0x0, 0x400, 0x0, 0x0, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x3}}, ["", "", "", "", "", ""]}, 0x24}}, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) add_key$keyring(&(0x7f00000006c0)='keyring\x00', &(0x7f0000000700)={'syz', 0x1}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000780)='.dead\x00', &(0x7f00000007c0)={'syz', 0x3}, &(0x7f0000000800)="039fd52165030a80a59e58cfb8dfa1cb485e9d2271a6bf88de7bc714fc0f0dc68a1b290e1ff56efc67c62588491c8159531fd83658c87362dc00c8dee2b241b2", 0x40, 0xfffffffffffffffb) r2 = add_key(&(0x7f0000000740)='.dead\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000600)="e130b035e236ff050dac621fce4e24d84631791ac7d9316cf1feff6fa1a08f24f844c76876a464d73b4a61701610e81a9710cb5abe13c907e8d8beed1383b399d1b613dd090634f974235a0e5a4791fc92a1e79dbb3cd0bf2d2900000000a4f4e2680476d02ce92206c6ae837acaca8cdcfc95a37151d5b81388799b8b6f464ed0722a2e61570885cedd3ae5d58895d44c8a09a5bea4d19a57724f7f", 0xcb496e14dccbcaf1, r1) keyctl$read(0xb, r2, &(0x7f0000000480)=""/70, 0x46) bind$unix(r0, &(0x7f0000000340)=@abs={0x1, 0x0, 0x4e24}, 0x6e) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 440.172778][T16291] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x3b7ea315) [ 440.222275][T16291] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 440.256860][T16291] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 440.292873][T16291] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock [ 440.296382][T16294] overlayfs: conflicting lowerdir path [ 440.339816][T16300] overlayfs: workdir and upperdir must reside under the same mount [ 440.410200][T16291] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x3b7ea315) [ 440.453157][T16291] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 440.501578][T16291] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 440.510526][T16291] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock [ 441.573579][ T2542] device bridge_slave_1 left promiscuous mode [ 441.579902][ T2542] bridge0: port 2(bridge_slave_1) entered disabled state [ 441.643012][ T2542] device bridge_slave_0 left promiscuous mode [ 441.649457][ T2542] bridge0: port 1(bridge_slave_0) entered disabled state [ 443.552948][ T2542] device hsr_slave_0 left promiscuous mode [ 443.592394][ T2542] device hsr_slave_1 left promiscuous mode [ 443.682716][ T2542] team0 (unregistering): Port device team_slave_1 removed [ 443.697245][ T2542] team0 (unregistering): Port device team_slave_0 removed [ 443.709559][ T2542] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 443.738463][ T2542] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 443.818528][ T2542] bond0 (unregistering): Released all slaves [ 443.920629][T16312] IPVS: ftp: loaded support on port[0] = 21 [ 444.018314][T16312] chnl_net:caif_netlink_parms(): no params data found [ 444.055509][T16312] bridge0: port 1(bridge_slave_0) entered blocking state [ 444.063855][T16312] bridge0: port 1(bridge_slave_0) entered disabled state [ 444.071983][T16312] device bridge_slave_0 entered promiscuous mode [ 444.132583][T16312] bridge0: port 2(bridge_slave_1) entered blocking state [ 444.139817][T16312] bridge0: port 2(bridge_slave_1) entered disabled state [ 444.149022][T16312] device bridge_slave_1 entered promiscuous mode [ 444.191137][T16312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 444.206309][T16312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 444.240004][T16312] team0: Port device team_slave_0 added [ 444.249257][T16312] team0: Port device team_slave_1 added [ 444.333113][T16312] device hsr_slave_0 entered promiscuous mode [ 444.412678][T16312] device hsr_slave_1 entered promiscuous mode [ 444.472266][T16312] debugfs: Directory 'hsr0' with parent '/' already present! [ 444.529602][T16312] bridge0: port 2(bridge_slave_1) entered blocking state [ 444.536843][T16312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 444.544284][T16312] bridge0: port 1(bridge_slave_0) entered blocking state [ 444.551654][T16312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 444.630026][T16312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 444.651621][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 444.662794][ T8902] bridge0: port 1(bridge_slave_0) entered disabled state [ 444.671207][ T8902] bridge0: port 2(bridge_slave_1) entered disabled state [ 444.691915][T16312] 8021q: adding VLAN 0 to HW filter on device team0 [ 444.708655][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 444.718947][ T8902] bridge0: port 1(bridge_slave_0) entered blocking state [ 444.726196][ T8902] bridge0: port 1(bridge_slave_0) entered forwarding state [ 444.747706][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 444.758002][ T8902] bridge0: port 2(bridge_slave_1) entered blocking state [ 444.765512][ T8902] bridge0: port 2(bridge_slave_1) entered forwarding state [ 444.784563][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 444.804610][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 444.813854][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 444.823164][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 444.831975][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 444.844831][T16312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 444.874229][T16312] 8021q: adding VLAN 0 to HW filter on device batadv0 10:14:21 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:14:21 executing program 3: r0 = syz_open_procfs(0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x2, 0x1f}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000200)={r1, 0x469}, 0x8) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000140)={0x2, 0x1, &(0x7f0000000040), &(0x7f0000000080)=""/102, &(0x7f0000000100)=""/40, 0x1}) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r2) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x00\x00\x00\x00\x00)\x00', @ifru_flags}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) 10:14:21 executing program 2: bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) 10:14:21 executing program 0: r0 = memfd_create(&(0x7f0000000140)='#! ', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '\x00\"\x00\xa8_\x04\xefbv\r\xeaf\x83\xe7\x7f~\xfa\xe3@\xcbo\xe7\xec\xc7\x12\xa4q\x0f\xd8\x84Muk3\xd6F\xc2Kk\x80\xbfic1(\xa6\x9c~\xcc\xe8\x86\x90\x88\x90\xd3\x14\xc0\xc3\xa6L3cL7\xe8\xf1p\xac*\x17\xad\xf8\x1bN\xdc|\x1f\xff\x04\xc9K`S\xe0\x1b>\xf0\x85\xfd@w[j\xb0\x9eI\x0fx\xf2Ed\xb0\x05\xa3B7\x80\xf8\xaa\f\x89H\v`\xed\xb8\xf5\xa2\r\x17\xb1\xde\xc9\xe3\xd3\xc6p\xc8LA\xbbkY\xbf(\xce\x8dh\t\xce\xa1\xea\xaeM\x99A\xd8\xb8DB\x02'}]}, 0xa3) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000580), &(0x7f00000005c0)=0x4) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_netfilter(r2, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000300)={0x270, 0x14, 0xa, 0x4, 0x70bd2b, 0x25dfdbfd, {0x5, 0x0, 0x5}, [@nested={0x18, 0x76, [@typed={0x14, 0x3f, @ipv6=@mcast2}]}, @typed={0x8, 0x2f, @str='%#]\x00'}, @generic="e82d84a969c8e1ee7209c34c7218326c558059c316a0e90b191435e23113ff6979c165d09d12ba5a03cc59379f1e1becfc45568dc6d195a7acea3c4014a30f9df5bdbbf098ea884626d7ae0209d5c75db1c656c33e552ee51a60dfb2f4945aebb9e5cf39689b6dd34e760a2b63c8a9d068460701c748ed0dbba72f1064a2a68e126dd9c8b3b1a40f0fc54f9cbe401baf23d6dfc99eccf2ce891d3cfd11a5d013040c361ee983f907bafacddcf3f4378da37eda49e547032c4aed5a0945be12ec3253b11bf355a9f634095159e0264560e35a8e9eb07b0c622c71ea", @typed={0xc, 0x37, @u64=0x7ff}, @generic="0133314b84cc74205d10f7364424cdaa459236a4d7ada0ae31bdad312ce4f50564c803f1595e4ed78350be7751c666b5e4c9abea41c09545048617a13947fcc221ccdf697d6ff8a98e3b52bdf9d8eebe3baa9fc18a54150e6d679cdd06490cade7d42bed19bdd2b700a6b1126250e5cdf777d12e24d64f9fe0c0af8204f296377a68f637ec82c3b1ecaa4d11d091afc93ac63d1233dbd47516c6a8858468e688e2c8882dbe55d56643163de1b6c035d15b7f10b156b132fef87ed9a64b1c4382332418846923adf85a50e0701275bcf6f59e6439ce", @generic="d21bc760fbea3aedc8b9396ffaa04950f6fc7b9586e3b40ec1f677652bcfee555c859007441b2847a3ca71bcf2dfc0f585e24eb29d8446dd689af4482158e28e3a66541ee2cbeec1f3a5e88ec04f2fa4826fdd2d08ea38ac0575dbeb56c9ad72db5faf5227cfa4de71b4dbb390f99cb156d77698a78f24d99857f6d3aa"]}, 0x270}, 0x1, 0x0, 0x0, 0x40000}, 0x4) open(&(0x7f0000000080)='./file0\x00', 0x101000, 0xfc5fef12cdcb7c1a) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vga_arbiter\x00', 0x18840, 0x0) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 10:14:21 executing program 5: socketpair(0x1b, 0x2, 0xb8e, &(0x7f0000000500)={0xffffffffffffffff}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x0, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) r2 = getpid() getpgid(r2) read(r1, &(0x7f0000000540)=""/102, 0x1e9) 10:14:21 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x501040, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000240), &(0x7f0000000200)=0xe8) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x301282, 0x0) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f0000000180)={0x2, 0x400, [{0x6, 0x0, 0xff}, {0xd140, 0x0, 0x1}]}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000100)) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f00000000c0)=r2) 10:14:21 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000480)=[{&(0x7f00000000c0)='_', 0x1}], 0x1, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000005000/0x2000)=nil], &(0x7f0000000380)=[0x1], 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)="588f49d41dcda4b16b5737781d6664ffc8ff69a1127dc09f5e467354c545602559186bd0b4c102bd4b178d0a1212322af579213bda28b66b8e1dd74bb34e4c141713292fedf0612e", 0x48, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) 10:14:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) shutdown(r0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x5, 0x80000) write$P9_RFLUSH(r1, &(0x7f0000000200)={0x7, 0x6d, 0x1}, 0x7) r2 = open(&(0x7f0000000040)='./file0\x00', 0x280000, 0x8) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x8) r3 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r3, &(0x7f0000000180)) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f0000000240)={0x80, 0x80, 0x4, 0x1, 0x8, 0x1}) ppoll(&(0x7f0000000140)=[{r0, 0x50}], 0x1, 0x0, 0x0, 0x0) 10:14:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x1a001000000}, [@ldst={0x6, 0x5, 0x2000cf66, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0xffffffffffffff80}}) 10:14:22 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, 0x0, 0x0) r2 = epoll_create(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x7, 0x220000) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000140)=@gcm_256={{0x307}, "7f9a91d821aa4363", "e01dabdf23cb16dd3a6b668a50cae5bb5d51d01cab5b3874058ff5178a081106", "2235ba30", "fbf23c0618b721d7"}, 0x38) sendto$inet6(r3, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r3, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) epoll_wait(r2, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:14:22 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @dev}}, 0x0, 0x1, 0x0, "f37dfe5b37edc321881258b33a24336ba89bc8868d0bc83e96b267916d330bc07f96d0b459563216bd88fac164beb8508022ac9a3ddb1a32e7e29281189935841afe4500"}, 0xd8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r2, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0xffffffffffffff9f) write$P9_RLOPEN(r0, &(0x7f0000000000)={0x18, 0xd, 0x2, {{0x70}, 0x2}}, 0x18) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 10:14:22 executing program 3: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x9, 0x20}, &(0x7f0000000280)=0xc) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000002c0)={r1, @in6={{0xa, 0x4e21, 0x36, @mcast1, 0x6}}}, &(0x7f0000000380)=0x84) accept4$unix(r0, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0x6e, 0x80000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_pts(r2, 0x0) write$binfmt_aout(r2, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r3, 0x5406, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7, 0x101001) ioctl$DRM_IOCTL_AGP_RELEASE(r4, 0x6431) ioctl$DRM_IOCTL_SET_VERSION(r4, 0xc0106407, &(0x7f00000000c0)={0xafdd, 0x175, 0x926, 0x18}) 10:14:22 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:14:22 executing program 5: r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@generic, &(0x7f0000000080)=0x80, 0x50bae8e1b1914f50) ioctl$SIOCAX25GETINFO(r0, 0x89ed, &(0x7f00000000c0)) r1 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(r1, 0x2201, 0x719000) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180)=0x2, 0x4) 10:14:22 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:14:22 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x100000008009) ioctl$VIDIOC_S_PRIORITY(r1, 0x40045644, 0x3) 10:14:22 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x2) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) msgget(0x1, 0x20) 10:14:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x3, 0x19) connect$inet(r1, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x100, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r2, 0xc0bc5310, &(0x7f0000000140)) r3 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r1, 0x0, 0x16, &(0x7f0000001240)=ANY=[@ANYBLOB], 0x1) 10:14:23 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00') ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f00000000c0)={0x7, 0x8000, 0x8, 0x8, 0x3}) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x4000) 10:14:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x0, 0x0) getpgid(0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000340)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000380)) r3 = gettid() prlimit64(r3, 0xb, 0x0, &(0x7f00000003c0)) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r4, r4}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x0, 0x0) 10:14:23 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f0000000140)={0x2}) r1 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000240)="24000000200007041dfffd946f6105000200000a1f000002002808000800040004000300280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f00000001c0)=""/32) getsockopt$TIPC_NODE_RECVQ_DEPTH(r1, 0x10f, 0x83, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$inet_mreqsrc(r1, 0x0, 0x26, &(0x7f00000000c0)={@empty, @local, @empty}, 0xc) 10:14:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff000d000000020000000b000000ec0079c913000180f0", 0x21}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0xff, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102", 0x1cb}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0x8008550e, &(0x7f0000000040)) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f0000000140)={0x100000001, 0xffff, 0x8000, 0x20}, 0x10) getsockopt$inet_buf(r2, 0x0, 0x3f, &(0x7f00000000c0)=""/73, &(0x7f0000000000)=0x49) 10:14:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca50d5e0bcfe47bf070") pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) getpgid(0x0) r3 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) r4 = memfd_create(&(0x7f0000000540)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) sendfile(r3, r3, 0x0, 0x40fdf) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x80) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0x40a85323, &(0x7f0000000040)={{0x1, 0x460}, 'port0\x00', 0x4, 0x0, 0x5, 0x6, 0x7f, 0xc90d, 0x0, 0x0, 0x2}) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x1000) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000140)={r2}) recvmmsg(0xffffffffffffffff, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') [ 447.122207][T16410] loop_set_block_size: loop0 () has still dirty pages (nrpages=12) [ 447.262981][T16401] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 10:14:23 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0x2400) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, 0x0, 0x0) uname(&(0x7f0000000600)=""/253) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000580)={'filter\x00', 0x2, [{}, {}]}, 0x48) recvmsg(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000080)=""/116, 0x74}, {&(0x7f0000000000)=""/62, 0x3e}, {&(0x7f0000000100)=""/234, 0xea}, {&(0x7f0000000300)=""/128, 0x80}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000280)}], 0x7, &(0x7f0000000480)=""/15, 0xf}, 0x22) r1 = syz_open_dev$media(&(0x7f0000000280)='/dev/media#\x00', 0x100, 0x4000) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000500)={[{0x9, 0x3, 0x2, 0x8, 0x8, 0x800, 0x101, 0xff, 0x1, 0x8001, 0x5b8b, 0x4, 0x3}, {0xffff, 0xb5f6, 0x9, 0xffff, 0x8, 0x3, 0x2, 0x3000, 0x0, 0x0, 0x4, 0x6, 0x80000000}, {0xbd, 0x5, 0x10000, 0x9, 0xfffffffffffffffe, 0x0, 0x5, 0x8, 0x9, 0x8, 0x6, 0x9, 0xec}], 0x5}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000002c0)=0x596, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x12aef8d, 0x0) 10:14:24 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x163, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a00000003004c000a0002000a0ada1b40d805000300c50083b8", 0x2e}], 0x1000000000000171, 0x0, 0x0, 0x61030000}, 0x10000) 10:14:24 executing program 4: gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0xffffffffffffffae, 0x200400) socketpair(0xa, 0x2, 0x3, &(0x7f0000000080)={0xffffffffffffffff}) connect$l2tp(r0, &(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x4, 0x0, 0x2, 0x1, {0xa, 0x4e21, 0x2, @mcast1, 0x5}}}, 0x3a) r2 = timerfd_create(0x0, 0x0) readv(r2, &(0x7f0000000440)=[{&(0x7f0000001680)=""/4096, 0x1000}], 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x100000032, 0xffffffffffffffff, 0x0) [ 447.997204][T16419] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 448.724236][T16437] IPVS: ftp: loaded support on port[0] = 21 [ 448.968950][T16437] chnl_net:caif_netlink_parms(): no params data found [ 449.001343][ T2542] device bridge_slave_1 left promiscuous mode [ 449.013109][ T2542] bridge0: port 2(bridge_slave_1) entered disabled state [ 449.053477][ T2542] device bridge_slave_0 left promiscuous mode [ 449.059897][ T2542] bridge0: port 1(bridge_slave_0) entered disabled state [ 451.082792][ T2542] device hsr_slave_0 left promiscuous mode [ 451.132561][ T2542] device hsr_slave_1 left promiscuous mode [ 451.205561][ T2542] team0 (unregistering): Port device team_slave_1 removed [ 451.220233][ T2542] team0 (unregistering): Port device team_slave_0 removed [ 451.232995][ T2542] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 451.268313][ T2542] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 451.374014][ T2542] bond0 (unregistering): Released all slaves [ 451.496814][T16437] bridge0: port 1(bridge_slave_0) entered blocking state [ 451.504619][T16437] bridge0: port 1(bridge_slave_0) entered disabled state [ 451.513842][T16437] device bridge_slave_0 entered promiscuous mode [ 451.524136][T16437] bridge0: port 2(bridge_slave_1) entered blocking state [ 451.532183][T16437] bridge0: port 2(bridge_slave_1) entered disabled state [ 451.540423][T16437] device bridge_slave_1 entered promiscuous mode [ 451.566435][T16437] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 451.579342][T16437] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 451.603278][T16437] team0: Port device team_slave_0 added [ 451.611293][T16437] team0: Port device team_slave_1 added [ 451.675025][T16437] device hsr_slave_0 entered promiscuous mode [ 451.722622][T16437] device hsr_slave_1 entered promiscuous mode [ 451.772232][T16437] debugfs: Directory 'hsr0' with parent '/' already present! [ 451.934453][T16437] 8021q: adding VLAN 0 to HW filter on device bond0 [ 451.959147][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 451.984485][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 451.993490][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 452.005276][T16437] 8021q: adding VLAN 0 to HW filter on device team0 [ 452.034470][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 452.053202][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 452.062571][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 452.069979][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 452.104209][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 452.120411][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 452.129611][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 452.147410][ T8902] bridge0: port 2(bridge_slave_1) entered blocking state [ 452.154610][ T8902] bridge0: port 2(bridge_slave_1) entered forwarding state [ 452.170738][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 452.196108][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 452.210890][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 452.228747][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 452.245916][T16437] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 452.277201][T16437] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 452.297687][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 452.365704][T16437] 8021q: adding VLAN 0 to HW filter on device batadv0 10:14:29 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:14:29 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2000, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) shutdown(r0, 0x1) 10:14:29 executing program 3: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 10:14:29 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) write$P9_RRENAMEAT(r1, &(0x7f0000000080)={0x7, 0x4b, 0x1}, 0x7) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000008000)={0x1, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @remote, @dev}, 0xc) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x35330db6b937f46) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x90) 10:14:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x19, &(0x7f0000000240)=0x20, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x9, 0x0, "aa6950035b33888ba3eb46d88e503df9a1c959e9e2b850dcdbd5f8fb26481763bdac293876227e0a878412fa992319abb7d66505e9f98678fbeb414805ca67e571afbf557724881f34e1c6ff0ea7bd1e"}, 0xd8) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) write$binfmt_aout(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cf67d35d0282812000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff7f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a7140849812d2e8de0ac695f1c7242a1b17efe0e6b6058ad65483da8acf7af79498ee6b2f08b87fa1f93242407dfedb9ed9ef969f61db58c0826d86c80c0f9994f7d3042d8355ddeac8d349822fbd2581365de29a76b408939ebd5e3"], 0x220) shutdown(r0, 0x1) 10:14:29 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'team_slave_1\x00', &(0x7f0000000040)=@ethtool_dump={0x3e, 0xda78, 0x65cc2d56, 0x42, "7b6771fc4d1e7ab3f12684d673a0d678287dbe4b33e0515248ff5212f75ce6ee733377a1806334759a51cb1101058df78f172bce5c35f738f1fe51da18f9e55a8c53"}}) 10:14:29 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x400, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', 0x0, 0x26, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000000580)={{0x8, 0x3, 0x4, 0x7fffffff, 'syz1\x00', 0x3}, 0x1, [0x4, 0x101, 0xffff, 0x100000000, 0x10001, 0x7fffffff, 0xa0, 0x8, 0x6fb7387c, 0x0, 0x3, 0x400, 0x0, 0x5, 0x5082, 0x80000, 0x8000, 0x5, 0x72, 0x6, 0x9, 0x814, 0x4, 0x1, 0x1f, 0x2, 0x8, 0x100000000, 0x4, 0x5, 0x9, 0x5, 0x8, 0x9, 0x9, 0x7b, 0xfffffffffffffdf4, 0xffffffffffff60ad, 0x5, 0x6, 0x4dd8f2cd, 0x8, 0x1, 0xd1, 0x2, 0x0, 0x3, 0x0, 0x100000000, 0x5, 0xfffffffffffffff8, 0x9, 0xc4dd, 0x7fffffff, 0x1d, 0x7fffffff, 0xffffffffffffffd4, 0x5, 0x92, 0x80000001, 0xffffffffffffffc0, 0x1, 0x8000, 0x25aa, 0x0, 0xffffffff80000000, 0x8, 0x511a, 0xc6e5, 0x1, 0x8, 0xffff, 0x5, 0x6, 0x0, 0x2, 0x4, 0x0, 0x1000, 0x1, 0x8, 0x9, 0xb8, 0x9, 0x524e, 0x7f, 0x80000000, 0x400, 0x3, 0x9, 0x1000, 0x8, 0x3, 0x656, 0xcbc2, 0x1, 0x40, 0x599b, 0x7ff, 0x4, 0x7f, 0x80, 0x8000000000000, 0x5f9, 0x2, 0x2, 0xfffffffffffffffe, 0xfffffffffffffffd, 0x401, 0x4e1, 0x3, 0x6, 0x82a8, 0x8, 0x80000001, 0xfff, 0x2, 0x7, 0x3, 0x20, 0x1, 0x100000000, 0x7ff7ba00, 0x6, 0x101, 0x6, 0x4, 0x7]}) r1 = msgget(0x2, 0x122) msgctl$IPC_RMID(r1, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000180)={@empty, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001b00)={'team_slave_1\x00', 0x0}) getpeername$packet(r0, &(0x7f0000001b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001b80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001bc0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001cc0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001e40)={{{@in=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}}}, &(0x7f0000001f40)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000001f80)={@dev, 0x0}, &(0x7f0000001fc0)=0x14) getsockname$packet(r0, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002040)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002080)={{{@in6=@mcast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}}}, &(0x7f0000002180)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f00000024c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400020}, 0xc, &(0x7f0000002480)={&(0x7f00000021c0)={0x2a0, r2, 0x8, 0x70bd26, 0x25dfdbfd, {}, [{{0x8, 0x1, r3}, {0x284, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r4}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r5}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xffff}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x7ff}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xc65}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r10}}, {0x8}}}]}}]}, 0x2a0}, 0x1, 0x0, 0x0, 0x20000004}, 0x4008000) 10:14:29 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000040)={'ip6erspan0\x00', 0xba}) r2 = socket(0x2, 0x80000, 0x0) bind$inet(r2, &(0x7f0000000840)={0x2, 0x5e20, @loopback}, 0x10) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0)=0xffffffffffff5dbf, 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000100)={'syzkaller0\x00', &(0x7f0000000080)=@ethtool_rxfh={0x47, 0x4, 0x6, 0x4, 0xffff, "c1de5d", 0x1619, [0x3, 0x3f74d973, 0x8, 0x6c3, 0x7, 0x3ff, 0x1, 0xb352, 0x400]}}) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x0, 0x4) sendto$inet(r0, &(0x7f0000000500)="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", 0x184, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) 10:14:29 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)) r1 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r2 = dup2(r1, r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = dup(r3) getsockopt$inet6_tcp_int(r4, 0x6, 0x21, 0x0, &(0x7f0000012ffc)=0x80fb268a) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) ioctl$CAPI_NCCI_OPENCOUNT(r4, 0x80044326, &(0x7f0000000040)) connect$netlink(r2, &(0x7f0000000080)=@proc={0x10, 0x0, 0x25dfdbfd, 0x200}, 0xc) dup3(r1, r0, 0x0) 10:14:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair(0x11, 0x80000, 0xfffe000000, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r1, 0xc4c85512, &(0x7f00000001c0)={{0x2, 0x1, 0x101, 0x1, 'syz0\x00', 0x3f}, 0x1, [0x2, 0x9, 0x43cd, 0x0, 0x1, 0xff, 0x1, 0x1fffffffe000, 0x80000001, 0x0, 0x6, 0x7, 0x7, 0xe2a, 0x8, 0xffffffffffffff25, 0x3, 0x55, 0x9, 0x639, 0x5, 0xfffffffffffffff7, 0x3, 0x5, 0x7fff, 0x8, 0x85b, 0x2a6, 0x7fff, 0x9, 0xffffffff80000000, 0x1, 0x40, 0x5, 0x6, 0x4, 0x8, 0x1, 0x8, 0x80000001, 0x80000001, 0x9, 0x4, 0x9, 0x9, 0x9c, 0x4, 0x81, 0xffffffffffffffff, 0x8, 0xd57, 0x0, 0x8, 0x4, 0x2, 0x0, 0x4, 0x2b8d13ef, 0x6, 0x21cc, 0x82, 0x5, 0x3, 0x2, 0xb69, 0x7, 0x8, 0x0, 0x8001, 0x0, 0x6, 0x6, 0x3, 0x9, 0x2, 0x3, 0x6, 0x2, 0x7f, 0x7, 0x3, 0xa0000000000, 0x9, 0xbb9c, 0x3ff, 0x401, 0x8, 0x87d, 0x7ff, 0x0, 0x100000000, 0x7fff, 0x0, 0x9, 0x2, 0x5, 0x5, 0x3, 0x40, 0x13c, 0x0, 0x400, 0x7ff, 0x100000000, 0xff, 0x400, 0x9, 0x9, 0xffffffffffffff00, 0x20, 0x6, 0x8, 0x9, 0x2, 0x99d, 0x2, 0x10001, 0x5, 0x4, 0xae0e, 0x8, 0x7, 0x4, 0x5, 0x4b21, 0xffffffffffff195d, 0x7, 0x1], {0x0, 0x1c9c380}}) setsockopt$inet_tcp_int(r2, 0x6, 0x0, &(0x7f0000000080)=0xfffffffffffffeff, 0x4) r3 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$setperm(0x5, r3, 0x0) 10:14:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="85000000080000005d000000000000009500000000000000"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) pipe(&(0x7f0000001380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000001400)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f00000014c0)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001480)={&(0x7f0000001440)={0x14, r2, 0x2, 0x70bd2b, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000140)=""/62, 0x3e}, {&(0x7f00000001c0)=""/133, 0x85}, {&(0x7f0000000280)=""/132, 0x84}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xa, 0x0, &(0x7f0000000100)="263abd030e98ff4dc870", 0x0, 0xe00}, 0x28) 10:14:29 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20ncci\x00', 0x40000, 0x0) write$sndseq(r0, &(0x7f0000000300)=[{0xfff, 0x8, 0x0, 0x3, @tick=0x2, {0x3, 0x100}, {0x4, 0xfff}, @addr={0x5, 0x3f}}, {0x101, 0x0, 0x1, 0x8001, @time, {0x100000001, 0x1}, {0x9, 0x1}, @quote={{0x101, 0x9}, 0x1}}], 0x60) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x4880, 0x0) ioctl$DRM_IOCTL_RM_MAP(r2, 0x4028641b, &(0x7f00000001c0)={0x0, 0x1, 0x3, 0x8, &(0x7f00009fd000/0x600000)=nil}) r3 = semget$private(0x0, 0x3, 0xc0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) semtimedop(r3, &(0x7f0000000040)=[{0x4, 0x6, 0x1800}, {0x3, 0x257f47d2, 0x1800}, {0x3, 0x100000001, 0x800}, {0x0, 0x0, 0x1800}, {0x2, 0x3, 0x800}, {0x1, 0x20, 0x800}, {0x1, 0x9000000000, 0x1000}], 0x7, &(0x7f0000000140)={r4, r5+10000000}) r6 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) semctl$GETZCNT(r3, 0x0, 0xf, &(0x7f0000000280)=""/19) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x4e23, 0x9, @remote, 0xfff}, {0xa, 0x4e20, 0x330, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}, 0xaa12, [0x8, 0x5cb, 0x5, 0x0, 0x9, 0x7, 0x92d, 0x4]}, 0x5c) ioctl$KVM_ENABLE_CAP_CPU(r7, 0xc008ae88, &(0x7f00000000c0)={0x7b, 0x5, [0x40000105], [0xc1]}) 10:14:30 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:14:30 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0xfffffffffffffa6b) mknod$loop(&(0x7f0000000080)='./file1\x00', 0x0, 0x1) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x81080, 0x0) quotactl(0x1020800002ff, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 10:14:30 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000340)={0x3, 0x70, 0x4, 0xbfbd, 0x0, 0x0, 0x0, 0x0, 0x75000, 0x0, 0x20, 0x0, 0x5, 0x0, 0x58d0c8, 0x7fffffff, 0x0, 0xce3, 0x9, 0xffffffffffff8001, 0x0, 0x0, 0x0, 0x10000, 0x5a, 0x0, 0x1, 0x8001, 0x6, 0x80000000, 0x1, 0x7, 0xfffffffffffff800, 0x627, 0x5, 0x400, 0x0, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x0, 0x4, 0x5, 0x3, 0x6, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f0000000800)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) setreuid(0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) r4 = fcntl$dupfd(r2, 0x0, r1) ioctl$TIOCEXCL(r4, 0x540c) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r4, 0xc0305615, &(0x7f0000000080)={0x0, {0x2, 0x100000001}}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) 10:14:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x3) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000140)=""/253, 0xfd}], 0x1) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000000)={0x0, 0xd86, 0x5b, 0x8, 0x1f}) 10:14:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000180)={{0x2e4, 0x100000000}, 'port1\x00', 0xa, 0x80008, 0x5, 0x7c8b, 0xff9, 0xfffffffffffffff9, 0x2, 0x0, 0x4, 0x5405}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400205) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000080)=""/148, 0x94}], 0x200001f1, 0x0) r2 = gettid() r3 = syz_open_procfs(r2, &(0x7f0000000300)='net/sockstat\x00') preadv(r3, &(0x7f0000000480), 0x10000000000001e2, 0x0) 10:14:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@fwd={0x0, 0x0, 0x0, 0x20000386}]}}, &(0x7f0000000300)=""/134, 0x26, 0x86, 0x1}, 0x20) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) 10:14:30 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:14:30 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x80, 0x0) r3 = mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000200)={0x40, 0x0, &(0x7f0000000080)=[@clear_death, @decrefs={0x40046307, 0x3}, @decrefs={0x40046307, 0x1}, @acquire_done, @free_buffer={0x40086303, r3}], 0xa5, 0x0, &(0x7f00000000c0)="0f92db4c28bdea3423add6401b544864319161ee877992e195984220d7ce7bf70d6307296f8f75503df7656e51be6bd4f7e803d692b96d0a6eb1e3421c8d5e49c82f4a1cb7925c0bf581f25798bd6064a72def04a1cd214843f6b7d14fc369fdd7a88c9d832aa40f0b65b3643499e222fe9a0fe002b6ae42ca7d059335367bd9b7e00de64f94f71815af41c58726f48da5a79cc9589ebae620b54ba92f56ba3b09334ffb5f"}) socket$kcm(0x2, 0x3, 0x2) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000240)={0x88, @empty, 0x4e20, 0x3, 'lc\x00', 0x0, 0xf7, 0x53}, 0x2c) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000040)='nr0\x01:\xf2.\xa3\'>\xf8]\x81$?\xfa\xbf1UM\xbf\xef\xa9\xac\x03x\xf4D3A}?\x00\x8b\x9c[\xdd\x06\xa4%\xf4\x94\xa8>\xb1\xb1\xa2_&') 10:14:30 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f0000000240)={0x2, 0x4e21, @remote}, 0x10) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = accept(r1, 0x0, 0x0) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) sendto$inet6(r3, &(0x7f0000000080)="537b3300f4f427e4149a887240144d0b0cf3c2aa1905ef14a50908eef0b6ee598b119baf4974f54f339e04f97c304170b29d14c8fc24466a8f72dbe37a92792e37ac6fe94f8d96d2500204969982172ef9ce3810052987a1a0a15181a3169157531d379dc8dd8dd9e4f08c9fd6054ef789380f31c710f496cba2aaed03853f05f69e5d96c504a68695c2e0e8aa3a1f421e2454893a", 0x5d6dfe391c19545a, 0x0, 0x0, 0x0) 10:14:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x393882, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200"/14], 0x22) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001300090069000007a2e407edab0080582900000046008107a277001419000a0010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) ioctl$sock_rose_SIOCDELRT(r1, 0x890c, &(0x7f0000000100)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x16e, @bcast, @netrom={'nr', 0x0}, 0x2, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @bcast, @default, @null, @null, @default]}) 10:14:30 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x4100, 0x0) getsockopt(r0, 0x334c, 0x1, &(0x7f0000000180)=""/65, &(0x7f0000000200)=0x41) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200, 0x0) ioctl$TCSBRKP(r2, 0x5425, 0xffffffffffff7fff) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000040)={0x3, r2, 0x41833baf9d0d5b5}) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) 10:14:30 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x18300, 0x0) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f0000000240)={0x11, 0x0, @name="467a24bf4c1bcbdcd20209e46ef3bf15635f3d09016bb17a2210817b5c82e16c"}) setsockopt$sock_int(r0, 0x1, 0xd, &(0x7f0000000000), 0x4) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000400)=0x1, 0x1) ioctl$KVM_GET_DEVICE_ATTR(r1, 0x4018aee2, &(0x7f0000000200)={0x0, 0x5, 0x9, &(0x7f00000001c0)=0xf008}) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000380)={0x0, 0x8, 0x1a, &(0x7f0000000340)=0xaf2}) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x9}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000300)={r2, 0x400}, 0x8) openat$cgroup_type(r1, &(0x7f0000000180)='cgroup.type\x00', 0x2, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x40, 0x0) ioctl$TIOCSISO7816(r3, 0xc0285443, &(0x7f00000000c0)={0x1, 0x7, 0xc6, 0x3, 0x7}) [ 453.969631][T16514] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 454.019486][T16514] team0: Device hsr0 is up. Set it down before adding it as a team port 10:14:30 executing program 3: r0 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) signalfd(r0, &(0x7f00000002c0)={0x23f4}, 0x8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000001440)=0x8) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r1, 0xc1205531, &(0x7f0000000100)={0x1ff, 0xbf15, 0xffff, 0x2, [], [], [], 0x5, 0x40, 0x0, 0x600000000, "295ceddd82f4086c545a7c2c3747028e"}) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000380)={0x0, 0xfffffffffffffffd, 0x101, 0x9, 0x2, 0x401, 0x2, 0x7fff, 0xfffffffffffffeff, 0x1, 0xfffffffffffffff9, 0xfffffffffffffff9}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_FLUSHABLE(r4, 0x112, 0x8, &(0x7f00000014c0)=0x81ff, &(0x7f0000001480)=0xfffffeb4) r5 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_security(0x11, r5, &(0x7f0000000440)=""/4096, 0x1000) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x8188aea6, &(0x7f0000000000)={0x0, 0x5, [], [0xc1]}) pipe(&(0x7f0000000300)={0xffffffffffffffff}) ioctl$TIOCSSOFTCAR(r6, 0x541a, &(0x7f0000000340)=0x3) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x9, 0x3, 0x4, 0x0, 0xbc, 0x4, 0xd0, 0xffffffff, 0x1, 0x3, 0x10001, 0x10000000000c5, 0x0, 0x7, 0x101, 0x7fffffff, 0x100, 0x2, 0xfffffffffffff022}) 10:14:30 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x802) clone(0x40080000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x4, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="6c7548c54742b98aa6625be1f19383bba87eaf11a4749173726837a9f073d5203ee9ad74a8fe2b430a325c913a94458080e5cddc81e426bed51059457ecc0f02e1f2dc280b41db17802024b191e2461506c6cdf68c181993f44600ea95de5a7fc7e57d77f27355b5507bc8f33c7829dec1abda95fb5b3cd366823d2b9abda138e719c271b1fc75e74697a05b9468e99133400beec1"], 0x0, 0x0, 0x0}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000100)={0x3, &(0x7f00000000c0)=[{}, {}, {}]}) 10:14:30 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x3, 0x4) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) r2 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x0, 0x2) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000180)="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") faccessat(r2, &(0x7f0000000140)='./file0\x00', 0x63, 0x800) sendto$inet6(r0, &(0x7f0000000300)="0503000108003e0000000954c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0x15e, 0x80, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='map_files\x00') ioctl$VFIO_CHECK_EXTENSION(r3, 0x3b65, 0x379aac85e8c32363) sendmsg$nl_crypto(r3, 0x0, 0x40000) 10:14:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg$inet(r1, &(0x7f00000010c0)=[{{&(0x7f00000000c0)={0x2, 0x4e21, @initdev}, 0x10, 0x0, 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="210000e6000000000000000007000000000000000000000018000000000000130000000007000000020800e000000200"], 0x30}}], 0x24, 0x0) setsockopt$inet6_tcp_buf(r1, 0x6, 0xe, &(0x7f0000000100)="b466000f8072d9691c0ba7996d9c424199ef4247a8cc1459d1112ee16646fdf1b50d8e6b0ead91f8ff09e755cfa11e0f0441cc355d8ee2b653b9ca0a3eabf7b3131d8ea9cbadf15f0f3b0ae9238ad8176a64de01a0811c51c98618520065bb034f4c1937cf780e20c9430db7bc37c40dcaa2506019055a84cd22b620", 0x7c) 10:14:30 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) r1 = creat(&(0x7f0000000040)='./file0\x00', 0xd) accept4$alg(r1, 0x0, 0x0, 0x80000) [ 454.314181][T16532] binder: 16526:16532 unknown command -985107092 [ 454.320740][T16532] binder: 16526:16532 ioctl c0306201 20000040 returned -22 10:14:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="12000000d21e5a000400000000000200005e64255c180000000000000000000000000000f393000000000000"]}) [ 456.012582][T16556] IPVS: ftp: loaded support on port[0] = 21 [ 456.190663][T16556] chnl_net:caif_netlink_parms(): no params data found [ 456.320074][T16556] bridge0: port 1(bridge_slave_0) entered blocking state [ 456.327390][T16556] bridge0: port 1(bridge_slave_0) entered disabled state [ 456.335276][T16556] device bridge_slave_0 entered promiscuous mode [ 456.343495][T16556] bridge0: port 2(bridge_slave_1) entered blocking state [ 456.350642][T16556] bridge0: port 2(bridge_slave_1) entered disabled state [ 456.358478][T16556] device bridge_slave_1 entered promiscuous mode [ 456.465567][T16556] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 456.478048][T16556] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 456.500833][T16556] team0: Port device team_slave_0 added [ 456.508384][T16556] team0: Port device team_slave_1 added [ 456.514639][ T2542] device bridge_slave_1 left promiscuous mode [ 456.520932][ T2542] bridge0: port 2(bridge_slave_1) entered disabled state [ 456.563355][ T2542] device bridge_slave_0 left promiscuous mode [ 456.569684][ T2542] bridge0: port 1(bridge_slave_0) entered disabled state [ 458.492727][ T2542] device hsr_slave_0 left promiscuous mode [ 458.532358][ T2542] device hsr_slave_1 left promiscuous mode [ 458.579711][ T2542] team0 (unregistering): Port device team_slave_1 removed [ 458.595122][ T2542] team0 (unregistering): Port device team_slave_0 removed [ 458.608034][ T2542] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 458.638095][ T2542] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 458.719027][ T2542] bond0 (unregistering): Released all slaves [ 458.864299][T16556] device hsr_slave_0 entered promiscuous mode [ 458.912520][T16556] device hsr_slave_1 entered promiscuous mode [ 458.952346][T16556] debugfs: Directory 'hsr0' with parent '/' already present! [ 459.009233][T16556] 8021q: adding VLAN 0 to HW filter on device bond0 [ 459.077530][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 459.086018][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 459.108864][T16556] 8021q: adding VLAN 0 to HW filter on device team0 [ 459.120362][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 459.136148][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 459.148970][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 459.156120][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 459.188547][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 459.197006][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 459.212755][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 459.229723][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 459.236882][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 459.250887][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 459.269414][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 459.278637][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 459.293889][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 459.317094][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 459.330293][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 459.340394][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 459.354857][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 459.368052][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 459.381752][T16556] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 459.399979][T16556] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 459.410657][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 459.427099][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 459.457333][T16556] 8021q: adding VLAN 0 to HW filter on device batadv0 10:14:36 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:14:36 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x211) ioctl$KDADDIO(r0, 0x400455c8, 0xb) 10:14:36 executing program 4: r0 = gettid() openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_G_FBUF(r1, 0x8030560a, &(0x7f0000000000)={0x89, 0x2, &(0x7f00000000c0)="ac64a1dd7344f330f05e2c6a037f94f51bcf88b1456e67235f5ea3a3905981ec1b4a102015e4a1f728ffc1d77a84f93318da6648ce457dfb32f24bf3365d9d63e6d67ba189baae5978f00a042ba99c0bfda9baba7db40b07dd66db32182107dc42f8661b1f6ccc77ba92b0fb738e31e8852ac4a9233287780a6b804f4f2f99bc59478a9af7bc5f1e56", {0x7, 0xffffffffffffff80, 0x33524742, 0x1, 0x3eaa, 0xce, 0xb}}) close(r1) r2 = epoll_create1(0x0) r3 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000080)) timerfd_settime(r3, 0x0, &(0x7f0000000040)={{0x77359400}, {0x0, 0x989680}}, 0x0) epoll_wait(r2, &(0x7f0000000340)=[{}], 0x1, 0xfffd) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000440)={0x20000011}) clone(0x2000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 10:14:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x80800) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x6c, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000000), 0x20) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f00000004c0)=""/216, &(0x7f0000000040)=0xd8) ioctl(r3, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r4 = dup2(r0, r2) dup3(r4, r1, 0x0) 10:14:36 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=@raw={'raw\x00', 0x9, 0x3, 0x2d0, 0x128, 0x128, 0x128, 0x128, 0x0, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, &(0x7f0000000040), {[{{@ip={@rand_addr=0xa68a, @rand_addr=0x3f, 0xff, 0x0, 'veth0_to_team\x00', 'syz_tun\x00', {0xff}, {}, 0x29, 0x2, 0x50}, 0x0, 0xe8, 0x128, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x8001, 0x5, 0xffffffff, 0x4, 0x167, 0x0, 0x800, 0x100]}}}, {{@uncond, 0x0, 0xc8, 0x110, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x882, 0x0, 0x1, 0x1}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x7, 0x5, 0x6, '\x00', 0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x330) fcntl$getownex(r0, 0x10, &(0x7f0000000400)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000480)={{0x2, 0x4, 0x7fff, 0x0, '\x00', 0x1}, 0x5, 0x20000000, 0x0, r1, 0x1, 0x80, 'syz1\x00', &(0x7f0000000440)=['addrtype\x00'], 0x9, [], [0x7, 0x100, 0x8000, 0x80000001]}) r2 = open(&(0x7f00007e2ff8)='./file0\x00', 0x80, 0xf0) fcntl$setlease(r2, 0x400, 0x0) r3 = open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r3, 0x400, 0x0) fcntl$setlease(r3, 0x400, 0x2) 10:14:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000000)="11dca50d6c0bcfe47bf070") socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x82) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = dup3(r1, r2, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4188aea7, &(0x7f0000000b00)=ANY=[@ANYBLOB="0900000000000000020038187886985b5d00000020000000af450000ff00000000defcdbc70000000000f196e6319c83be3300b8f154ccd0c578bdce2f4481589e683c751169c6016050bd358ecb253a006651583d335886a1cd53172c1b961b8d1d041bc1c2d9b4a33d4568490b274a4d0bda06773f6d91cdee6adc63274d755d40af3c0c8c0800000000000000c9089d"]) getsockopt$bt_BT_SNDMTU(r4, 0x112, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x2) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x200, 0x0) r5 = dup2(r4, r4) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r5, 0x800442d2, &(0x7f00000001c0)={0x5, &(0x7f0000000100)=[{0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @random}, {}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @random}]}) 10:14:36 executing program 3: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6erspan0\x00', r1}) r3 = accept$packet(r0, &(0x7f00000024c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002500)=0x14) ioctl$sock_SIOCINQ(r3, 0x541b, &(0x7f0000002540)) lstat(&(0x7f0000002580)='./file0\x00', &(0x7f00000025c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000002640)={{{@in6=@mcast2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0xbd, 0x4e22, 0x0, 0x0, 0x80, 0xa0, 0x16, r1, r5}, {0x5, 0x4, 0x1, 0xec23, 0x1, 0x80000000, 0x200, 0x8}, {0xf0a, 0x20, 0x7, 0x7}, 0x0, 0x6e6bbc, 0x2, 0x0, 0x3}, {{@in=@remote, 0x4d3, 0x6c}, 0x2, @in6=@loopback, 0x3506, 0x1, 0x1, 0x800, 0x6, 0x2, 0x80000001}}, 0xe8) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000002740)=0x3ff, 0x1) bind$unix(r0, &(0x7f0000002780)=@abs={0x0, 0x0, 0x4e23}, 0x6e) socket$inet6(0xa, 0xa, 0x3) r6 = accept4$alg(r0, 0x0, 0x0, 0x800) r7 = getpgid(0xffffffffffffffff) setpriority(0x2, r7, 0x5) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000002800)='/dev/btrfs-control\x00', 0x400, 0x0) ioctl$SG_GET_PACK_ID(r8, 0x227c, &(0x7f0000002840)) ioctl$SG_GET_REQUEST_TABLE(r8, 0x2286, &(0x7f0000002880)) getsockopt$TIPC_DEST_DROPPABLE(r8, 0x10f, 0x81, &(0x7f0000002a00), &(0x7f0000002a40)=0x4) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000002a80)={@remote, @empty, @loopback, 0x7f, 0x243, 0x4, 0x500, 0x49, 0x200, r2}) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000002b00)={0x8, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e21, 0x2, 'sed\x00', 0x8, 0xa5d, 0x6}, 0x2c) bind$isdn(r8, &(0x7f0000002b40)={0x22, 0x605, 0xfff, 0x7, 0xffffffffffffff36}, 0x6) ioctl$FS_IOC_ENABLE_VERITY(r6, 0x6685, &(0x7f0000002d40)={0x1, 0x8001, 0x1000, 0xaf, &(0x7f0000002b80)="eb60885512eefbb80f7d9509ac12cebd94ca49c2c6fb2450efea984a9427ea5684bdc9c4f95599a49a9eee68efd4186c6d895000abf44feb7301fe7de01ad9b77b0917446a0f0949ec1346e3b2eb2e890169fc51bf2ff3ebbac22d45bd61b6a5f6f7826e6e468a77192d14183c22d6ac76214f0b01c57c22d86810f8de25a7a6b2baf44cf2f0c5856ef0d9f62d544ee73509272e162f34b0ea9e17546b477d547c27dd32d02e2b19b4ec1ca8315e34", 0xc3, 0x0, &(0x7f0000002c40)="2c18c42635c7cb80d867bd8dc64fb801fbabc4f35fdb86df8e9c11070cd8678e28160892143c8d5a27c610574b370dfd5731b7752f8a5bc6edc738d755d033c1f16efc5d11c14208dac9d1473fca26f868dc38fb51f634e405b9a91ed6cc87c37024ae82c7b49420bc7bf9d32f0d9efdd15cd6b1f8345ae9e70b36074e572acb5a8a94d4c8dba9285dee3471bf957bb68a6043686bd570006e5b804d221d6c3964a59d2cb82f18476662420545827ebeea8e91a888ba91de5761375ac685502507ad35"}) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000002dc0)=0x9, 0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r8, 0xc00c642e, &(0x7f0000002e00)={0x0, 0x80000, r8}) ioctl$DRM_IOCTL_GEM_CLOSE(r8, 0x40086409, &(0x7f0000002e40)={r9}) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002e80)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x50, r4}) socket$kcm(0x29, 0x2, 0x0) ioctl$RTC_ALM_SET(r8, 0x40247007, &(0x7f0000002ec0)={0x18, 0x20, 0x16, 0xa, 0xa, 0x2, 0x1, 0x148, 0x1}) getpeername$netrom(r8, &(0x7f0000002f00)={{0x3, @null}, [@default, @default, @rose, @default, @bcast, @default, @default, @bcast]}, &(0x7f0000002f80)=0x48) r10 = inotify_add_watch(r8, &(0x7f0000002fc0)='./file0\x00', 0x4000000) inotify_rm_watch(r8, r10) 10:14:36 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x7704, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x10000, 0x104) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x10, &(0x7f0000000240)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000080)=0x100) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, 0x0, 0x0) [ 459.968464][T16582] IPVS: length: 216 != 24 10:14:36 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) [ 460.011382][T16572] IPVS: length: 216 != 24 10:14:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000000), 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) r2 = request_key(&(0x7f00000006c0)='user\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)='vboxnet1eth0wlan0wlan0\x00', 0x0) keyctl$reject(0x13, r2, 0xc9f, 0x3, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000700)={0xfffffffffffff9ae, 0x5e, "36c90b48fd2e7fa51bfbcba5cfe0269c86502aa0864f8cad1381486765faeb08b043bad7bfbb40ff6e44be9a34dc2140a1eb47066f3d4f72983e54cf6ea6421d715c66cddaa3e97becf5d3b94bcfe22887932b5cddb382ec1977fc23d8ee"}) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x33, 0x2}, 0x7) request_key(&(0x7f0000000880)='big_key\x00', &(0x7f00000008c0)={'syz', 0x1}, 0x0, 0xffffffffffffffff) write$smack_current(r3, &(0x7f00000000c0)='syz', 0x3) add_key$keyring(0x0, &(0x7f0000000a00)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f00000002c0)) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffffd) r4 = syz_open_procfs(0x0, &(0x7f0000000600)='net/fib_trie\x00') keyctl$reject(0x13, r1, 0x3ff, 0x1, r1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r4, &(0x7f00000017c0), 0x199, 0x0) 10:14:36 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000300)='/dev/video#\x00', 0x6, 0x494c02) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000040)={0x0, 0x1, {0x1f, 0x38, 0xf, 0x5, 0x2, 0x4, 0x2, 0xe9}}) ioctl$KDMKTONE(r1, 0x4b30, 0x1) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000200)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000001c0)=0xc) ptrace$cont(0x20, r2, 0xe4, 0x2) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000000c0)={0x1}) 10:14:36 executing program 3: openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f0000000180)={0x1f, "8dbae623bbcfc859e1c3246fc621d9479e450654f1d53f76aa84701002518669", 0x4, 0x200, 0x3, 0x74b, 0x1, 0x1, 0x7ff, 0x7fffffff}) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000040)=0x200) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000000c0)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f0000000280), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) vmsplice(r0, 0x0, 0x0, 0x0) 10:14:36 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:14:37 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) getsockopt$sock_buf(r1, 0x1, 0x1c, 0x0, &(0x7f00000002c0)) setsockopt$inet_tcp_buf(r1, 0x6, 0x1f, &(0x7f0000000000)="581ce9a96478f86d671b8a07532257d7442d06c552f58e4c270bdec74452cf13015395ab547b6ffaf118b5a29faaa2713081860e7baaf9a4ff8db50b4761556dc3bd950dfa388983484b14b600162c17a32b0f8ed71ef874e565467d359a6cc2c63fd104d532004cfec3dcacf05af4b463ac5fe2f9c709154f7cc913bc6e9404328c0e318069d72a0d02cdcfd5c9cb712f9608c55d9138cca77ada4edf1a562571ad90a2fd89a70d2ca19ec2b37f27daad40bccc25", 0xb5) 10:14:37 executing program 4: r0 = gettid() openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_G_FBUF(r1, 0x8030560a, &(0x7f0000000000)={0x89, 0x2, &(0x7f00000000c0)="ac64a1dd7344f330f05e2c6a037f94f51bcf88b1456e67235f5ea3a3905981ec1b4a102015e4a1f728ffc1d77a84f93318da6648ce457dfb32f24bf3365d9d63e6d67ba189baae5978f00a042ba99c0bfda9baba7db40b07dd66db32182107dc42f8661b1f6ccc77ba92b0fb738e31e8852ac4a9233287780a6b804f4f2f99bc59478a9af7bc5f1e56", {0x7, 0xffffffffffffff80, 0x33524742, 0x1, 0x3eaa, 0xce, 0xb}}) close(r1) r2 = epoll_create1(0x0) r3 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000080)) timerfd_settime(r3, 0x0, &(0x7f0000000040)={{0x77359400}, {0x0, 0x989680}}, 0x0) epoll_wait(r2, &(0x7f0000000340)=[{}], 0x1, 0xfffd) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000440)={0x20000011}) clone(0x2000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 10:14:37 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0x0, 0x0) readv(r0, &(0x7f00000016c0), 0x10000000000004c4) 10:14:37 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:14:37 executing program 2: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x80100, 0x56f603420c35679b) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000180)="cd7c4d058b030300699c5276890a85f8b6afa3b7a3d225289875a61be43b0ad97cdd798a45c301ab8e2ab15f78b5a86c645db34b4af2e10c8c5210ab306d0dcfcec5b8ac0050ebd433570abf946c4ee4203308fe455f1d29acabc6872d48d1eee232c8a8c92bf1bfa6a13d27749ce8e92d3076256563") sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@caif=@rfm={0x25, 0xe73, "dfad060cb5b6640fcc7c438339673bbf"}, 0x3bd, &(0x7f0000000000)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff", 0xffffffffffffffe2}], 0x1}, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) 10:14:37 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x3, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000027c0)={&(0x7f0000002780)='./file0\x00', 0x0, 0x18}, 0x10) timer_create(0x2, &(0x7f00000002c0)={0x0, 0x2b, 0x0, @thr={0x0, 0x0}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) bind$packet(r2, &(0x7f0000000200)={0x11, 0x0, r3}, 0x14) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000100)) io_setup(0x4, &(0x7f0000002840)=0x0) fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000025c0)={{{@in=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f00000026c0)=0xe8) syz_mount_image$hfsplus(&(0x7f00000000c0)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0xa09, 0x7, &(0x7f0000002500)=[{&(0x7f0000000300)="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", 0x1000, 0x7}, {&(0x7f0000001300)="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", 0x1000, 0x80000000}, {&(0x7f0000000280)="3b64facc3f1a6c71e69935f0d1f6ee8dcb4e9234d93d1433a0b476c16e0cf5", 0x1f, 0xfffffffffffffffb}, {&(0x7f0000002300)="61530dfa2fe1b58829dd7f08161441351881e22ba4514f7a75526d201398d5edad8e63d91e7a3e8561d292aad4ed550e03259784fd2e56ffd1c02a06362f522f1c9d99e95a4c68605170a0e34e95ec17e041b68156ac4c05a540fb0b571ec971fda0ef159e488e1c1ef9994f8f38735c5951883d5770633199", 0x79, 0x1}, {&(0x7f0000002380)="d4d13b208a01c710f6d26d47f5e33df66207b860121d", 0x16, 0x6}, {&(0x7f00000023c0)="39438a5a3db60c4bae2a6f06a0b62a1e7c0a597f1000e6e1bd2a267b82f09d295a5584a687e987a825a948526d227bdb4b69568f8a022e00e8a2af1432d673fe1a2d74015cc0daa7cf5089b131e85ec1c11f403c3b184efe5496c7cc64eac3201c5b721df089864a9efa7838d7f19b0c768eda9ef3b4e77edc11cd84de7bd0506fbcb065b0250c0230aa8c", 0x8b, 0xff8}, {&(0x7f0000002480)="2ffa99c3bcf821f455073fbd1a4c9283cba2f89bd1ef97bb5e3c156197b2886fd2100a4e812bae9549847da9e9d8429ea535b3d1d1fd716c833f3a28fd119893b645e6abcfaefb5086236e41c85cea487ab4b10f198fc11d6563ecef46a31cfc639577559db469ae803c8e568f4b", 0x6e, 0x6}], 0x2000000, &(0x7f0000002700)={[{@barrier='barrier'}, {@creator={'creator', 0x3d, "ed1f5daf"}}, {@nobarrier='nobarrier'}, {@part={'part', 0x3d, 0x8}}], [{@uid_eq={'uid', 0x3d, r5}}, {@measure='measure'}, {@context={'context', 0x3d, 'user_u'}}, {@appraise_type='appraise_type=imasig'}]}) setxattr$trusted_overlay_upper(&(0x7f0000002800)='./file0\x00', &(0x7f0000002880)='trusted.overlay.upper\x00', &(0x7f00000028c0)={0x0, 0xfb, 0x59, 0x2, 0x5, "6e5e00f188518847b3292f4553f1ba00", "3aafee860e5cf10af4a08ec2ebc0839fb3c693785eabb6ac5dc6b2c26aba6e43f7852d47236b92801b1427d58b7571b130836b0da240a52574787d45edf46e45a90ab1e0"}, 0x59, 0x2) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)={0x0, 0x4, 0x0, 0x52}) io_submit(r4, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r2, &(0x7f0000000080), 0x0, 0x10}]) recvmmsg(r2, &(0x7f0000002940), 0x0, 0x100, &(0x7f0000002980)={0x77359400}) 10:14:37 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b31afdc1338d544", 0x38}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="3800d17050011a0609ed6173fff67800061e"], 0x1}}, 0x0) r0 = socket(0x10, 0xa, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") 10:14:37 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000480)={0x10, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0d63000000400763044000000000ac7f11e7db02a3cc8a5d5625a084b375a390d7c70300e6440d199c82ef046d98fd46385a2c3037414475700adc7d08b523822198875c8ad90cf0fed82d7a90e32afca8099c81be843d4b5855f50efa1e2107cc8875daab41e9c93b17c0"], 0x30d, 0xe0700000000000, 0x0}) [ 460.843575][T16635] hfsplus: unable to parse mount options 10:14:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r2, 0x0) r3 = accept4(r1, &(0x7f0000000180)=@rc, &(0x7f0000000000)=0x80, 0x80000) setsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f0000000200)=0x63, 0x2) 10:14:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x186], [0xc1]}) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$KVM_CREATE_PIT2(r4, 0x4040ae77, &(0x7f0000000200)={0x3}) ioctl$KDGKBDIACR(r3, 0x4b4a, &(0x7f0000000100)=""/235) 10:14:37 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) [ 461.037627][T16635] hfsplus: unable to parse mount options [ 461.054678][T16651] binder: 16646:16651 unknown command 1661419520 [ 461.092526][T16651] binder: 16646:16651 ioctl c0306201 20000480 returned -22 10:14:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) ioctl$int_in(r1, 0x5452, &(0x7f0000000040)=0x93b) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) recvmsg$kcm(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000009c0)=""/4096, 0xffffffb4}], 0x1}, 0x0) close(r1) 10:14:37 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r0, 0x2, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x20003, 0x0) ioctl$VHOST_SET_VRING_ERR(r1, 0x4008af22, &(0x7f0000000040)={0x0, r1}) write$P9_RSYMLINK(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000580)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x4, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @rand_addr="4b637c35876685a33c5bfef18ba779d8", 0x9}, @in={0x2, 0x4e24, @rand_addr=0x80000001}}}, 0x118) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r2, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r2, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 10:14:38 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) 10:14:38 executing program 3: fsopen(&(0x7f0000000000)='configfs\x00', 0x1) r0 = socket$pptp(0x18, 0x1, 0x2) fcntl$lock(r0, 0x5, &(0x7f0000000040)) syz_init_net_socket$x25(0x9, 0x5, 0x0) 10:14:38 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x2c8101, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8000, 0x8000) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000080)={0x0, {0x2, 0x4e20, @empty}, {0x2, 0x4e23, @local}, {0x2, 0x4e20, @loopback}, 0x48, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='gretap0\x00', 0xb263, 0x80000000, 0x1f}) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) 10:14:38 executing program 2: syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x3, 0x0) 10:14:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x60}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) 10:14:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x8188aea6, &(0x7f0000000300)={0x0, 0x5, [], [0xc1]}) [ 461.670036][ T9353] rpcbind: RPC call returned error 22 [ 461.691659][ T7] rpcbind: RPC call returned error 22 [ 461.814240][T16695] netlink: 'syz-executor.4': attribute type 5 has an invalid length. [ 461.867389][T16695] netlink: 'syz-executor.4': attribute type 6 has an invalid length. 10:14:38 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xa) 10:14:38 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50000}]}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, 0x0, 0x0, 0x0, 0xffffff4c}, 0x0) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) 10:14:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000780)=@ipx, 0x3d, 0x0, 0x0, 0x0, 0xfffa}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_names\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) [ 461.957827][T16668] bond0: (slave bond_slave_1): Releasing backup interface [ 461.959856][T16669] __sock_release: fasync list not empty! [ 462.103635][ T26] audit: type=1804 audit(1567160078.733:52): pid=16704 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/306/file0" dev="sda1" ino=17425 res=1 [ 462.129858][T16704] ima: Unable to reopen file for reading. 10:14:39 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:14:39 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000080)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 10:14:39 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) 10:14:39 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xa) 10:14:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) shutdown(0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000000c0)=""/1, 0x1}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r2, 0x0) readv(r0, &(0x7f0000000600)=[{&(0x7f0000000040)=""/87, 0x57}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) shutdown(r3, 0x0) 10:14:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000300)={0x7b, 0x5, [0x40000100], [0xc1]}) [ 462.525252][T16709] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 10:14:39 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) [ 462.724848][ T26] audit: type=1804 audit(1567160079.363:53): pid=16721 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/307/file0" dev="sda1" ino=17432 res=1 [ 462.724868][T16721] ima: Unable to reopen file for reading. [ 462.759579][T16725] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 10:14:39 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) r1 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmmsg(r1, &(0x7f0000000540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4800) ioctl$TCSETSW(r0, 0x5403, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x6) shutdown(r2, 0x0) [ 462.794134][T16725] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 462.824233][T16728] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 10:14:39 executing program 0: perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000003a40)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4000000000000f2, 0x0) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00%!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) r2 = socket$inet(0x10, 0x0, 0x100000000000c) sendmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="240000000a0a07031dfffd946fa2830020200a0009000100051d85a2046e36ad28", 0x21}], 0x1}, 0x0) [ 462.868387][T16728] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 10:14:39 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xa) 10:14:39 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000180)=ANY=[@ANYBLOB="1f0000000000000000000040050400a90000e7fc4b83bbb6a23b4b6942b787100100000001a400002560b700fff0ffff0403ffffffff00000a00000006"]) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x10000000000000b2, 0x2, [{0x38e}]}) [ 463.076858][T16734] bond0: (slave bond_slave_1): Releasing backup interface [ 463.304934][ T26] audit: type=1804 audit(1567160079.943:54): pid=16742 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/308/file0" dev="sda1" ino=17432 res=1 [ 463.331470][T16742] ima: Unable to reopen file for reading. 10:14:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x7}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}, {{0x0, 0x0, &(0x7f0000002ac0)=[{&(0x7f0000001900)=""/155, 0x2000199b}, {&(0x7f0000001ac0)=""/4096, 0x1000}, {&(0x7f0000000480)=""/61, 0x3d}], 0x3}}], 0x2, 0x0, 0x0) 10:14:40 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) recvmmsg(r0, &(0x7f0000003ec0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 10:14:40 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xa) 10:14:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='wrr\x00', 0x200000000000200) write$eventfd(r0, &(0x7f0000000000), 0x8) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0x1, 0x2011, r0, 0x0) [ 463.575977][T16761] netlink: 'syz-executor.2': attribute type 29 has an invalid length. [ 463.628569][T16761] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 463.676498][ T26] audit: type=1804 audit(1567160080.313:55): pid=16759 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/309/file0" dev="sda1" ino=16673 res=1 [ 463.707692][T16759] ima: Unable to reopen file for reading. 10:14:40 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xa) 10:14:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1400000029002908800000000002000001000000"], 0x14}}, 0x0) [ 464.025021][ T26] audit: type=1804 audit(1567160080.663:56): pid=16785 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/310/file0" dev="sda1" ino=16705 res=1 10:14:40 executing program 4: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x472, 0x10000) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\x06', 0xffffffffffffffff, 0x6c00}, &(0x7f0000001fee)='R\trusB\xe3cusgrVex:1e', 0x0) r1 = getpid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)=0x0) setpgid(r1, r2) syslog(0x4, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_getaffinity(r2, 0x8, &(0x7f0000000100)) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = dup2(r4, r3) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x10000) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000640)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r5, 0xc0505405, &(0x7f0000000040)={{0xffffffffffffffff, 0x3, 0x8, 0x0, 0xff}, 0x8000, 0x7f, 0x9}) getpgrp(0xffffffffffffffff) r7 = gettid() syz_open_procfs(r7, &(0x7f0000000340)='net/connector\x00') ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000580)) set_thread_area(&(0x7f0000000380)={0x6, 0x20001802, 0x1fff, 0x0, 0x9, 0x0, 0xc1, 0x0, 0xffffffff, 0x3}) write$FUSE_NOTIFY_STORE(r6, &(0x7f0000000480)=ANY=[@ANYBLOB], 0x0) [ 464.078165][T16744] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 464.136703][T16761] netlink: 'syz-executor.2': attribute type 29 has an invalid length. [ 464.170852][T16761] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 464.257520][T16748] bond0: (slave bond_slave_1): Releasing backup interface [ 464.282036][T16795] fuse: Bad value for 'subtype' [ 464.317085][T16794] fuse: Bad value for 'subtype' [ 464.437161][T16780] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 464.447422][T16764] netlink: 'syz-executor.2': attribute type 29 has an invalid length. [ 464.462531][T16764] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 464.473139][T16764] netlink: 'syz-executor.2': attribute type 29 has an invalid length. [ 464.482447][T16764] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 465.419543][T16805] IPVS: ftp: loaded support on port[0] = 21 [ 465.688911][T16805] chnl_net:caif_netlink_parms(): no params data found [ 465.824917][T16805] bridge0: port 1(bridge_slave_0) entered blocking state [ 465.832543][T16805] bridge0: port 1(bridge_slave_0) entered disabled state [ 465.840266][T16805] device bridge_slave_0 entered promiscuous mode [ 465.947389][T16805] bridge0: port 2(bridge_slave_1) entered blocking state [ 465.959695][T16805] bridge0: port 2(bridge_slave_1) entered disabled state [ 465.967755][T16805] device bridge_slave_1 entered promiscuous mode [ 466.067515][T16805] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 466.082964][T16805] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 466.101515][ T2542] device bridge_slave_1 left promiscuous mode [ 466.108411][ T2542] bridge0: port 2(bridge_slave_1) entered disabled state [ 466.143464][ T2542] device bridge_slave_0 left promiscuous mode [ 466.149669][ T2542] bridge0: port 1(bridge_slave_0) entered disabled state [ 468.062730][ T2542] device hsr_slave_0 left promiscuous mode [ 468.102349][ T2542] device hsr_slave_1 left promiscuous mode [ 468.153792][ T2542] team0 (unregistering): Port device team_slave_1 removed [ 468.169571][ T2542] team0 (unregistering): Port device team_slave_0 removed [ 468.181286][ T2542] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 468.210451][ T2542] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 468.304527][ T2542] bond0 (unregistering): Released all slaves [ 468.413026][T16805] team0: Port device team_slave_0 added [ 468.419900][T16805] team0: Port device team_slave_1 added [ 468.464364][T16805] device hsr_slave_0 entered promiscuous mode [ 468.502530][T16805] device hsr_slave_1 entered promiscuous mode [ 468.552210][T16805] debugfs: Directory 'hsr0' with parent '/' already present! [ 468.607309][T16805] 8021q: adding VLAN 0 to HW filter on device bond0 [ 468.678602][T16805] 8021q: adding VLAN 0 to HW filter on device team0 [ 468.691091][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 468.710418][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 468.749538][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 468.769944][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 468.781928][ T8902] bridge0: port 1(bridge_slave_0) entered blocking state [ 468.789356][ T8902] bridge0: port 1(bridge_slave_0) entered forwarding state [ 468.803831][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 468.817849][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 468.828989][ T8902] bridge0: port 2(bridge_slave_1) entered blocking state [ 468.836133][ T8902] bridge0: port 2(bridge_slave_1) entered forwarding state [ 468.876823][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 468.893074][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 468.911813][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 468.929608][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 468.939779][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 468.958637][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 468.975591][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 469.007750][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 469.028868][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 469.048634][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 469.075558][T16805] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 469.153804][T16805] 8021q: adding VLAN 0 to HW filter on device batadv0 10:14:46 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:14:46 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xa) 10:14:46 executing program 4: syz_emit_ethernet(0x83, &(0x7f0000000340)={@broadcast, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) 10:14:46 executing program 5: socket$vsock_dgram(0x28, 0x2, 0x0) epoll_create(0x1) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:14:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fstat(r0, &(0x7f0000000140)) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/73}], 0x1000000000000238) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchmod(r2, 0x0) recvfrom$inet(r2, 0x0, 0xccf3, 0x0, 0x0, 0x800e0051e) shutdown(r1, 0x0) shutdown(r2, 0x0) 10:14:46 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x25, 0x0, 0x0) pipe2(0x0, 0x800) unshare(0x60020000) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x2ee67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) getpgid(0xffffffffffffffff) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000740)="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") syz_open_dev$vcsn(&(0x7f0000000380)='/dev/vcs#\x00', 0x0, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xffffff55, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00'}) fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0)='trusted.overlay.upper\x00', 0x0, 0x0, 0x1) 10:14:46 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xa) [ 469.610914][ T26] audit: type=1804 audit(1567160086.243:57): pid=16820 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/311/file0" dev="sda1" ino=16753 res=1 [ 469.684093][T16821] IPVS: ftp: loaded support on port[0] = 21 10:14:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000001840)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001040)=""/37, 0x25}], 0x1}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xa1720495f3f7f40, 0x0, 0x0, 0x800e00516) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)=""/105, 0x166}, {0x0}, {0x0, 0x175}, {0x0}, {0x0}, {0x0}], 0x6}, 0x2) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0x1de, 0x0, 0x0, 0x800e0050e) shutdown(r4, 0x0) r6 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r6, &(0x7f0000000080)=[{&(0x7f0000000280)=""/250, 0xfa}], 0x1) shutdown(r5, 0x0) shutdown(r2, 0x0) [ 469.727774][T16825] device lo entered promiscuous mode [ 469.772862][ T26] audit: type=1804 audit(1567160086.413:58): pid=16831 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/312/file0" dev="sda1" ino=16881 res=1 10:14:46 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xa) 10:14:46 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x40000, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0], 0x3, 0x1f}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) r2 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r3 = dup(r2) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000380)) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) 10:14:46 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xa) [ 469.987714][ T26] audit: type=1804 audit(1567160086.623:59): pid=16840 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/313/file0" dev="sda1" ino=16930 res=1 10:14:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x101a00, 0x10) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f0000000080)='\x00', 0x0, r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="11dca50d5e0bcfe47bf070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xffffffffffffffa0, &(0x7f0000000000)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x1c}]}}}]}, 0x3c}}, 0x0) [ 470.173982][ T26] audit: type=1804 audit(1567160086.813:60): pid=16849 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/314/file0" dev="sda1" ino=16785 res=1 [ 470.364250][T16825] device lo left promiscuous mode [ 470.495922][T16834] IPVS: ftp: loaded support on port[0] = 21 10:14:47 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:14:47 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xa) 10:14:47 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x4f, 0x200300) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e24, @loopback}, 0x10) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000100)={0x3, 0x208, 0x5, 0x18, 0x0}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000180)={0x9, 0x1, 0x4, 0x80, 0xffffffff7fffffff, 0x0, 0x6, 0xfffffffffffffda4, r3}, 0x20) socket$can_raw(0x1d, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4800) setsockopt$TIPC_IMPORTANCE(r4, 0x10f, 0x7f, &(0x7f0000000040)=0x8, 0x4) syz_read_part_table(0x0, 0x2, &(0x7f0000001d40)=[{0x0, 0x0, 0x800}, {&(0x7f0000000a40)="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", 0x1ae, 0x1c}]) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000380)={&(0x7f0000000240), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x68, r5, 0x1, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x1, @media='eth\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) 10:14:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x803, 0x300) r1 = socket$inet(0x2, 0x80003, 0x4) setsockopt$llc_int(r0, 0x10c, 0x8, &(0x7f0000000040)=0x3d, 0x4) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) recvmmsg(r0, &(0x7f0000002e00), 0x386, 0x22, 0x0) [ 470.552252][T16855] (unnamed net_device) (uninitialized): Unable to set peer notification delay as MII monitoring is disabled [ 470.620482][T16858] device lo entered promiscuous mode [ 470.709556][ T26] audit: type=1804 audit(1567160087.343:61): pid=16868 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/315/file0" dev="sda1" ino=17105 res=1 10:14:47 executing program 5: r0 = socket(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(r1, 0x5501) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000080)={r0, 0xd328, 0x7, "ec932dfde25fdb9e2b778eed03d4a1fe4ef0d827e828176aaea812a1ab4b9eb06a1323e6c6aed64693c7c4686c3ef198c4b977f966cbe998c9a4ceeb006353c79e6da05167d4df2ed4e0aafe8e4f4d27434e63ef0ce7214a8a67db98505e4ad4bbc902996cf9ffd1f338ae995e7a4a9d0b1beb534852cb22f18f31071a148a74"}) getsockopt$netlink(r0, 0x10e, 0x3, 0x0, &(0x7f0000000000)=0x298) [ 470.813413][T16871] Dev loop4: unable to read RDB block 8 [ 470.827296][T16871] loop4: AHDI p1 [ 470.851820][T16871] loop4: partition table partially beyond EOD, truncated 10:14:49 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x0) mprotect(&(0x7f0000ff5000/0x4000)=nil, 0x4000, 0x1000000) ioctl$EVIOCSCLOCKID(r0, 0x80084504, &(0x7f0000ffcffc)) 10:14:49 executing program 3: mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xa) 10:14:49 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6gre0\x00', 0x0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000080)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_ADD_BUFS(r2, 0xc0206416, &(0x7f00000000c0)={0x8001, 0x8, 0x2, 0x2, 0x2, 0xffffffff80000000}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 10:14:49 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:14:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x402c01, 0x0) ioctl$VIDIOC_S_INPUT(r2, 0xc0045627, &(0x7f0000000080)=0x4) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae89, &(0x7f00000000c0)={0x7b, 0x5, [0xc0010015, 0x1], [0xc1]}) 10:14:49 executing program 3: mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xa) [ 473.245626][T16890] kvm [16887]: vcpu1, guest rIP: 0xfff0 unimplemented HWCR wrmsr: 0x1 10:14:50 executing program 5: ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, 0x0) io_setup(0x171, &(0x7f0000000100)=0x0) io_destroy(r0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r1 = dup(0xffffffffffffffff) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000180)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200800}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x5c, r2, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x5, 0x3]}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x6}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x9}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x2}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x20000, 0x0) setsockopt$inet6_int(r3, 0x29, 0xb, &(0x7f00000000c0)=0x7, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r4, 0x0) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x8d5af}], 0x1000000000000159, 0x0) 10:14:50 executing program 3: mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xa) 10:14:50 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getgid() ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f00000000c0)={0x1, 0x44, &(0x7f0000000040)="253349cadd561a6b3fd37e08a0f4d1797260a7a4c5fa9be378062244c0e0d8553b86e33b101ceb042e38c985beada9872f6b2132a332ad50270fe6aa6be4acf94ef6390f"}) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000bd7000)={&(0x7f0000000580)=ANY=[@ANYBLOB="840100001a00413b00000000000000000000000000000000000000000000000095a3baf73cbf3793cb24cafd8f2eee3b00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00006180a133029a40fe445488b200000000000000000000000000006c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000480003006c7a7300000000000000000000000000000000000000718c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140067686173682d636c6d756c6e6900"/315], 0x184}}, 0x0) [ 473.591458][T16906] netlink: 148 bytes leftover after parsing attributes in process `syz-executor.2'. [ 475.122984][ T2542] device bridge_slave_1 left promiscuous mode [ 475.129797][ T2542] bridge0: port 2(bridge_slave_1) entered disabled state [ 475.173288][ T2542] device bridge_slave_0 left promiscuous mode [ 475.179507][ T2542] bridge0: port 1(bridge_slave_0) entered disabled state [ 477.083033][ T2542] device hsr_slave_0 left promiscuous mode [ 477.122481][ T2542] device hsr_slave_1 left promiscuous mode [ 477.172437][ T2542] team0 (unregistering): Port device team_slave_1 removed [ 477.185331][ T2542] team0 (unregistering): Port device team_slave_0 removed [ 477.197285][ T2542] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 477.249630][ T2542] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 477.359596][ T2542] bond0 (unregistering): Released all slaves 10:14:55 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x9, 0x868d3b149db10bd0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x15, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000007ce096ffbe67a00072f954ea71101000000000009500000000000000d2535e86c81323417f9b5e485561adebb737ff4e05feb2eb6796dd0fec1f178a6fcae2674f154f07954308d712ee31"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xffffffffffffffff}, 0x10}, 0x70) fstat(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getegid() fchown(r0, r1, r2) 10:14:55 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xdad, 0x80000) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000001840)={{0x80}, 'port0\x00', 0xffffffffffdfffff, 0x2}) read(r0, &(0x7f00000002c0)=""/4096, 0x1000) 10:14:55 executing program 3: creat(0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xa) 10:14:55 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000300)='cgroup.procs\x00D\xa6\xb9\x19\x1a\a/\xcb\x80\xd0\x8c@\xe4h\x98\x03bp\xde\x89*\xb5a>Xu\x8b\x7f\x16\xff/\rjS', 0x2, 0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x400000, 0x0) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r2, 0xc0845658, &(0x7f0000000080)={0x0, @bt={0x5, 0x40, 0x1, 0x1, 0x55a, 0xcf, 0x2e, 0x0, 0x216, 0xec89, 0x7, 0x3, 0x100, 0xe847, 0x1, 0x8}}) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="5936a3e5a7b335ac57c3ab0a92f855264f6ff1674139432cc5e6039a922d0f61794002bb7d8ebbda561bfa92a58f04f206ac2fc9d724ded081c842305d14dbbb4c26fd01bf546c3c231a7ba1b55155dc7f45daafcf7009bb2db71911fe65592b8bb64622be8af620406dbdf0ed1b399c92b65b33dcc214f545c4d9622b2f2b9996cbeb206fa594259625fe1c86ca4bcbeff449cddb322c97f4f85e8d38a0624046e5e2516998b13384246999526e74bb8c7ef757080fd1e6f2a9fcd192733e3b6704271a59d31fcf9bf887", 0xcb, 0xfffffffffffffff9) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000002c0)={r3, 0x1000, 0xf8}, &(0x7f0000000380)={'enc=', 'oaep', ' hash=', {'sha3-256\x00'}}, &(0x7f0000000400)="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", &(0x7f0000001400)=""/248) write$cgroup_pid(r1, &(0x7f0000000340), 0x12) syz_open_dev$radio(&(0x7f0000001540)='/dev/radio#\x00', 0x0, 0x2) write$smack_current(r2, &(0x7f0000001500)='trusted\x00', 0x8) 10:14:55 executing program 0: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000000200)=ANY=[@ANYBLOB="e0139f00000a080000000000000000000000000000006e619741dac06322a94f18e09b478e7866e536fbffd4890e268fdd6bfb3f7361b8d804d6dff5ec9c7f7074da438ad2d83ce320a702", @ANYBLOB="740081008ca31de4df3b54c91df8a31be46a014d8ae8f40fc22ee20ce71439885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38"], 0x89}}, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f00000000c0)={'\x00', {0x2, 0x4e24, @rand_addr=0x9}}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x1, 0x0) [ 478.798728][T16915] IPVS: ftp: loaded support on port[0] = 21 10:14:55 executing program 2: mremap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000003000/0x3000)=nil) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x3) [ 478.932357][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 478.938206][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 479.092211][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 479.098074][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 479.216025][T16915] chnl_net:caif_netlink_parms(): no params data found [ 479.266372][T16915] bridge0: port 1(bridge_slave_0) entered blocking state [ 479.273728][T16915] bridge0: port 1(bridge_slave_0) entered disabled state [ 479.282569][T16915] device bridge_slave_0 entered promiscuous mode [ 479.290851][T16915] bridge0: port 2(bridge_slave_1) entered blocking state [ 479.298797][T16915] bridge0: port 2(bridge_slave_1) entered disabled state [ 479.307183][T16915] device bridge_slave_1 entered promiscuous mode [ 479.328227][T16915] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 479.340080][T16915] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 479.362020][T16915] team0: Port device team_slave_0 added [ 479.369561][T16915] team0: Port device team_slave_1 added [ 479.435539][T16915] device hsr_slave_0 entered promiscuous mode [ 479.472791][T16915] device hsr_slave_1 entered promiscuous mode [ 479.522612][T16915] debugfs: Directory 'hsr0' with parent '/' already present! [ 479.540449][T16915] bridge0: port 2(bridge_slave_1) entered blocking state [ 479.547860][T16915] bridge0: port 2(bridge_slave_1) entered forwarding state [ 479.555446][T16915] bridge0: port 1(bridge_slave_0) entered blocking state [ 479.563385][T16915] bridge0: port 1(bridge_slave_0) entered forwarding state [ 479.609311][T16915] 8021q: adding VLAN 0 to HW filter on device bond0 [ 479.625489][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 479.635512][ T8902] bridge0: port 1(bridge_slave_0) entered disabled state [ 479.644518][ T8902] bridge0: port 2(bridge_slave_1) entered disabled state [ 479.654147][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 479.667290][T16915] 8021q: adding VLAN 0 to HW filter on device team0 [ 479.679705][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 479.688852][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 479.696121][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 479.719896][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 479.736351][ T2999] bridge0: port 2(bridge_slave_1) entered blocking state [ 479.743665][ T2999] bridge0: port 2(bridge_slave_1) entered forwarding state [ 479.763374][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 479.772767][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 479.798637][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 479.811056][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 479.831150][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 479.841666][T16915] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 479.864768][T16915] 8021q: adding VLAN 0 to HW filter on device batadv0 10:14:56 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:14:56 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000640)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\xe3\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\x00\x87\xac\xad\x80\xa3P\x8c\xea\x17f%;\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80\x1d\x95WM\x9a\xc6\x95\x98\xed\xe9\xca\x9e\xe6\xcb\x8e\xef\xf659-\xef\xb5\xc9\xf2\"\x15\xb39T\x81\x19\xcc\xcd\xb5\r\x10G\x16(~\x15\xd1\xde\x9e\xb1s\xa0\x864hb\xaa\xa3\x18V\x17xE\xbd\xc2QD\xa5P\x0f\x8e\x1f\x888\xb6\xee\xc6N\xd2\x136\xeb\xa4\x1d\xaap\xc6\x9e\xdc\x007h\f\x96g\"_\xb1\x1b\xdb\x86\xc6\xc9\xb1\xcc\xa1\x9f\xd8h\xcc\x12\xf1k\xe8\x86:D\xd2\xd1\x02I\xfe\x96t\xe5C\x86)\xf0M\xc4\xa35\xcc\x9b\x9e\xbb5\x18[\x958D\\~3\xcaO\x97M\xaf\x930\xfd\x13\xa3\xde\xce0\x1d5I\xba\xc5;T\xdc\xaf\xc8\xa6\n\x92\x0e6>\x19*') openat$cgroup_ro(r0, &(0x7f0000000200)='pids.current\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') lseek(r1, 0x203ffffd, 0x0) read$alg(r1, &(0x7f0000003140)=""/147, 0x93) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x5) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xfffffffffffffdf2}, 0x2000008f) write$P9_RSTAT(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x152) 10:14:56 executing program 3: creat(0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xa) 10:14:56 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x3cb, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/if_inet6\x00') ioctl$SIOCNRDECOBS(r0, 0x89e2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x3600) 10:14:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sendto$ax25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x20000, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0xffffffffffbffffd) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0xfffffffffffffe48, 0x0, 0x0, 0xfffffffffffffd7b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r1, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000040)="440f20c0663508000000440f22c0660f38820c660f38251600000f01c9821083baf80c66b8a0b1928366efbafc0cb80000ef67660f38823fb800058ee8b8c0058ee8670fc72b", 0x46}], 0x1, 0x20, &(0x7f0000000100)=[@cr0={0x0, 0x20000000}], 0x1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x62cfa7bf54e24216, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:14:56 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x40, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_emit_ethernet(0x46, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaa1caaaaaaaaaaaa86dd6088dc4f00102f00fe8000000000000000000000000000bbef02000000000000004000000000000100006558040190010096e266003db41bb445133fb13c93ff637ca052d1f1670f6b4e40c13e1cb60bc151e8856c2aacf9b10da81f20edd457e247725b35fefb707703d8acb459e4f724f1782f42a4c66918700a6f"], &(0x7f0000000000)={0x0, 0x0, [0x0, 0x63, 0xf7f]}) 10:14:56 executing program 3: creat(0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xa) 10:14:56 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="6c61726765696f2c00310b0d7a99dc92f6d80fe56744415085ba7cab0bc27c6db1a999b1f510ca50d9e5712e534e958f12444acd54183e6f3796ba0c6a5524f268fcd5bd2ec6ba67b95e695e86156553accfee80f184999545"]) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x20000000000005, 0x501100) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000040)={@remote, @multicast2, 0x0}, &(0x7f0000000200)=0xc) bind$can_raw(r0, &(0x7f0000000240)={0x1d, r1}, 0x10) getcwd(&(0x7f0000000140)=""/177, 0xb1) 10:14:56 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x79f9, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000100)) 10:14:56 executing program 0: r0 = creat(&(0x7f0000000200)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f00000004c0)='./file1\x00', 0x0, 0x101003, 0x0) signalfd(r0, &(0x7f0000000000)={0x6}, 0x8) fanotify_init(0x0, 0x400) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x26, &(0x7f0000000080)={[{@data_writeback='data=writeback'}]}) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="e31185e524e02c971df7912babe705f19c0db78d83d12a6eea58a1341ef80f286899e3b1f6", 0x25, 0x1}, {&(0x7f0000000180)="aa0a45a72ebebd887988d789b6479924046d34a004bb501ef3af480ce03c0700ba8cd04b9eb6250c1d77c946daa87ea076df7d0320fddc392bdbb76735f38bd111f5794465297f27a4f4e55749331509efd756a3daf3d9c16d21628f24e1aba888a2f8d0aee8ac5b1452aa42", 0x6c, 0x5}], 0x45000, &(0x7f0000000500)=ANY=[@ANYBLOB="696e6c696e655f78617474722c6a61666d743d76667376312c666f776e65723e5cea13ed188d5bc47838a4939e6f34991bbcf3d1efa3a812345dd743a12ed1f4302371cce1fcf4600203ce7757609a16e8b228a01c3233fe8961ca6979", @ANYRESDEC=r1, @ANYBLOB=',euid=', @ANYRESDEC=r2, @ANYBLOB=',smackfstransmute=,context=staff_u,hash,fscontext=unconfined_u,obj_role=data=writeback,\x00']) 10:14:57 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, 0x0, 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xa) [ 480.430613][ T26] audit: type=1804 audit(1567160097.063:62): pid=16975 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir433285996/syzkaller.jxj2Zw/327/file0" dev="sda1" ino=17456 res=1 10:14:57 executing program 0: alarm(0x4) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xba, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x20000, 0x0) write(r1, &(0x7f0000000100)="34d549a2ba14a4ddc0d42c25b7dfa15ea09a75b5cba3e61a0f866b0d23033c3ee469504dda7c8e32e57acd2cb0c7296408ba37d586808263a48f33885d3ae07c56ce6b8b8f2dc83e4d488953169dad804257e88da0307a0f0cd0820b19aa68df6d14c57475c6b4a4a0f3fd819e54fbcc2987bafdbf22d30b189368c77bc5", 0x7e) ioctl$KVM_PPC_GET_SMMU_INFO(r1, 0x8250aea6, &(0x7f0000000080)=""/18) ioctl$VIDIOC_TRY_FMT(r0, 0xc014563b, &(0x7f0000000180)={0xa, @raw_data="8baacf4f5d7c52176c8c618454939a3bc4423ce98400c1323c01ab5d2483fbe663bae213a18e002aacc2427fc5b3840800a8111513c8ee31a59f610cd89aa8758d483e7025e9f16de03ff9f316f4edbb6216551af2b0d290dd97730778b18c73857907a4cdcd3ffcba40f9c3935e9ec0e8b4759e0135fff02e0a2385d973cb2933e9259f467a1b59ba939b0c7b2a28cc7c873eb3d51a39cb36b9641ec2285ebd0781b4fccf12976fbedf601074debb75774391df96ed2b9d6c85c11634d6905093cd7d1f0e9afc26"}) bind$rose(r1, &(0x7f0000000040)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, 0x1c) [ 480.611662][ T26] audit: type=1804 audit(1567160097.243:63): pid=16987 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/322/file0" dev="sda1" ino=17459 res=1 10:14:57 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:14:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r0, r1) ioctl$CAPI_GET_FLAGS(r2, 0x80044323, &(0x7f00000000c0)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000240)={0x16, 0x98, 0xfa00, {&(0x7f0000000100), 0x1, r4, 0x10, 0x1, @in6={0xa, 0x4e20, 0x222, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x444}}}, 0xa0) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000340)={0x7, &(0x7f0000000300)=[{}, {}, {}, {0x0}, {}, {}, {}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r2, 0x40086424, &(0x7f0000000380)={r5, 0x2}) sendmmsg$alg(r3, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7033f00, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') lseek(r6, 0x0, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x40000000000a132, 0xffffffffffffffff, 0x0) 10:14:57 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, 0x0, 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xa) 10:14:57 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x5, 0x200) ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f0000000040)={0x2, 0x1, 0x0, 0x4}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x8000) syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x0, 0x2) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syncfs(r1) syz_open_dev$evdev(0xfffffffffffffffe, 0x0, 0x0) [ 480.810904][T16978] XFS (loop5): Invalid superblock magic number [ 480.968672][ T26] audit: type=1804 audit(1567160097.603:64): pid=17002 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/323/file0" dev="sda1" ino=17456 res=1 10:14:57 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x70d14c4b66f2880d) ioctl$KVM_GET_SREGS(r2, 0x8138ae83, &(0x7f0000000180)) sendto$inet6(r0, &(0x7f0000000440)="030400000300600002000000fff55b4f02938207d9fb3780398d53d5e4e50600591f301ee616d5c0184374a7ffe4ec55e0650053c0e300801600002fd08d49a47eff71bc000000001f99bf00a900000000d1843e770afd6e9ef583b9436d2ada33f150d23233c17404067dbdc218", 0x6e, 0x0, 0x0, 0x0) 10:14:57 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x6, 0x200000) ioctl$SIOCX25CALLACCPTAPPRV(r1, 0x89e8) bind$rds(r0, &(0x7f0000000180)={0x2, 0xfffffffffffffffe, @multicast2}, 0xe) sendmsg$rds(r0, &(0x7f0000001c80)={&(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000340)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, &(0x7f0000001b80)=[{&(0x7f0000001940)=""/105, 0x69}], 0x1, 0x3d}}], 0x48}, 0x0) 10:14:57 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, 0x0, 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xa) [ 481.169779][ T26] audit: type=1804 audit(1567160097.803:65): pid=17011 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/324/file0" dev="sda1" ino=17297 res=1 [ 481.258929][T16978] XFS (loop5): Invalid superblock magic number 10:14:58 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x40001, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000100)={0xc, 0x8, 0xfa00, {&(0x7f0000000480)}}, 0x10) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents64(r1, &(0x7f0000000280)=""/121, 0x200002f9) 10:14:58 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:14:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-aesni-avx2\x00'}, 0x58) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x8000, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000000c0)={0xffffffffffffffff, 0xfffffffffffffff8, 0x2, r2}) socket(0x3, 0x3, 0x0) r3 = accept$alg(r0, 0x0, 0x0) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 10:14:58 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xa) 10:14:58 executing program 2: r0 = socket$kcm(0x10, 0x7, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x8, &(0x7f0000000000)=[{&(0x7f0000001900)="2e0000001d008104e00f80ecdb4cb9d902631912140002003b000000120001081506000040d819a90600150000ff", 0x2e}], 0x1}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x10800, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f00000000c0)={0x9, 0x0, 0x4, 0xfd, 0x213d, 0xed3, 0x4}, 0xc) 10:14:58 executing program 4: getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)={0x0, 0x0}) getpgid(r0) eventfd2(0x0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000880)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000780)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x6}, 0xc, &(0x7f0000000740)={&(0x7f0000000580)={0x19c, r3, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x6}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x73}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3d}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5b}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@dev={0xac, 0x14, 0x14, 0xe}}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="95a3e57e6e7369443a4f7a50d2139e0d"}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1ff}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@rand_addr=0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xe5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x24a}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}]}, @IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_bridge\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3fd}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e23}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000800)=0x11, 0x4) write$P9_RWSTAT(r5, &(0x7f00000002c0)={0x7, 0x7f, 0x1}, 0x7) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r6+30000000}, 0x0) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioperm(0x6, 0x4, 0x5) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, 0x0) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f0000000100)={0x44, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00634040030000000000000000000000000000000000000011000000000000000000000060000000000000001800000000000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES32=r4, @ANYBLOB="0000000000000000000000008561646600000000010000000000000001000000000000000e00000000000000852a747001000000", @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/92], @ANYBLOB="5c0000000000000002000000000000004000000000000000"], @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="000000000000000018000000000000003800000000000000"]], 0xc0, 0x0, &(0x7f0000000440)="38f815d8620130867b89087cb8ba0bf1ef7cbc6982d06aff2b13bfe3157c5c218a4e399d27e5d0e06f3f6d9bd73fe561ea3d08e1448dd8fea1cd81d8d4a2888ea9dc1d07da9fe83b87dbeec36a880222fe6f6145d7575a06f47f0bbe1bb71c602d0a29cc5945387c3f0061bc79006f074117dad3fb018c4262f5540bb7323150a20f93fce9a702163e5ba107d961c4815d9727908ece7fc1619c0886ff7f34629385de872f7563b516faf0132d3ef86e425e78b86e5430c741ca0366bb3f4057"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, 0x0) write$P9_RWRITE(r2, &(0x7f00000007c0)={0xb, 0x77, 0x2, 0x8}, 0xb) 10:14:58 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x25f9feae0f8f4aca, 0x0) mmap$xdp(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x100010, r1, 0x100000000) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @local}, 0xc) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000140)={@multicast2, @remote}, 0xffffffffffffffd5) getsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f0000695ffc)=0x24b) [ 481.803234][ T26] audit: type=1804 audit(1567160098.443:66): pid=17046 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/325/file0" dev="sda1" ino=17452 res=1 10:14:58 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xa) 10:14:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = getuid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) getresuid(&(0x7f0000000300), &(0x7f0000000340)=0x0, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getresuid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) getresuid(&(0x7f00000005c0)=0x0, &(0x7f0000000600), &(0x7f0000000640)) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000740)={0x0, 0x0}, &(0x7f0000000780)=0xc) getgroups(0x1, &(0x7f00000007c0)=[0xee01]) setsockopt$inet_int(r0, 0x0, 0xd, &(0x7f0000000900)=0x9, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000800)={0x0, 0x0, 0x0}, &(0x7f0000000840)=0xc) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000880)={{}, {0x1, 0x5}, [{0x2, 0x3, r1}, {0x2, 0x2, r2}, {0x2, 0x6, r3}, {0x2, 0x2, r4}, {0x2, 0x1, r5}, {0x2, 0x0, r6}, {0x2, 0x2, r7}, {0x2, 0x4, r8}], {0x4, 0x1}, [{0x8, 0x4, r9}, {0x8, 0x5, r10}], {0x10, 0x2}, {0x20, 0x2}}, 0x74, 0x1) ioctl(r0, 0x3, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000040)=""/239) 10:14:58 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getcwd(&(0x7f0000000100)=""/67, 0x43) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) mlock2(&(0x7f0000000000/0x4000)=nil, 0xe07000, 0x0) [ 482.192191][ T26] audit: type=1804 audit(1567160098.823:67): pid=17067 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/326/file0" dev="sda1" ino=17217 res=1 10:14:58 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x100, 0x0) faccessat(r0, &(0x7f0000000380)='./file1\x00', 0x4, 0x800) io_setup(0x0, &(0x7f0000000080)=0x0) pipe2$9p(&(0x7f0000000140), 0x80000) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x100, 0x0) getdents64(r2, &(0x7f0000000280)=""/143, 0x8f) mkdir(&(0x7f0000000040)='./file0\x00', 0x40) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) chmod(&(0x7f0000000200)='./file0\x00', 0x0) write$P9_RATTACH(r3, &(0x7f00000000c0)={0x14, 0x69, 0x2}, 0xfd74) fcntl$setpipe(r3, 0x407, 0x3) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x200000, 0x0) io_submit(r1, 0x1, &(0x7f00000001c0)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r3, 0x0, 0x9, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 10:14:59 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xa) 10:14:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x2) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x4000) ioctl$EVIOCSABS2F(r3, 0x401845ef, &(0x7f0000000080)={0x3, 0xfffffffffffff0b3, 0x7, 0xff, 0x4, 0x5}) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x1c) [ 482.576287][ T26] audit: type=1804 audit(1567160099.213:68): pid=17083 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/327/file0" dev="sda1" ino=17440 res=1 [ 483.783448][ T9353] device bridge_slave_1 left promiscuous mode [ 483.789757][ T9353] bridge0: port 2(bridge_slave_1) entered disabled state [ 483.873105][ T9353] device bridge_slave_0 left promiscuous mode [ 483.879563][ T9353] bridge0: port 1(bridge_slave_0) entered disabled state [ 486.033065][ T9353] device hsr_slave_0 left promiscuous mode [ 486.092496][ T9353] device hsr_slave_1 left promiscuous mode [ 486.164751][ T9353] team0 (unregistering): Port device team_slave_1 removed [ 486.179328][ T9353] team0 (unregistering): Port device team_slave_0 removed [ 486.194454][ T9353] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 486.244235][ T9353] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 486.338900][ T9353] bond0 (unregistering): Released all slaves [ 486.451656][T17091] IPVS: ftp: loaded support on port[0] = 21 [ 486.531342][T17091] chnl_net:caif_netlink_parms(): no params data found [ 486.565328][T17091] bridge0: port 1(bridge_slave_0) entered blocking state [ 486.572753][T17091] bridge0: port 1(bridge_slave_0) entered disabled state [ 486.580604][T17091] device bridge_slave_0 entered promiscuous mode [ 486.622809][T17091] bridge0: port 2(bridge_slave_1) entered blocking state [ 486.629974][T17091] bridge0: port 2(bridge_slave_1) entered disabled state [ 486.646910][T17091] device bridge_slave_1 entered promiscuous mode [ 486.709055][T17091] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 486.735076][T17091] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 486.775279][T17091] team0: Port device team_slave_0 added [ 486.783928][T17091] team0: Port device team_slave_1 added [ 486.856090][T17091] device hsr_slave_0 entered promiscuous mode [ 486.902594][T17091] device hsr_slave_1 entered promiscuous mode [ 486.962461][T17091] debugfs: Directory 'hsr0' with parent '/' already present! [ 487.004947][T17091] bridge0: port 2(bridge_slave_1) entered blocking state [ 487.012043][T17091] bridge0: port 2(bridge_slave_1) entered forwarding state [ 487.019475][T17091] bridge0: port 1(bridge_slave_0) entered blocking state [ 487.026665][T17091] bridge0: port 1(bridge_slave_0) entered forwarding state [ 487.141311][T17091] 8021q: adding VLAN 0 to HW filter on device bond0 [ 487.172778][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 487.192050][ T8892] bridge0: port 1(bridge_slave_0) entered disabled state [ 487.211068][ T8892] bridge0: port 2(bridge_slave_1) entered disabled state [ 487.236399][T17091] 8021q: adding VLAN 0 to HW filter on device team0 [ 487.260274][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 487.279926][ T8892] bridge0: port 1(bridge_slave_0) entered blocking state [ 487.287075][ T8892] bridge0: port 1(bridge_slave_0) entered forwarding state [ 487.319926][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 487.339409][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 487.346629][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 487.384188][T12604] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 487.393860][T12604] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 487.403759][T12604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 487.418571][T17091] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 487.430992][T17091] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 487.439920][T12604] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 487.449299][T12604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 487.490253][T17091] 8021q: adding VLAN 0 to HW filter on device batadv0 10:15:04 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:15:04 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/udplite6\x00') r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x800, 0x0) mkdirat(r1, &(0x7f0000000180)='./file0\x00', 0x13a) uselib(&(0x7f0000000140)='./file0\x00') dup2(r1, r0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0xc0ed0000, 0x0) 10:15:04 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, 0x0, 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xa) 10:15:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="d0000000274817ace16754f5d3907f98e14186c8eac21672da387a5ccf260c553a0227ef847b459298f4b043a1e9090f15f25d78efbeaeb939a069c0d13e", @ANYRES16=r1, @ANYBLOB="000828bd7000fbdbdf250800000008000500000000004000020014000100000000010000000000000000000000000800090059030000080007000200000008000b0002000000080009000500000008000300000000004c000200080008000700000008000d000000000014000100ac1414aa00000000000000000000000008000700050000000800070009000000140001007f00000100000000000000000000000008000008000500090000000800050002000000080004000600000008000600c5e000000000000000"], 0xd0}, 0x1, 0x0, 0x0, 0x8000}, 0x4) creat(&(0x7f0000000180)='./file0\x00', 0x8) 10:15:04 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0xffffffff, 0x800) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000480)={{0xa, 0x4e24, 0x3ff, @local, 0x80000001}, {0xa, 0x4e24, 0x0, @mcast1}}, 0x5c) r1 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000340)=0x3, 0x4) r2 = dup(r1) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000080)={0x0, 0x7530}, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000400)={0x2, &(0x7f0000000300)=[{0x4, 0x0, 0xadd0, 0x3}, {0x1000, 0x8e8, 0x1, 0x5}]}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f0000000380)={'nat\x00', 0x0, 0x6, 0x1b, [], 0x4, &(0x7f0000000040)=[{}, {}, {}, {}], &(0x7f0000000140)=""/204}, &(0x7f00000000c0)=0x78) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_buf(r3, 0x0, 0x26, 0x0, &(0x7f0000000580)=0xdf) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000500)) mount(0x0, 0x0, 0x0, 0x1042000, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141046, 0x0) mknod(&(0x7f0000000280)='./bus\x00', 0x4, 0x6) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000240)=0x7, 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x382, 0x4) ftruncate(r4, 0x2007fff) sendfile(r2, r4, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 10:15:04 executing program 2: r0 = socket(0x11, 0x802, 0x5) setsockopt$inet_int(r0, 0x0, 0x18, &(0x7f00000000c0)=0x2, 0xfd07) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 487.917027][ T26] audit: type=1804 audit(1567160104.553:69): pid=17108 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/328/file0" dev="sda1" ino=17481 res=1 10:15:04 executing program 5: r0 = socket$inet(0x10, 0x100000000002, 0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000040)=@hci={0x1f, r1, 0x3}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="3424d8ce8fec557b0eaa29184a8f2aa20676a0637cf64e6a2d591ed214aff02823676f36ee022ed9fb8a9f97c07ddae3234d64d9eb15cd01323365f813a859c0bba178e7ae31273185c231c94f1d432879c32e", 0x53}], 0x1, &(0x7f0000000240)=[{0x48, 0x110, 0x4, "3b913aeb6109ae3ccc40ad1ba93952df18e499ff12815875ef9bd7b674ac16615342237f75091bc129166f77def05c79f6c7"}, {0x108, 0x107, 0x1ff, "ab021bf6b0350c68ae510814548485e964179474de98a258e19eb0c27387fe333f31bb7e4e05b66f89ede5dfa88a0ea312234efd44779b07b5e386af6402b7abbaafeecfec6dc97b7e6b03e92ef311de36ba20ecbbc7ee2a2fd186b123324972ea340cd7d9d270f5af4a367ce2993dc67f215e4d75f09d8ccc48cc827d08b2073f9f79e64bfa1eea7c21c1d438f6786d3840e1238f8c0e66621f0e3c539466328e988dbf4a678eb45fa691790cf5b0d2a9bd420bb6cc6cc8c093a25585d357c1db9367117d92019d9228685d5f862d439671abf06957f5531a68179b5256126f560941600a693295587eeef28d49dc75e9383349b8"}, {0x28, 0x115, 0x3, "4e29617d884fa9d528a1a6266437a1d29cec40"}, {0x110, 0x118, 0x58, "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"}, {0xe0, 0x103, 0xd5, "bb11543fa983c2d5aa7b169ac3a97801154b22bd92ce112cd492091e3f8aa5e5462fcd3e93ec3a528ce1d490e94a75284b757ae14704dd948655413d4501e8c1216cd6171a690d4303054545ca712753d192de5d76cf391779375447acc3ba96b6c417aa806e03bd1f6916d5b5585c269204fd33635979bfa0e86dd3d5562b7b58e3b496680e05846873192bf9fcf02a24e40dbb0055ad75dcf60c45c45acc12c79497836d7ef890b1668a0623e0138666cc1a674480988dbab2b52b41c9ec8168a60871a055b5cb8d2feb9182d4a9"}, {0xa8, 0x1, 0x0, "a78b247c6b79f037cc3c22a2c43b9f8c17d6c6ebad604dafbb58f97ab8b700ca315910b930aeb623941475c3e2b7547a1d6e3697836d62fb27b0646fa7c01f142bbdea6da40409826b48e07b3c81c19f76b007f25772d45db7bd1251516c2b5865da0b350d729a1ffe73162008ac3b7f672341819483820eb557671e0dae666cb064770ea5e7ed72630ccc378006cc15acec607c"}, {0xa0, 0x0, 0x9a, "6db3bff6e854174db22cafa07412e2f92d0b332b54c5e7428ae9c1ac158e588d85e04a26f6de6f35dfafa0bc2c31a447e696e47015810c0bdabae92620a78214530474f8956505fc7c7be44cee329f1fc94fd2d81d87d0b406ba80a4138df5ca1805826ec794f0319f0ce6950eed550e322e021c7171a56e13d9a05f6a1d7253c8509ed848b0bed77d3e56"}, {0xd0, 0x103, 0x100, "661c3d418a9309a4754e0bf776b0291e1d3cbad5b493bab8e8d444061990d79e9169b7f0ad668ba1bca3e792b7a026355062bf8e71e227fc96ca2da7437851dab374adf62f2d651723427c72683503f426533d1f0a9610a2d08411e7c7fe3ab71ee803bd85ca5f069133a0a8b60aa0063d352c99bc29cf2ff50e174f874fe032ca409927a791e878f07780824c717056aea964f6c0d8c67e9c9c908b2590f16706c306718efe32fb6bbbc11eeb2c1dd83ca2c19fd194a78eaa3f33bc1b4aae"}], 0x580}, 0x4) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000180)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:15:04 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x1, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x80, 0x0) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000040)={"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"}) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) 10:15:04 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, 0x0, 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xa) 10:15:04 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001500)='/dev/ptmx\x00', 0x0, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) keyctl$session_to_parent(0x12) r1 = dup(r0) ioctl$TCSETXW(r1, 0x5435, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e21, 0x8000, @local, 0x9}}, 0xffffffff80000001, 0x7f, 0x2, 0x20, 0x10}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000100)={r2, 0x7}, 0x8) ioctl$PPPIOCGFLAGS(r1, 0x8004745a, &(0x7f0000000140)) [ 488.152022][T17118] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 488.235305][ T26] audit: type=1804 audit(1567160104.873:70): pid=17124 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/329/file0" dev="sda1" ino=17477 res=1 10:15:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000040)=""/93, 0x200000, 0x800, 0x3}, 0x18) ioctl$LOOP_SET_FD(r2, 0x4c00, r0) socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) 10:15:04 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000440)='/dev/capi20\x00', 0x400000, 0x0) ioctl$CAPI_GET_PROFILE(r0, 0xc0404309, &(0x7f0000000480)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000002c0)={0x0, 0x3f}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000240)={r4, 0x9971}, 0x8) ioctl$SG_SET_DEBUG(r2, 0x227e, &(0x7f0000000140)=0x1) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000500)={0x4, 0x0, 0x100000001}) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000400)={r4, 0x401}, 0x8) r5 = semget(0x2, 0x1, 0x40) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000640)=@assoc_value={r4, 0x1}, 0x8) semctl$IPC_INFO(r5, 0x2, 0x3, &(0x7f0000000540)=""/245) r6 = socket$inet(0x2, 0x3, 0x7f) write$P9_RAUTH(r2, &(0x7f0000000100)={0x14, 0x67, 0x2, {0x4}}, 0x14) vmsplice(r6, &(0x7f0000000280)=[{&(0x7f0000000200)="093a1e06b3", 0x14}], 0x0, 0x2) syz_genetlink_get_family_id$net_dm(&(0x7f0000000680)='NET_DM\x00') bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000004c0)=r1, 0x4) setsockopt$inet_int(r6, 0x0, 0x3, &(0x7f00000000c0)=0x7ff, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000300)={r4, @in6={{0xa, 0x4e20, 0x9, @dev={0xfe, 0x80, [], 0x22}, 0x7}}, [0x6, 0x3, 0x7fff, 0x4, 0xc2, 0x1bf, 0x0, 0x81, 0x6, 0x8, 0x0, 0x4, 0xfffffffffffffffe, 0x7, 0xfffffffffffffe01]}, &(0x7f0000000180)=0x100) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 10:15:05 executing program 2: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000100)="1f0000000104ffce9e67fa5eaca27100f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000000)="1f0000000104fffffd3b54c007e596cb9c0501000b000600060000000100cf", 0xffffffffffffff18) 10:15:05 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:15:05 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, 0x0, 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xa) 10:15:05 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x36a7, 0x0) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000000)=0x7ff, 0x4) ioctl(r0, 0xffffffffffffffb1, &(0x7f0000000000)) 10:15:05 executing program 0: r0 = memfd_create(&(0x7f0000000040)='vboxndt1\x00\xd9\xa1>L{\xcfb\xeb\xba^pA#\a[\xf1\xf9-F=e\xaeT\x0e\xa0K\"\xb4\xd4\x91\xeb|7hmOj8\x88\xfd\xd5\xd9Z\xf9\xdaza\x88\xed\xf8\xa5[\x1c\x1f\xa8\xe4\x05+\xe4\xbe\xdb\x9eW\x8c\\0\xa4\xe3c\xb8]G\xcd\x87\'\x8b3\xb8\x84\x8d\x14\x06\x0e\xef \xf8\x9e\xac\x8c\xf7\xb8\x14\x99\r\xb6\x04u\x92\x92_\x18\xb9\xc8\x9d\xb9\x98\xaf\x03dE\xa2\x11%\x8f\xc6\xf9\xa0Qt\xb3N\x81ohil\'\xb9\xee]\xc4Gu\xe2n\xe0\xf1\x9cr\x97+\b\bm$,\xe7\xd3\xfb\x86\xdd\xc3\xb3\xa1\x00E\xcc\xa9\xfa\x9cq\xd8\x88Z\xe3\x1fa\x9b\x8c\x0f\x83\xa0\xf4\xe6\xfb\x9c\xfc\x9cW%\xa8\r;\x1f\xb0\xd0\xa3', 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200000, 0x0) lseek(r0, 0x2, 0x1) 10:15:05 executing program 4: syz_open_dev$mouse(0x0, 0x8, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) shmctl$IPC_SET(0x0, 0x1, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x3b7}], 0x1, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x40000, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) setsockopt$inet6_dccp_buf(r1, 0x21, 0xe990e27fa7e819ee, &(0x7f0000000040)="ef1298f6b0756883b16b0038e63466ec35704cb6ec057ec211bd875fabb9600e309f1c502756437b80c7f7d73c2743adcbcedaddb2f5d1dd8c21b6f36142ab66386b95640080d8f03333f379f59269b7b388521e7fe6a0a67fd5274a14deb809e26a36c039584f904588f7dd7ccaced877c0651b9771c025b2cc0fc4f0ed2f1449595633fb4e9d6a9738599b77e8e837edef7c0bb08a7e06a05c19b48aa537f5bc8cfa", 0xa3) r2 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x1ff, 0x202840) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140), &(0x7f0000000200)=0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x262, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000005000/0x2000)=nil], &(0x7f0000000380)=[0x1], 0x0, 0x0) r4 = accept$netrom(r1, 0x0, &(0x7f0000000840)) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000004c0)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}}}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, 0x0, &(0x7f0000000680)) flock(r4, 0x2) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000440)={0x0, 0xe000000000000000}, &(0x7f0000000480)=0x8) sendfile(0xffffffffffffffff, r3, &(0x7f0000000180), 0x1) [ 488.705577][ T26] audit: type=1800 audit(1567160105.343:71): pid=17137 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=17479 res=0 [ 488.803749][T17143] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. [ 488.847275][ T26] audit: type=1804 audit(1567160105.483:72): pid=17144 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/330/file0" dev="sda1" ino=17464 res=1 10:15:05 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00\x00\x00\x00\x05\b\x10\x02', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000000), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f00000000c0)=ANY=[@ANYRES16=r0, @ANYRES16=r2, @ANYRES16=r0, @ANYRESDEC=r1], 0x1a) 10:15:05 executing program 5: r0 = socket$inet6(0xa, 0x1000080002, 0x100000000000088) bind$inet6(r0, &(0x7f00000007c0)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) sendto$inet6(r1, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e2f6669007070312f205da2747275737465642b5c0a93df772e95dcac71b459f27fcff2f1a8c1d0bca300000000000000000000dcecd1570604af370dbb3450e991"], 0x45) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x0, 0x0) ioctl$VIDIOC_G_JPEGCOMP(r2, 0x808c563d, &(0x7f00000001c0)) ioctl$VIDIOC_S_TUNER(r2, 0x4054561e, &(0x7f0000000140)={0x400, "1a3d1b33f6a65d0242013fa47f0ea47c939a00d659f472423ef56ca14cfcb728", 0x3, 0x20, 0x2, 0xff, 0x10, 0x2, 0xfffffffffffffff7, 0x8}) ioctl$VIDIOC_S_PARM(0xffffffffffffffff, 0xc0cc5616, &(0x7f0000000380)={0x0, @output={0x0, 0x0, {0x3}}}) recvmsg(r0, &(0x7f00000000c0)={0x0, 0xff3c, &(0x7f0000000380), 0x114, 0x0, 0x13d}, 0x0) ioctl$UI_SET_LEDBIT(r2, 0x40045569, 0xb) 10:15:05 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xa) [ 488.944340][T17143] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 10:15:05 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) [ 489.134996][T17161] Unknown ioctl -2138286531 10:15:05 executing program 2: r0 = syz_open_dev$vbi(&(0x7f00000002c0)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000200)=0xe8) chroot(&(0x7f00000000c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x10000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x800}}, {@blksize={'blksize', 0x3d, 0x800}}], [{@seclabel='seclabel'}]}}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f0000000400)={0xa, 0x0, [{0x92d, 0x0, 0x8}, {0xbff, 0x0, 0x1}, {0x0, 0x0, 0x5}, {0x8ec, 0x0, 0x7}, {0xab2, 0x0, 0xb5}, {0xb88, 0x0, 0x4}, {0x34f, 0x0, 0x800}, {0xaca, 0x0, 0x401}, {0xcdc6684e7a51219e}, {0x974, 0x0, 0x20}]}) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0xe) ioctl$TCSETS2(r3, 0x80047437, 0x0) 10:15:05 executing program 4: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x24d42ca6) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0xc04c5349, &(0x7f0000000640)={0x0, 0x0, {0x3}}) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x19, &(0x7f0000000040)=0x20, 0x4) tkill(r0, 0x1000000000013) [ 489.163267][T17161] Unknown ioctl 1079268894 10:15:05 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='personality\x00') ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f0000000040)={0x3ff, 0x9}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r1, &(0x7f0000000300)={0x78, 0x0, 0x8, {0x7, 0x7fff, 0x0, {0x3, 0x69e, 0x9, 0x4, 0xbcb5, 0x50, 0x0, 0x9, 0x800, 0x36e, 0x4, r2, r3, 0x2, 0x100000000}}}, 0x78) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=@migrate={0xac, 0x21, 0x21, 0x0, 0x0, {{@in=@local}}, [@migrate={0x5c, 0x11, [{@in6=@loopback, @in=@local, 0x0, 0x0, 0xfffff000}, {@in=@broadcast, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}]}]}, 0xac}}, 0x0) [ 489.223594][ T26] audit: type=1804 audit(1567160105.863:73): pid=17165 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/331/file0" dev="sda1" ino=17477 res=1 [ 489.252799][T17168] Unknown ioctl 1074025833 10:15:05 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xa) 10:15:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c0000002f00ff3ab4a17de8f1f327000900000008000300", @ANYRES32], 0x1c}}, 0x0) 10:15:06 executing program 0: capset(&(0x7f00000fc000)={0x19980330}, &(0x7f000047efe8)) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x4}], 0x2a1) [ 489.525196][ T26] audit: type=1804 audit(1567160106.163:74): pid=17185 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/332/file0" dev="sda1" ino=17493 res=1 10:15:06 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xa) 10:15:06 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xdc, r1, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x18}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0xfcd15892d0d477a8}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xff}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0xfffffffffffffff9}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x534}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xfffffffffffffc00}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x83}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5a6bbabe}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1ff}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfffffffffffffff7}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x4000}, 0x40) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000040)={{{@in6=@initdev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}}}, &(0x7f0000000140)=0xe8) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000180)={r2, 0x1, 0x6, @broadcast}, 0x10) r3 = socket$inet6(0xa, 0x805, 0x8) getsockopt$inet6_int(r3, 0x3a, 0xef633919331ee3f7, 0x0, 0x0) 10:15:06 executing program 0: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') [ 489.800752][ T26] audit: type=1804 audit(1567160106.433:75): pid=17192 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/333/file0" dev="sda1" ino=17490 res=1 [ 489.898523][T17203] Unknown ioctl -2138286531 [ 489.953224][T17168] Unknown ioctl 1079268894 [ 489.953938][T17206] Unknown ioctl 1074025833 10:15:06 executing program 5: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) writev(r1, &(0x7f0000000980)=[{&(0x7f0000000400)="405d62b2", 0x4}, {&(0x7f0000000440)="4966b10771010eadb312ad28e6d03d4c624bc04c5b381c8b479339194fc20460e28f3e429ca9c6c347967dacf514a5d5ade37f954116badac71a32499e90d4eb5b50e59e93e522c3379ee5035244e2dbc9699f1a8ae86620856a4041d89cd791d58cd3e74b4e34a6b3447cd20bc114151f73ac0ac05d1a20b4c124e7ad2245925803d9388f8123d926629a9a4187f4e22664d9d0760102817407cc75c191b93496c3fa2e33fddab27999e96886087a2cb4", 0xb1}, {&(0x7f0000000500)="b019e7343490bd3f5dcb1518a3c77164edaa995fe60893f15712bde1de223eb4975b5f3b5135cf241c99a83bbf18b2ff650ca45d", 0x34}, {&(0x7f0000000540)="ff4d70c3e633670588e24e9fc3b467ffb9029fb6c022bf7c0beda59704be574dbb62f0061fe7c5c8f8044a1b91c77021caf7fe6493c3fad12cc4f10eb85d6569e72a47f1869e14b6e3488972276c19cb2625871557fe4fa603450577acb0a5cda7e4c8eea0be6661eb26889c8c70cfafad7e32b31e7fa927774b6d3040e848978857b40429ff5644cdde3c6127e49e983d2b426df1b3ec831973ea7cd24023c4c7d2ed6f1b3c9c494a69f7fb656c5ccc9f70de88c4ed8c7ee292d2b867cedc220a90f5875f919805fb6ed77de856f52c83695d626f9ef63279a15166e3ec5d964ed81410c98ec33e009513cd5d3444d5c1", 0xf1}, {&(0x7f0000000640)="f7276dbfd5c33cbdfb730fb92a10baacc5d03f33555c6470b16f919a2f8439dee330bc95bc9f7c3466921cad58af4cb2b2e188431e2b251b9596896e9f57ad8839254d6a7f63b4507f520c", 0x4b}, {&(0x7f00000006c0)="aa5ff31c98ed97727869eb862e4b872c5b55c69ffa8559051fa1d284667ac805912b6735ef32b242b2227bed0e077f3a977938066f6dd2ec3536509f1ef8957ebc7f156940f582af68f977d32261e64a5c15e6b93e98e076a4ffa9be614a8e52d0171ad53281c52f2dc443ed", 0x6c}, {&(0x7f0000000740)="57a7d9cb6b223bdc2f8cbb3304525f1ee452b9512e8ca609cbf8f33ed20f1dfaa667875cec6580514aa27e302cd3c738447d7281e24b00f2d6bb711ba4104443701da768cd68fccd82b8ecf3c0cedf16489bfa715b003d35d6c6be310240857abbc9ee", 0x63}, {&(0x7f00000007c0)="6e66533616e94a58fa2138ff6592d6b4f045d586b169f64f5c0b24c565567952ed31c8c485019d297bc5b1158e675b630201dac2efa2b42131f5b215e51f0bce9753a317d58c65772e98f7f041882da48267a8a5e2553a831f7d68bc514d27b2fb2058dab6e1d23bca6a7041b761fdce68721c08c7fec0c0e8ef93e24f42103a6cba73be2057dc3d098b2d3ce3b3fb6f21e16ae9cb6bc38a887015672816697b36c6caa6da75e9ba1a522b45479731cc0d6265cc192b02b3ffde51977039fa5504f277fb39dc86699875ae", 0xcb}, {&(0x7f00000008c0)="b230325f8eabca62cec511f27ab26e266e666474dc538db23e69d71731df39e40516b266c57e1e594f8c6e4ff5d05fe8fddae3d0088f2d8d0e244b1570422980db8ec7dc3dd01e6ddf77dc637e9a6f0489082e91963b6a9dc68d9d341f348ff419b85382449522b94672eb21ddfd0cb5d41b39c53d98bd63b26d4b41b05edab65f3e24f3b814", 0x86}], 0x9) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="1c00000007ffff0f00"], 0x9) writev(r1, &(0x7f0000000300)=[{&(0x7f00000003c0)="f68ea05c8f878228ff5b74", 0xb}], 0x1) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r2) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6e6f657874656c642c00f3d66cdbfdd2df33dda9a68527c436e6830382ad80c926000bbc50d13e538d0241cf5e059c2e7979ed22c783f13a55e9a57d4e079f9efa979c1cb94afb49"]) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x40, 0x0) move_mount(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', r3, &(0x7f0000000180)='./file0\x00', 0x4) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000a40)={0x0, 0x6}, &(0x7f0000000a80)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000ac0)={r4, 0x8000}, &(0x7f0000000b00)=0x8) 10:15:06 executing program 4: getpgrp(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000840)=0xd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x10000261, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp6\x00') ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000040)=[0x400, 0x3], 0x2) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'ip6gretap0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0xfffffffffffffec0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3800000010000100"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x2f6}}, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x3fcf948377517202, 0x3) [ 490.346530][T17211] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 490.566338][T17211] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 491.415776][T17220] IPVS: ftp: loaded support on port[0] = 21 [ 491.594797][ T9353] device bridge_slave_1 left promiscuous mode [ 491.601463][ T9353] bridge0: port 2(bridge_slave_1) entered disabled state [ 491.646842][ T9353] device bridge_slave_0 left promiscuous mode [ 491.654754][ T9353] bridge0: port 1(bridge_slave_0) entered disabled state [ 493.812939][ T9353] device hsr_slave_0 left promiscuous mode [ 493.852433][ T9353] device hsr_slave_1 left promiscuous mode [ 493.924200][ T9353] team0 (unregistering): Port device team_slave_1 removed [ 493.938844][ T9353] team0 (unregistering): Port device team_slave_0 removed [ 493.951265][ T9353] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 493.998771][ T9353] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 494.076022][ T9353] bond0 (unregistering): Released all slaves [ 494.192045][T17220] chnl_net:caif_netlink_parms(): no params data found [ 494.234605][T17220] bridge0: port 1(bridge_slave_0) entered blocking state [ 494.241932][T17220] bridge0: port 1(bridge_slave_0) entered disabled state [ 494.250059][T17220] device bridge_slave_0 entered promiscuous mode [ 494.258370][T17220] bridge0: port 2(bridge_slave_1) entered blocking state [ 494.265617][T17220] bridge0: port 2(bridge_slave_1) entered disabled state [ 494.274070][T17220] device bridge_slave_1 entered promiscuous mode [ 494.334759][T17220] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 494.347776][T17220] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 494.376218][T17220] team0: Port device team_slave_0 added [ 494.384255][T17220] team0: Port device team_slave_1 added [ 494.435235][T17220] device hsr_slave_0 entered promiscuous mode [ 494.472659][T17220] device hsr_slave_1 entered promiscuous mode [ 494.532522][T17220] debugfs: Directory 'hsr0' with parent '/' already present! [ 494.598330][T17220] bridge0: port 2(bridge_slave_1) entered blocking state [ 494.605485][T17220] bridge0: port 2(bridge_slave_1) entered forwarding state [ 494.613088][T17220] bridge0: port 1(bridge_slave_0) entered blocking state [ 494.620412][T17220] bridge0: port 1(bridge_slave_0) entered forwarding state [ 494.711376][T17220] 8021q: adding VLAN 0 to HW filter on device bond0 [ 494.735168][T12604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 494.745108][T12604] bridge0: port 1(bridge_slave_0) entered disabled state [ 494.754677][T12604] bridge0: port 2(bridge_slave_1) entered disabled state [ 494.765416][T12604] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 494.788040][T17220] 8021q: adding VLAN 0 to HW filter on device team0 [ 494.802035][T12604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 494.811270][T12604] bridge0: port 1(bridge_slave_0) entered blocking state [ 494.818609][T12604] bridge0: port 1(bridge_slave_0) entered forwarding state [ 494.846253][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 494.856219][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 494.863414][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 494.889286][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 494.899635][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 494.921669][T12604] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 494.930646][T12604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 494.940289][T12604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 494.953745][T17220] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 494.998363][T17220] 8021q: adding VLAN 0 to HW filter on device batadv0 10:15:11 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:15:11 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000040)=@ipx, 0x2e, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x24000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xf, 0x4, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100000001}, [@ldst={0x0, 0x2, 0x7, 0x6, 0x7, 0xfffffffffffffff4, 0x4}]}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x4b, &(0x7f0000000180)=""/75, 0x41000, 0x4, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x5, 0x10, 0xd0, 0xe77}, 0x10}, 0x70) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000300)={0x9, 0xe93a, 0x1, 0x0, 0x0, [{r1, 0x0, 0x10001}]}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udplite\x00') preadv(r2, &(0x7f00000017c0), 0x33d, 0x67) 10:15:11 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@generic, &(0x7f0000000100)=0x80, 0x80000) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x0, 0x80000) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1, r2}) semctl$GETPID(0x0, 0x0, 0xb, 0x0) 10:15:11 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(0x0, 0x42003, 0xa) 10:15:11 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) io_setup(0x879, &(0x7f00000000c0)=0x0) io_getevents(r1, 0x0, 0xffffffffffffffa3, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x155) io_getevents(r1, 0xff, 0x80000000000003f, &(0x7f00000006c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000640)={0x0, 0x989680}) 10:15:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x19, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x163, 0x11, 0x8}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x15, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x2, 0x200000) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000001200)={0x6, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e20, @empty}}}, 0x108) 10:15:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x200000) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=@v2={0x0, 0x2, 0x12, 0x9, 0x8b, "0fcf9549a02ca9750768e34683c04c9522e3605710072153dc9f127f2e1fca1904f28e7b01c5825ec6a58c3aa1dd81b5792071051da383596c2da141e90f3ebe4c2f0140700a146a2fd60a6061c48f59a446a814fe636da2d3320eca8c3f7d5c03b1b404cdf97ec4b88e097b4e7c3130735e3ed3f360ab6e706fb277b927817056c65a4c01bf92ec30819a"}, 0x95, 0x2) ioctl$int_in(r1, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f00000000c0)=ANY=[@ANYRES32=r0]) dup2(r0, r1) 10:15:12 executing program 4: r0 = add_key(&(0x7f0000000080)='logon\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="78ac73bb04a91707bc70d8b4874a16ca03bc2ef218a79f3c1ad383bb10ae6489bf1c7f5cf25c60df06136ba1dc3ce1063c886ae85966fe5655ed58045c2052cfc74089be7d3a3417487e10806ad95a92c70ed3114b99413a41835a511e2f62a1703e7224d3b5e3a3", 0x68, 0xfffffffffffffffc) add_key(&(0x7f0000000000)='pkcs7_test\x00', 0x0, &(0x7f0000000040)="3081cb4c7df8434a3c71ad1e19006b5f3951466d692d0a196df1ba22cadc81db990000000000002300a43c4d2dbb858861", 0x31, r0) 10:15:12 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(0x0, 0x42003, 0xa) 10:15:12 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {0x2, 0x3}, {}], {0x4, 0x7}, [{}, {}, {}]}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c696cfa982c776f726b6469723d2e2f669d6965315c00"/51]) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x20000, 0x0) execveat(r0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000380)='overlay\x00', &(0x7f00000003c0)=',!#!\\\x00', &(0x7f0000000400)='\x00', &(0x7f0000000440)='*cgroup#selfeth1]eth1\x00', &(0x7f0000000480)='/dev/radio#\x00', &(0x7f00000004c0)='/dev/radio#\x00', &(0x7f0000000500)='cgroup2\x00', &(0x7f0000000540)='/dev/radio#\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='/dev/dlm_plock\x00'], &(0x7f0000000840)=[&(0x7f0000000700)='system.posix_acl_default\x00', &(0x7f0000000740)='overlay\x00', &(0x7f0000000780)='[\x00', &(0x7f00000007c0)='eth0cpuset\x00', &(0x7f0000000800)='overlay\x00'], 0x400) fanotify_init(0x10000014c, 0x101000) r1 = syz_open_dev$radio(&(0x7f0000000280)='/dev/radio#\x00', 0x1, 0x2) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f00000002c0)) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x4000, 0x0) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x104d57610f3961d9, &(0x7f0000000140), &(0x7f0000000200)=0x4) 10:15:12 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000180)=@req={0x28, &(0x7f0000000140)={'nr0\x00', @ifru_mtu=0x9}}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000001c0)={r0}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000200)="525daae182002af5a908934106e10fbc", 0x10) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x210081, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x32) getsockopt$inet_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 10:15:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000080)=0x12, 0x4) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80002000}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x150, r1, 0x800, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x4c, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}]}, @TIPC_NLA_LINK={0xf0, 0x4, [@TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x122d}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x46}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x150}, 0x1, 0x0, 0x0, 0x40081}, 0x801) [ 495.824992][T17255] overlayfs: unrecognized mount option "ilú˜" or missing value [ 495.878177][T17255] overlayfs: unrecognized mount option "ilú˜" or missing value 10:15:12 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(0x0, 0x42003, 0xa) 10:15:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000180)=""/64, 0x40) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000280)=""/105, &(0x7f0000000340)=0x49) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(r1, 0x0, 0x2000000000000018, &(0x7f0000000080)={@dev, @empty}, 0x3) 10:15:12 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:15:12 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x79fd, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 10:15:12 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000180)=@req={0x28, &(0x7f0000000140)={'nr0\x00', @ifru_mtu=0x9}}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000001c0)={r0}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000200)="525daae182002af5a908934106e10fbc", 0x10) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x210081, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x32) getsockopt$inet_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 10:15:12 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$VFIO_IOMMU_UNMAP_DMA(r1, 0x3b72, &(0x7f0000000000)={0x20, 0x3, 0x100000000, 0x100, 0x6}) socket$packet(0x11, 0x2, 0x300) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/packet\x00') preadv(r2, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/254, 0xfe}], 0x1, 0x48) 10:15:12 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0xa) 10:15:12 executing program 4: r0 = socket(0x10, 0x400000000080803, 0x0) write(r0, &(0x7f0000000380)="240000001a00d17ca53a7436fef7001d020b49ffed000000800028000800030001000000", 0x24) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x101000, 0x0) [ 496.321080][T17277] IPVS: length: 73 != 24 10:15:13 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000180)=@req={0x28, &(0x7f0000000140)={'nr0\x00', @ifru_mtu=0x9}}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000001c0)={r0}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000200)="525daae182002af5a908934106e10fbc", 0x10) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x210081, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x32) getsockopt$inet_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 10:15:13 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) [ 496.432059][T17277] IPVS: length: 73 != 24 10:15:13 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x58f20376003a1fe9, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086201, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000000)=0x2) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000080)={0x0, 0x4, 0x0, [], &(0x7f0000000040)={0x9f0903, 0x100000000, [], @value64=0x42c5}}) [ 496.515481][ T26] audit: type=1804 audit(1567160113.153:76): pid=17286 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/337/file0" dev="sda1" ino=16644 res=1 10:15:13 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0xa) 10:15:13 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x5, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r4 = dup2(r3, r2) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) recvfrom(r1, &(0x7f00000002c0)=""/221, 0xdd, 0x2061, &(0x7f00000000c0)=@un=@abs={0x0, 0x0, 0x4e23}, 0x80) setsockopt$inet6_MCAST_JOIN_GROUP(r4, 0x29, 0x2a, &(0x7f0000000200)={0x3, {{0xa, 0x4e20, 0x5, @loopback, 0x8001}}}, 0xfffffe7d) 10:15:13 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x5, 0x80) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x810, r0, 0x10000000) r1 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0xfffffffffffffff8, 0x4001) io_uring_register$IORING_UNREGISTER_BUFFERS(r2, 0x1, 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2284, &(0x7f0000000100)) [ 496.699282][ T26] audit: type=1804 audit(1567160113.333:77): pid=17296 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/338/file0" dev="sda1" ino=16520 res=1 10:15:13 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000180)=@req={0x28, &(0x7f0000000140)={'nr0\x00', @ifru_mtu=0x9}}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000001c0)={r0}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000200)="525daae182002af5a908934106e10fbc", 0x10) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x210081, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x32) getsockopt$inet_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 10:15:13 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0xa) 10:15:13 executing program 0: socketpair$unix(0x1, 0x100000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="1f0000000701001200217b236370757365b4c2c87b479b18752715ca3f730a"], 0x1f) write$FUSE_OPEN(r3, 0x0, 0x152) fcntl$setpipe(r2, 0x407, 0xfffffffffffffffc) close(r1) 10:15:13 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x161, 0x11, 0x64}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) read$rfkill(r0, &(0x7f0000000080), 0x8) 10:15:13 executing program 5: r0 = socket(0x1, 0x4000000000002, 0x4) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x60000, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) socket$bt_bnep(0x1f, 0x3, 0x4) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000010c0)=@req3={0x4d2d, 0x0, 0x0, 0x1f}, 0x1c) fallocate(r1, 0x20, 0xfffffffffffff0da, 0x102b) recvmsg(r0, &(0x7f0000000640)={&(0x7f0000000140)=@sco, 0x80, &(0x7f0000000500)=[{&(0x7f00000001c0)=""/33, 0x21}], 0x1}, 0x0) [ 496.964444][ T26] audit: type=1804 audit(1567160113.603:78): pid=17313 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/339/file0" dev="sda1" ino=16801 res=1 10:15:13 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000180)=@req={0x28, &(0x7f0000000140)={'nr0\x00', @ifru_mtu=0x9}}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000001c0)={r0}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000200)="525daae182002af5a908934106e10fbc", 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x210081, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x32) 10:15:13 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x0) [ 497.257779][ T26] audit: type=1804 audit(1567160113.893:79): pid=17331 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/340/file0" dev="sda1" ino=16801 res=1 [ 497.261184][T17331] ima: Unable to reopen file for reading. [ 498.850543][T17340] IPVS: ftp: loaded support on port[0] = 21 [ 499.116272][T17340] chnl_net:caif_netlink_parms(): no params data found [ 499.150382][ T9353] device bridge_slave_1 left promiscuous mode [ 499.157109][ T9353] bridge0: port 2(bridge_slave_1) entered disabled state [ 499.203489][ T9353] device bridge_slave_0 left promiscuous mode [ 499.209748][ T9353] bridge0: port 1(bridge_slave_0) entered disabled state [ 501.452855][ T9353] device hsr_slave_0 left promiscuous mode [ 501.503373][ T9353] device hsr_slave_1 left promiscuous mode [ 501.596125][ T9353] team0 (unregistering): Port device team_slave_1 removed [ 501.611761][ T9353] team0 (unregistering): Port device team_slave_0 removed [ 501.627277][ T9353] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 501.671049][ T9353] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 501.748735][ T9353] bond0 (unregistering): Released all slaves [ 501.851506][T17340] bridge0: port 1(bridge_slave_0) entered blocking state [ 501.858894][T17340] bridge0: port 1(bridge_slave_0) entered disabled state [ 501.866820][T17340] device bridge_slave_0 entered promiscuous mode [ 501.875584][T17340] bridge0: port 2(bridge_slave_1) entered blocking state [ 501.882974][T17340] bridge0: port 2(bridge_slave_1) entered disabled state [ 501.891054][T17340] device bridge_slave_1 entered promiscuous mode [ 501.918988][T17340] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 501.930144][T17340] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 501.952860][T17340] team0: Port device team_slave_0 added [ 501.960368][T17340] team0: Port device team_slave_1 added [ 502.015386][T17340] device hsr_slave_0 entered promiscuous mode [ 502.062736][T17340] device hsr_slave_1 entered promiscuous mode [ 502.102326][T17340] debugfs: Directory 'hsr0' with parent '/' already present! [ 502.205625][T17340] 8021q: adding VLAN 0 to HW filter on device bond0 [ 502.226079][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 502.238357][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 502.247146][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 502.267396][T17340] 8021q: adding VLAN 0 to HW filter on device team0 [ 502.291274][T12604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 502.317093][T12604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 502.332001][T12604] bridge0: port 1(bridge_slave_0) entered blocking state [ 502.339186][T12604] bridge0: port 1(bridge_slave_0) entered forwarding state [ 502.360361][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 502.380606][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 502.400060][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 502.424797][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 502.432203][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 502.480251][T12604] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 502.508660][T12604] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 502.553049][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 502.569541][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 502.596998][T17340] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 502.627298][T17340] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 502.641989][T12604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 502.689344][T17340] 8021q: adding VLAN 0 to HW filter on device batadv0 10:15:19 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r0, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:15:19 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000180)=@req={0x28, &(0x7f0000000140)={'nr0\x00', @ifru_mtu=0x9}}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000001c0)={r0}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000200)="525daae182002af5a908934106e10fbc", 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x210081, 0x0) 10:15:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x8000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2100}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0xb4, r2, 0x10, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xa08c}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x42}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7ff}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x401}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x3c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x5, @local, 0x2}}, {0x14, 0x2, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@assoc={0x18, 0x117, 0x4, 0xd4e5}, @op={0x18, 0x117, 0x3, 0x1}], 0x30}, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x8}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0xb89d}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) 10:15:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x25}}, &(0x7f0000000100)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 10:15:19 executing program 3 (fault-call:3 fault-nth:0): creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x0) 10:15:19 executing program 0: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000140)=@req={0xfff, 0xfffffffffffeffff}, 0x10) 10:15:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x40000, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x422002, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000300)=""/45) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x1ff) r1 = bpf$OBJ_GET_MAP(0x7, 0x0, 0xffffffffffffff61) socket$kcm(0x29, 0x2, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003000000017000000030000000a0000000000000b030000000f0000000000000c05000000060000000000000901000000060000000000000700000000006100"], &(0x7f0000000600)=""/181, 0x4b, 0xb5, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffff9c, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x1ff, 0x0, 0x0, 0x0, &(0x7f0000000480)={0x0, 0x1}, 0x0, 0x0, &(0x7f0000000540)={0x4, 0x2, 0x9, 0x2}, &(0x7f0000000580)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x8}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b40)={r2, 0xb, &(0x7f0000000ac0)={&(0x7f0000000900)=""/167, 0xa7, r3}}, 0x10) r4 = socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f00000004c0)='./file0\x00', r1}, 0x10) close(r1) read(r4, &(0x7f0000000000)=""/98, 0x62) socket$kcm(0x29, 0x5, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r5 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) [ 503.096576][T17355] FAULT_INJECTION: forcing a failure. [ 503.096576][T17355] name failslab, interval 1, probability 0, space 0, times 1 [ 503.157117][T17355] CPU: 0 PID: 17355 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190827 #74 [ 503.166304][T17355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 503.176469][T17355] Call Trace: [ 503.180039][T17355] dump_stack+0x172/0x1f0 [ 503.184412][T17355] should_fail.cold+0xa/0x15 [ 503.189032][T17355] ? fault_create_debugfs_attr+0x180/0x180 [ 503.194871][T17355] ? ___might_sleep+0x163/0x280 [ 503.199754][T17355] __should_failslab+0x121/0x190 [ 503.204814][T17355] should_failslab+0x9/0x14 [ 503.209348][T17355] kmem_cache_alloc+0x2aa/0x710 [ 503.214219][T17355] ? __kasan_check_write+0x14/0x20 [ 503.219357][T17355] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 503.224932][T17355] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 503.230248][T17355] getname_flags+0xd6/0x5b0 [ 503.234794][T17355] getname+0x1a/0x20 [ 503.238956][T17355] do_sys_open+0x2c9/0x5d0 [ 503.243409][T17355] ? filp_open+0x80/0x80 [ 503.247716][T17355] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 503.253197][T17355] ? do_syscall_64+0x26/0x760 [ 503.257902][T17355] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 503.263988][T17355] ? do_syscall_64+0x26/0x760 [ 503.268703][T17355] __x64_sys_open+0x7e/0xc0 [ 503.273491][T17355] do_syscall_64+0xfa/0x760 [ 503.273515][T17355] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 503.273535][T17355] RIP: 0033:0x459879 [ 503.288153][T17355] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 10:15:19 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000180)=@req={0x28, &(0x7f0000000140)={'nr0\x00', @ifru_mtu=0x9}}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000001c0)={r0}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000200)="525daae182002af5a908934106e10fbc", 0x10) 10:15:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x680, 0x0) r2 = getpgid(0xffffffffffffffff) write$FUSE_LK(r0, &(0x7f0000000540)={0x28, 0x10fb2373c036b172, 0x4, {{0x9, 0xffffffffffff3422, 0x3, r2}}}, 0x28) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000500)={0x1, &(0x7f00000004c0)=[{}]}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x400002, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000300)={0xffffffffffffffff}, 0x0, 0x4877dba24dd8e75b}}, 0x20) ioctl$VIDIOC_G_EXT_CTRLS(r3, 0xc0205647, &(0x7f0000000440)={0x4, 0x3, 0x2, [], &(0x7f0000000400)={0x9909ff, 0x6, [], @string=&(0x7f00000003c0)=0x7fff}}) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000000380)={0x5, 0x10, 0xfa00, {&(0x7f0000000100), r4, 0x2}}, 0x18) ioctl(r0, 0x9, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") unshare(0x400) r5 = epoll_create1(0x0) r6 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r6, 0xc0305615, &(0x7f0000000040)={0x0, {0x1, 0x4}}) epoll_wait(r5, 0x0, 0x2b1, 0x0) 10:15:19 executing program 3 (fault-call:3 fault-nth:1): creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x0) [ 503.307859][T17355] RSP: 002b:00007f2d635e7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 503.316279][T17355] RAX: ffffffffffffffda RBX: 00007f2d635e7c90 RCX: 0000000000459879 [ 503.316288][T17355] RDX: 0000000000000000 RSI: 0000000000042003 RDI: 0000000020000100 [ 503.316295][T17355] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 503.316303][T17355] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2d635e86d4 [ 503.316310][T17355] R13: 00000000004f907f R14: 00000000004dac90 R15: 0000000000000004 10:15:20 executing program 4: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x1000002, 0x400002172, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) mmap(&(0x7f00008da000/0x1000)=nil, 0x1000, 0x0, 0xb4972, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = semget(0x2, 0x2, 0x53c37e84a1ce436b) semtimedop(r1, &(0x7f0000000b40)=[{0x0, 0x6, 0x1000}, {0x1, 0x80000000, 0x1000}, {0x4, 0x7fff, 0x1000}, {0x0, 0x401, 0x1000}, {0x2, 0x675e1f38, 0x1000}], 0x5, &(0x7f0000000c00)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x3, &(0x7f0000000100)=0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vga_arbiter\x00', 0x80080, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000b00)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000000a40)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000200)=""/57, 0x39}], 0x1, &(0x7f0000000280)=""/203, 0xcb}, 0x5}, {{&(0x7f0000000380), 0x80, &(0x7f0000000b80)=[{&(0x7f0000000400)=""/155, 0x9b}, {&(0x7f00000004c0)=""/4, 0x4}], 0x2, &(0x7f0000000580)=""/197, 0xc5}, 0x64e2}, {{&(0x7f0000000680)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000700)=""/110, 0x6e}, {&(0x7f0000000780)=""/92, 0x5c}, {&(0x7f0000000800)=""/58, 0x3a}, {&(0x7f0000000840)=""/180, 0xb4}], 0x4, &(0x7f0000000940)=""/216, 0xd8}, 0x1}], 0x4000119, 0x2000, &(0x7f0000000bc0)={r3, r4+30000000}) clock_gettime(0x0, &(0x7f0000000c80)={0x0, 0x0}) semtimedop(r1, &(0x7f0000000c40)=[{0x4, 0x768f, 0x1000}], 0x1, &(0x7f0000000cc0)={r5, r6+30000000}) io_submit(r2, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000140)) [ 503.483075][T17367] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. [ 503.520916][T17369] FAULT_INJECTION: forcing a failure. [ 503.520916][T17369] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 503.534235][T17369] CPU: 1 PID: 17369 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190827 #74 [ 503.534246][T17369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 503.534252][T17369] Call Trace: [ 503.534277][T17369] dump_stack+0x172/0x1f0 [ 503.534299][T17369] should_fail.cold+0xa/0x15 [ 503.534321][T17369] ? fault_create_debugfs_attr+0x180/0x180 [ 503.534339][T17369] ? perf_trace_lock+0xeb/0x4c0 [ 503.534356][T17369] ? __kasan_check_read+0x11/0x20 [ 503.534385][T17369] should_fail_alloc_page+0x50/0x60 [ 503.571897][T17369] __alloc_pages_nodemask+0x1a1/0x900 [ 503.571917][T17369] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 503.571934][T17369] ? __alloc_pages_slowpath+0x2540/0x2540 [ 503.571952][T17369] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 503.598023][T17369] ? fault_create_debugfs_attr+0x180/0x180 [ 503.598047][T17369] cache_grow_begin+0x90/0xd20 [ 503.598075][T17369] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 503.615189][T17369] kmem_cache_alloc+0x64e/0x710 [ 503.615206][T17369] ? __kasan_check_write+0x14/0x20 [ 503.615234][T17369] getname_flags+0xd6/0x5b0 [ 503.615255][T17369] getname+0x1a/0x20 [ 503.615274][T17369] do_sys_open+0x2c9/0x5d0 [ 503.615295][T17369] ? filp_open+0x80/0x80 [ 503.615317][T17369] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 503.615333][T17369] ? do_syscall_64+0x26/0x760 [ 503.615355][T17369] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 503.626596][T17369] ? do_syscall_64+0x26/0x760 [ 503.626624][T17369] __x64_sys_open+0x7e/0xc0 [ 503.626642][T17369] do_syscall_64+0xfa/0x760 [ 503.626666][T17369] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 503.626678][T17369] RIP: 0033:0x459879 [ 503.626697][T17369] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 503.645309][T17369] RSP: 002b:00007f2d635e7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 10:15:20 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x54e24}, 0x1c) recvmmsg(r0, &(0x7f00000004c0), 0x400000000000251, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x1000000000004e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000040)=0x4, 0x4) r1 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x7564, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'vcan0\x00', 0x8000}) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000), &(0x7f00000000c0)=0x4) sendfile(r1, r1, &(0x7f0000000180)=0x54, 0x5) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) [ 503.645325][T17369] RAX: ffffffffffffffda RBX: 00007f2d635e7c90 RCX: 0000000000459879 [ 503.645335][T17369] RDX: 0000000000000000 RSI: 0000000000042003 RDI: 0000000020000100 [ 503.645344][T17369] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 503.645354][T17369] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2d635e86d4 [ 503.645361][T17369] R13: 00000000004f907f R14: 00000000004dac90 R15: 0000000000000004 [ 503.793339][T17369] ima: Unable to reopen file for reading. [ 503.799192][ T26] audit: type=1804 audit(1567160120.433:80): pid=17369 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/342/file0" dev="sda1" ino=17281 res=1 10:15:21 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r0, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:15:21 executing program 3 (fault-call:3 fault-nth:2): creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x0) 10:15:21 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000180)=@req={0x28, &(0x7f0000000140)={'nr0\x00', @ifru_mtu=0x9}}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000001c0)={r0}) [ 504.443538][T17386] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. [ 504.526725][T17389] FAULT_INJECTION: forcing a failure. [ 504.526725][T17389] name failslab, interval 1, probability 0, space 0, times 0 [ 504.584732][T17389] CPU: 1 PID: 17389 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190827 #74 [ 504.594059][T17389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 504.604130][T17389] Call Trace: [ 504.607443][T17389] dump_stack+0x172/0x1f0 [ 504.611788][T17389] should_fail.cold+0xa/0x15 [ 504.616669][T17389] ? fault_create_debugfs_attr+0x180/0x180 [ 504.622503][T17389] ? ___might_sleep+0x163/0x280 [ 504.627364][T17389] __should_failslab+0x121/0x190 [ 504.632293][T17389] should_failslab+0x9/0x14 [ 504.636785][T17389] kmem_cache_alloc+0x2aa/0x710 [ 504.641624][T17389] ? stack_trace_save+0xac/0xe0 [ 504.646549][T17389] ? stack_trace_consume_entry+0x190/0x190 [ 504.652355][T17389] __alloc_file+0x27/0x340 [ 504.656853][T17389] alloc_empty_file+0x72/0x170 [ 504.661645][T17389] path_openat+0xef/0x46d0 [ 504.666242][T17389] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 504.672214][T17389] ? kasan_slab_alloc+0xf/0x20 [ 504.676960][T17389] ? kmem_cache_alloc+0x121/0x710 [ 504.681967][T17389] ? getname_flags+0xd6/0x5b0 [ 504.686889][T17389] ? getname+0x1a/0x20 [ 504.691000][T17389] ? do_sys_open+0x2c9/0x5d0 [ 504.695581][T17389] ? __x64_sys_open+0x7e/0xc0 [ 504.700327][T17389] ? __kasan_check_read+0x11/0x20 [ 504.705369][T17389] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 504.711595][T17389] ? debug_smp_processor_id+0x3c/0x214 [ 504.717046][T17389] ? perf_trace_lock+0xeb/0x4c0 [ 504.721882][T17389] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 504.727242][T17389] ? __lockdep_free_key_range+0x120/0x120 [ 504.733122][T17389] ? __alloc_fd+0x487/0x620 [ 504.737615][T17389] do_filp_open+0x1a1/0x280 [ 504.742125][T17389] ? may_open_dev+0x100/0x100 [ 504.746791][T17389] ? lock_downgrade+0x920/0x920 [ 504.751658][T17389] ? rwlock_bug.part.0+0x90/0x90 [ 504.756679][T17389] ? __kasan_check_read+0x11/0x20 [ 504.761684][T17389] ? do_raw_spin_unlock+0x57/0x270 [ 504.766785][T17389] ? _raw_spin_unlock+0x2d/0x50 [ 504.771620][T17389] ? __alloc_fd+0x487/0x620 [ 504.776212][T17389] do_sys_open+0x3fe/0x5d0 [ 504.780628][T17389] ? filp_open+0x80/0x80 [ 504.784951][T17389] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 504.790407][T17389] ? do_syscall_64+0x26/0x760 [ 504.795075][T17389] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 504.801212][T17389] ? do_syscall_64+0x26/0x760 [ 504.806286][T17389] __x64_sys_open+0x7e/0xc0 [ 504.810779][T17389] do_syscall_64+0xfa/0x760 [ 504.815384][T17389] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 504.821874][T17389] RIP: 0033:0x459879 [ 504.825768][T17389] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 504.845877][T17389] RSP: 002b:00007f2d635e7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 504.854272][T17389] RAX: ffffffffffffffda RBX: 00007f2d635e7c90 RCX: 0000000000459879 [ 504.862244][T17389] RDX: 0000000000000000 RSI: 0000000000042003 RDI: 0000000020000100 [ 504.870197][T17389] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 504.878160][T17389] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2d635e86d4 10:15:21 executing program 0: unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x403, 0x0) semctl$SETALL(0x0, 0x100000000000000, 0x11, &(0x7f0000000100)=[0x0]) 10:15:21 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r0, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) [ 504.886232][T17389] R13: 00000000004f907f R14: 00000000004dac90 R15: 0000000000000004 10:15:21 executing program 5: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x103081, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x1c, &(0x7f0000000100)="62f00e46e8d6bffc079b01e8a920da14645c661bd11a3b08ec59184d9c300e93a26981a6e3e679dad042e66f", 0x2c) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2000, 0x0) ioctl$SG_GET_TIMEOUT(r1, 0x2202, 0x0) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) r2 = socket(0x400000000010, 0x2, 0x0) write(r2, &(0x7f00000002c0)="2400000021002551075c0165ff0ffc020200000300100f0000e1000c08000e008000a000", 0x24) 10:15:21 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000180)=@req={0x28, &(0x7f0000000140)={'nr0\x00', @ifru_mtu=0x9}}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:15:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000003780)=[{&(0x7f00000024c0)="96b1b6c7d4cb9281c60aa4d2153236cbd8264d18955c43202f345f4e082791d21064230ee969da775d7f8779dbe6b8c118fd9f2746fcf410f7fea55c465885"}, {&(0x7f0000003800)="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"}, {&(0x7f0000003500)="5ce9e78de6dda4eee9a33e2275338225f9abf7c611a24b3a52f8577ff1ebebfc7777"}, {&(0x7f0000004800)="feacc55f80e306fd76de27cc30570550f643b545af8e1da5067ef8b81b60fdbac22258f5605fc2dbc2"}, {&(0x7f0000003580)="a0ea335501c2b5d361ed2fc94522482efaa85a06f50ca3f9c7459512f2a87f0b2b4f34df3795a963319351f2cde24d55609a216d96ba18e6e11e0ac2aa5361c679294b2cd1e9c7069956648d290fea4067883e39687ae8ac0615897e152d3ae368bdb10eb8784ed591257e8578c4522498a1289f197f00315467bd20c6a077028342a6c346f70881b1a298a3bb4eaf390191bef556c282f4af754b367b3427ff50ef6875a3b8"}, {&(0x7f0000003640)="2c21b7989b969731532f1759f448e4e30750ce3f1a82e2798efc4491cf1bbc3ec4dd790d35065f838ce3c6a11ed162d0f0565147f673c54bc241"}, {&(0x7f0000003680)="4b33ecee42920493f6e19f169e670962d417af7c2bad478a27fd9737d17c59db47cd7bcca5558792f20b520f20e97baa069fe2777f40598be7992df69bc856dbbd3377f26cadef54a330097b700b8e3d1d7c"}, {&(0x7f0000003700)="74b8af5944f0ec982f4753788f3e455450a0b3ee220bb47a1137485aa9961e82f97f31b90ac1c23e76f08a7089334f6ca9fff50b945ea4d916d54afcd0a945eff9753bb08c8c7e3aefb4"}], 0x1000000000000076) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$DRM_IOCTL_CONTROL(r1, 0x40086414, &(0x7f00000000c0)={0x0, 0x9}) ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f0000000300)) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f0000000000)=0x1) 10:15:21 executing program 3 (fault-call:3 fault-nth:3): creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x0) 10:15:21 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:15:21 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x10000261, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000000)={0xa, 0x7, 0x5, 0x8}, 0xa) 10:15:21 executing program 5: setreuid(0x0, 0xee00) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000240)=0x1, 0x4) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x208000, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x1, 0x10, 0x7, 0x20}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000000c0)={r2, 0xf1, "3cd7926d22ddeb88255540bd3e065950db56c8f49a11341c93b11ecdc16ccd0ceb0b9733ba8fe2e5671c07395c5f2ccc9936f85aa5afc2834a0a00791a9114a8400a60bede6127dff9b728d81b3d58f1b0d4c1b369416e68710d3fe1c91977504cda995211bc03fbdb741860ae320ed8e8df523e2a41a2040b8379210d3f1a9711881afea14343a0dd1d1c6ef812375a5981893c0754d41a784c6eb7c08cb27419f5d5f297745266f3ef1038bf0a01df6e5c10486a6f91e796017762afae956807726144f93074bbc9f3fcbcb9fa5b6f6895eff06511600a5debecdeeb95887f1cc2e096de23ecf5fec5eb2255dff395ff"}, &(0x7f00000001c0)=0xf9) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0xfffffffffffffe55) [ 505.258385][T17410] FAULT_INJECTION: forcing a failure. [ 505.258385][T17410] name failslab, interval 1, probability 0, space 0, times 0 10:15:22 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x8, 0x4000) io_uring_register$IORING_UNREGISTER_FILES(r1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000200)=""/4096) clone(0x12ffa, 0x0, 0x0, 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00', 0xffffffffffffffff}) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) [ 505.332551][T17410] CPU: 1 PID: 17410 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190827 #74 [ 505.341714][T17410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 505.351786][T17410] Call Trace: [ 505.355102][T17410] dump_stack+0x172/0x1f0 [ 505.359450][T17410] should_fail.cold+0xa/0x15 [ 505.364307][T17410] ? fault_create_debugfs_attr+0x180/0x180 [ 505.370230][T17410] ? ___might_sleep+0x163/0x280 [ 505.375111][T17410] __should_failslab+0x121/0x190 [ 505.380085][T17410] should_failslab+0x9/0x14 [ 505.384705][T17410] kmem_cache_alloc+0x2aa/0x710 [ 505.389763][T17410] ? kmem_cache_alloc+0x364/0x710 [ 505.394975][T17410] security_file_alloc+0x39/0x170 [ 505.400037][T17410] __alloc_file+0xde/0x340 [ 505.404479][T17410] alloc_empty_file+0x72/0x170 [ 505.409268][T17410] path_openat+0xef/0x46d0 [ 505.413713][T17410] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 505.419539][T17410] ? kasan_slab_alloc+0xf/0x20 [ 505.424324][T17410] ? kmem_cache_alloc+0x121/0x710 [ 505.429383][T17410] ? getname_flags+0xd6/0x5b0 [ 505.434090][T17410] ? getname+0x1a/0x20 [ 505.438238][T17410] ? do_sys_open+0x2c9/0x5d0 [ 505.442951][T17410] ? __x64_sys_open+0x7e/0xc0 [ 505.447743][T17410] ? __kasan_check_read+0x11/0x20 [ 505.452978][T17410] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 505.459377][T17410] ? debug_smp_processor_id+0x3c/0x214 [ 505.464957][T17410] ? perf_trace_lock+0xeb/0x4c0 [ 505.469855][T17410] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 505.475253][T17410] ? __lockdep_free_key_range+0x120/0x120 [ 505.481119][T17410] ? __alloc_fd+0x487/0x620 [ 505.485744][T17410] do_filp_open+0x1a1/0x280 [ 505.490369][T17410] ? may_open_dev+0x100/0x100 [ 505.495745][T17410] ? lock_downgrade+0x920/0x920 [ 505.500616][T17410] ? rwlock_bug.part.0+0x90/0x90 [ 505.505671][T17410] ? __kasan_check_read+0x11/0x20 [ 505.510814][T17410] ? do_raw_spin_unlock+0x57/0x270 [ 505.515961][T17410] ? _raw_spin_unlock+0x2d/0x50 [ 505.520838][T17410] ? __alloc_fd+0x487/0x620 [ 505.525399][T17410] do_sys_open+0x3fe/0x5d0 [ 505.529951][T17410] ? filp_open+0x80/0x80 [ 505.534358][T17410] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 505.539937][T17410] ? do_syscall_64+0x26/0x760 [ 505.544737][T17410] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 505.550924][T17410] ? do_syscall_64+0x26/0x760 [ 505.555649][T17410] __x64_sys_open+0x7e/0xc0 [ 505.560246][T17410] do_syscall_64+0xfa/0x760 [ 505.564825][T17410] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 505.571008][T17410] RIP: 0033:0x459879 [ 505.575013][T17410] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 505.595070][T17410] RSP: 002b:00007f2d635e7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 505.603578][T17410] RAX: ffffffffffffffda RBX: 00007f2d635e7c90 RCX: 0000000000459879 [ 505.611582][T17410] RDX: 0000000000000000 RSI: 0000000000042003 RDI: 0000000020000100 [ 505.619760][T17410] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 10:15:22 executing program 0: syz_open_dev$dmmidi(&(0x7f0000000900)='/dev/dmmidi#\x00', 0x2, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x20000102000007) dup2(r0, r0) [ 505.627871][T17410] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2d635e86d4 [ 505.635967][T17410] R13: 00000000004f907f R14: 00000000004dac90 R15: 0000000000000004 10:15:22 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:15:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001200008912, &(0x7f0000000300)="11dca50d7a0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x50, 0x27}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) chdir(&(0x7f0000000040)='./file0\x00') [ 505.778122][T17422] input input23: cannot allocate more than FF_MAX_EFFECTS effects [ 507.226338][T17438] IPVS: ftp: loaded support on port[0] = 21 [ 507.483530][T17438] chnl_net:caif_netlink_parms(): no params data found [ 507.619895][T17438] bridge0: port 1(bridge_slave_0) entered blocking state [ 507.628912][T17438] bridge0: port 1(bridge_slave_0) entered disabled state [ 507.638325][T17438] device bridge_slave_0 entered promiscuous mode [ 507.747313][T17438] bridge0: port 2(bridge_slave_1) entered blocking state [ 507.754925][T17438] bridge0: port 2(bridge_slave_1) entered disabled state [ 507.763197][T17438] device bridge_slave_1 entered promiscuous mode [ 507.785991][T17438] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 507.891146][T17438] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 507.917027][T17438] team0: Port device team_slave_0 added [ 507.926454][T17438] team0: Port device team_slave_1 added [ 507.933261][ T9353] device bridge_slave_1 left promiscuous mode [ 507.939596][ T9353] bridge0: port 2(bridge_slave_1) entered disabled state [ 507.993427][ T9353] device bridge_slave_0 left promiscuous mode [ 508.000027][ T9353] bridge0: port 1(bridge_slave_0) entered disabled state [ 510.202930][ T9353] device hsr_slave_0 left promiscuous mode [ 510.242411][ T9353] device hsr_slave_1 left promiscuous mode [ 510.315201][ T9353] team0 (unregistering): Port device team_slave_1 removed [ 510.328920][ T9353] team0 (unregistering): Port device team_slave_0 removed [ 510.345487][ T9353] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 510.388494][ T9353] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 510.477584][ T9353] bond0 (unregistering): Released all slaves [ 510.634569][T17438] device hsr_slave_0 entered promiscuous mode [ 510.682547][T17438] device hsr_slave_1 entered promiscuous mode [ 510.722301][T17438] debugfs: Directory 'hsr0' with parent '/' already present! [ 510.782046][T17438] 8021q: adding VLAN 0 to HW filter on device bond0 [ 510.840510][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 510.849618][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 510.860824][T17438] 8021q: adding VLAN 0 to HW filter on device team0 [ 510.874536][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 510.884752][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 510.894851][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 510.901927][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 510.922616][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 510.932455][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 510.941226][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 510.950534][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 510.957764][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 510.967396][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 510.977150][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 510.986660][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 510.996685][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 511.016851][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 511.025448][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 511.035168][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 511.051396][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 511.060806][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 511.081937][T17438] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 511.101593][T17438] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 511.112824][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 511.148298][T17438] 8021q: adding VLAN 0 to HW filter on device batadv0 10:15:28 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r0, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:15:28 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:15:28 executing program 0: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000000)={0xb5}, 0x8) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x100, 0x43d48177a6b41f7c, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/netstat\x00') ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f00000000c0)={[0x9, 0x800000000, 0x1, 0x7, 0x47, 0x3, 0x7, 0x4e2, 0x80, 0x3, 0x7e, 0x800, 0x4, 0x7f, 0x1, 0xde], 0x10f000, 0x1000}) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000080)=@generic={0x2, 0x1000}) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000180)={0x55, 0x3, 0x2, {0x7f, 0x7}, {0xfff, 0x1d44}, @const={0x2, {0x100000000, 0x8, 0x94}}}) 10:15:28 executing program 4: r0 = socket$inet6(0xa, 0x8000000000001, 0x1) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x0, 0x30}, 0xc) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x4}, 0x8) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup2(r1, r1) shutdown(r1, 0x0) recvmmsg(r2, &(0x7f0000000000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x40000000000028a, 0x0, 0x0) request_key(&(0x7f0000000140)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='#! ', 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRES32], 0x1037b) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="a5098a58c213924fb6771b8fdea0ac3f8d155f99741c3a3d167df0e38c17"], 0x1a000) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file0'}, 0xb) 10:15:28 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0x80000) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f00000000c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000240)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"eb9bd7af4672634a98ff4ffc363368aa"}}}}, 0x90) 10:15:28 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x0) 10:15:28 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:15:28 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r0, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) [ 511.696217][ T26] audit: type=1804 audit(1567160128.333:81): pid=17452 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/345/file0" dev="sda1" ino=17510 res=1 10:15:28 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001880)='/dev/full\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x40, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, 0x0, &(0x7f0000001a00)) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000500)) fchdir(r1) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="1cfdffffff8a0ab7960f0100010000000000fdff993802aa0063b8f24252b1d85cbf0000faffff37f70f653f0ffb09f0d5362b74797f0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fa3d96033ccfdff0641d2eb4cb7860c19cadf38c7f1c7f8e6264e690f8fbcd5704b990c040588ae2a2ebc0bba59294ff48ed9"], 0x85) clock_gettime(0x0, &(0x7f0000001940)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) open(&(0x7f0000000080)='./file0\x00', 0xc4000141041, 0x0) clock_getres(0x1, &(0x7f00000000c0)) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video36\x00', 0x2, 0x0) r3 = getpgid(0xffffffffffffffff) fcntl$setown(r1, 0x8, r3) [ 511.739706][T17452] ima: Unable to reopen file for reading. 10:15:28 executing program 4: r0 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x20000000ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='cpu&5\n\n\n\x00\x06\x00\x05\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4\x1a\xc5]Y;\t\x06\xbe*\xaa&\xbd\x16xQ\x86\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\x90@\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xbe\x1f\xe5\x86\xb1x\x00\x00\x00\x00\x00\x00\x00\x00\x93\xab\x05') 10:15:28 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:15:28 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42002, 0x0) [ 512.791399][ T26] audit: type=1804 audit(1567160129.423:82): pid=17486 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir285723006/syzkaller.HdA5uO/331/file0/file0" dev="sda1" ino=16644 res=1 10:15:29 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r0, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:15:29 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:15:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000100), 0x4) open(&(0x7f0000000000)='./file0\x00', 0x4c0, 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @local}], 0x3c0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000240)={0x0, 0x1f0}, &(0x7f0000000040)=0xfd48) 10:15:29 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="85000000b5ce52ef9c0000000000f2ff9400000000000000417f7fd8e45a0b7363282595b818023122c360fc7b8d067338addd9f7ad24fc26d3da3d5bdaf9535a6bb67f7515197b23e9550456918103c1f9d42"], &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x3c) r1 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x0, 0x2) write$P9_RLCREATE(r1, &(0x7f0000000140)={0x18, 0xf, 0x1, {{0x10, 0x3, 0x6}, 0x2}}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0x50}, 0x10) 10:15:29 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42006, 0x0) 10:15:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x0, 0x13, r0, 0xff2f0000) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000040)) 10:15:29 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)='{\x00', 0xffffffffffffffff}, 0x30) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x8000, 0x0) fsetxattr$security_evm(r1, &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=@ng={0x4, 0x9, "2ab3cc2a98d34f2afb60fb0614b381e21844"}, 0x14, 0x1) ioctl$SIOCRSACCEPT(r1, 0x89e3) migrate_pages(r0, 0x0, 0x0, 0x0) 10:15:29 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10000, 0x0) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000040)) fcntl$getflags(0xffffffffffffffff, 0x0) setpgid(0x0, 0x0) 10:15:29 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:15:29 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r0, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:15:29 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42007, 0x0) 10:15:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000000c0)={r1, 0x0, 0xffffffffffffffff, 0x3ff, 0x7fff}) fchdir(r3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x88) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}]}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r3, 0x4020565b, &(0x7f00000002c0)={0x8001005, 0x80, 0x2}) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20220010}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c00400006d3080d206959b735c7a7ae89fba7448251ec929e4e788c49f2031169024992f39b700c5cda04c7453332e8653e559f727683de8f34a7f24c08905268cbf9c82e9def2d42abce6d3730fc969368a1fe7f54ada9b3b18cbd587e5af1bdbeebf2d0e5b54fe78d139fa721f92aebd90511c4353ef40ae566e7c817d2645a5fccab0891d6836df96acd0a87e1c86340e1b8a35308752910c10c1c5125eb9fcbb55e62f6184d8d85240b6213724bb77abab4b65976ce6dc1a0d26398120365f92a5c15b0e26384c92c441f123d238910826cb8", @ANYRES16=r4, @ANYBLOB="08002dbd7000fedbdf25040000000400020004000300"], 0x1c}, 0x1, 0x0, 0x0, 0xc0}, 0x8000) 10:15:30 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) accept4$inet(r0, &(0x7f0000000080)={0x2, 0x0, @empty}, &(0x7f00000000c0)=0x10, 0x800) r1 = creat(&(0x7f0000000100)='./file0\x00', 0xdeb49dc4e5b9f599) write$P9_RLERROR(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="09b2b0619f1b4d21ca"], 0x9) keyctl$join(0x1, 0x0) 10:15:30 executing program 5: syz_read_part_table(0x4, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000100)="a80eac13e4b17b89ae727f7ce45b42108098026e9754c01b1cbf08557807e77f15e1a812ad3f686c4737a3bc35e13456", 0x30, 0x9}, {&(0x7f0000000200)="e3921bc8ec0a378d0fce65e01946051c6db3fde1172104b3c0a6b7308d7e9acd041b601c9ee9831f5795ad0cc36de904fa9b1e72af74800785156004fb6f230ccddbd6e28e254fa758cadcf62b52de4230edeb8ad898c88df7706360e686cd5c4f8535a9b9ec9bc24114fb3be79bab1f5d7bf47da8eb33ffd4aa89d73cc0bd9e435ef832e3d5af", 0x87, 0x1800000000000000}, {&(0x7f00000002c0)="0ec25b38cd650cb405472732e783e4cff900fc9e90c237e729cdfb78653cda5e0612f1f62b3142b6e4", 0x29, 0x6}, {&(0x7f0000000a40)="a5fba32582d4c074fe1048fe2f620e49529c279ccb218a9f5cb8ce64ecd122b8d4da89c847717f6c762c1449203b58c08d2808cba0893296ca647dfeb04c0a9f9438e06d9c16db90f6d96fdd79551d539c8cd32529aae998b5efc71c09f16242745e64d1a3ca8a46222818c4706f47b34554683bb5f0fb402252712224231c1b13d284fec4ed9ec1a98a21e47d1c7d622665ec5ffc8dc693ebf9a7f913994af1798a466d1414", 0xa6, 0xc1}, {&(0x7f00000010c0)="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", 0x1000, 0x5}]) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x10000000000000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x3, 0x0, 0x0, 0x1, 0x6, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f00000000c0)={0x2, 0x1000, 0x81, 0xffff, 0x2, 0x3}) clock_gettime(0x0, &(0x7f0000000580)) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000b00)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000940)=0x106) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000980)={r2, 0x36, "11d8d7a6ef8a782e24db5672ea260c3571d2af3e6b0312a86e0e2f02ff12f75556180124693c9193afc078e8a9b7cb1734789a8ed0d0"}, &(0x7f00000009c0)=0x3e) futex(&(0x7f0000000540)=0x2, 0x3, 0x0, &(0x7f0000000440), &(0x7f0000000480)=0x2, 0x1) socket$isdn_base(0x22, 0x3, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000d80)=ANY=[@ANYBLOB="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"], 0x108, 0x2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0xfff7) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in6=@loopback}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) setpgid(0x0, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000a00)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000300)=@assoc_value={r2, 0x6}, &(0x7f00000005c0)=0x8) symlinkat(&(0x7f0000000600)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000780)='./file0\x00') r4 = fcntl$dupfd(r0, 0x0, r0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r4, &(0x7f0000000400)={&(0x7f0000000140), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, 0x0, 0x121, 0x70bd2b, 0x25dfdbff, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x48851) 10:15:30 executing program 2: socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) [ 513.551240][ T26] audit: type=1804 audit(1567160130.183:83): pid=17512 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/348/file0" dev="sda1" ino=16529 res=1 [ 513.580126][T17512] ima: Unable to reopen file for reading. 10:15:30 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42009, 0x0) 10:15:30 executing program 2: socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:15:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) getsockname$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000000000)=[{0x1d, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 10:15:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$9p(r1, &(0x7f0000000200)="fe331606405303608caa4de51f0e40c6fb2a3b7651b3f5af0bb2549e124fc8fbf555ae6ff06c350780fdbfdd3325235bb56d030edc4790c93344532067446d65b272cee4969520aab87380f67b6354e33ec3cfd2248bc3ac61d5fbd93546785eafb828a753db2b5fdb40a82c5765044049ee8f0aac5767015bb669bd445a240e96c65af4f771ef74f303b3", 0x8b) remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x4, 0x100123) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_key={0x2, 0x9, 0x8, 0x0, "e5"}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 10:15:30 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42010, 0x0) 10:15:30 executing program 2: socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) [ 514.146405][ T26] audit: type=1804 audit(1567160130.783:84): pid=17542 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/350/file0" dev="sda1" ino=16520 res=1 [ 515.725665][T17567] IPVS: ftp: loaded support on port[0] = 21 [ 516.217478][T17567] chnl_net:caif_netlink_parms(): no params data found [ 516.458787][T17570] IPVS: ftp: loaded support on port[0] = 21 [ 516.465799][T17567] bridge0: port 1(bridge_slave_0) entered blocking state [ 516.474815][T17567] bridge0: port 1(bridge_slave_0) entered disabled state [ 516.483139][T17567] device bridge_slave_0 entered promiscuous mode [ 516.689575][T17567] bridge0: port 2(bridge_slave_1) entered blocking state [ 516.698797][T17567] bridge0: port 2(bridge_slave_1) entered disabled state [ 516.707083][T17567] device bridge_slave_1 entered promiscuous mode [ 516.933487][T17567] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 516.945947][T17567] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 517.165133][T17567] team0: Port device team_slave_0 added [ 517.181667][T17567] team0: Port device team_slave_1 added [ 517.255335][T17567] device hsr_slave_0 entered promiscuous mode [ 517.292558][T17567] device hsr_slave_1 entered promiscuous mode [ 517.342255][T17567] debugfs: Directory 'hsr0' with parent '/' already present! [ 517.556869][T17570] chnl_net:caif_netlink_parms(): no params data found [ 517.620798][T17570] bridge0: port 1(bridge_slave_0) entered blocking state [ 517.635838][T17570] bridge0: port 1(bridge_slave_0) entered disabled state [ 517.644962][T17570] device bridge_slave_0 entered promiscuous mode [ 517.699020][T17570] bridge0: port 2(bridge_slave_1) entered blocking state [ 517.706567][T17570] bridge0: port 2(bridge_slave_1) entered disabled state [ 517.714945][T17570] device bridge_slave_1 entered promiscuous mode [ 517.750269][T17570] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 517.777752][T17570] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 517.863179][T17570] team0: Port device team_slave_0 added [ 517.870482][T17570] team0: Port device team_slave_1 added [ 517.880436][T17567] 8021q: adding VLAN 0 to HW filter on device bond0 [ 518.005220][T17570] device hsr_slave_0 entered promiscuous mode [ 518.052755][T17570] device hsr_slave_1 entered promiscuous mode [ 518.092320][T17570] debugfs: Directory 'hsr0' with parent '/' already present! [ 518.109794][T17567] 8021q: adding VLAN 0 to HW filter on device team0 [ 518.170438][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 518.178690][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 518.193237][ T9353] batman_adv: batadv0: Interface deactivated: veth0_to_hsr [ 518.200726][ T9353] batman_adv: batadv0: Removing interface: veth0_to_hsr [ 518.210856][ T9353] device bridge_slave_1 left promiscuous mode [ 518.217955][ T9353] bridge0: port 2(bridge_slave_1) entered disabled state [ 518.273295][ T9353] device bridge_slave_0 left promiscuous mode [ 518.279913][ T9353] bridge0: port 1(bridge_slave_0) entered disabled state [ 518.334025][ T9353] device bridge_slave_1 left promiscuous mode [ 518.340218][ T9353] bridge0: port 2(bridge_slave_1) entered disabled state [ 518.393675][ T9353] device bridge_slave_0 left promiscuous mode [ 518.399933][ T9353] bridge0: port 1(bridge_slave_0) entered disabled state [ 522.833225][ T9353] device hsr_slave_0 left promiscuous mode [ 522.872539][ T9353] device hsr_slave_1 left promiscuous mode [ 522.910289][ T9353] team0 (unregistering): Port device team_slave_1 removed [ 522.925138][ T9353] team0 (unregistering): Port device team_slave_0 removed [ 522.940300][ T9353] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 522.977338][ T9353] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 523.091103][ T9353] bond0 (unregistering): Released all slaves [ 523.223504][ T9353] device hsr_slave_0 left promiscuous mode [ 523.262435][ T9353] device hsr_slave_1 left promiscuous mode [ 523.321581][ T9353] team0 (unregistering): Port device team_slave_1 removed [ 523.335628][ T9353] team0 (unregistering): Port device team_slave_0 removed [ 523.351084][ T9353] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 523.409987][ T9353] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 523.505332][ T9353] bond0 (unregistering): Released all slaves [ 523.615370][ T8901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 523.624826][ T8901] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 523.634429][ T8901] bridge0: port 1(bridge_slave_0) entered blocking state [ 523.641681][ T8901] bridge0: port 1(bridge_slave_0) entered forwarding state [ 523.650866][ T8901] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 523.660518][ T8901] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 523.669642][ T8901] bridge0: port 2(bridge_slave_1) entered blocking state [ 523.677202][ T8901] bridge0: port 2(bridge_slave_1) entered forwarding state [ 523.685360][ T8901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 523.695030][ T8901] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 523.720704][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 523.730803][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 523.739982][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 523.748909][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 523.779552][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 523.789123][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 523.798127][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 523.812046][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 523.828137][T17567] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 523.840674][T17567] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 523.852459][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 523.860867][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 523.911867][T17567] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 523.934618][T17570] 8021q: adding VLAN 0 to HW filter on device bond0 [ 523.967379][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 523.981566][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 524.007237][T17570] 8021q: adding VLAN 0 to HW filter on device team0 [ 524.119527][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 524.143807][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 524.153280][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 524.160369][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state 10:15:40 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:15:40 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fstat(0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000134000)={0x2, 0x0, @broadcast}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000c00)={0x0, 0x0, 0x0}, &(0x7f0000000000)=0x2d0) fsetxattr$system_posix_acl(r0, 0x0, &(0x7f0000000580)=ANY=[@ANYPTR=&(0x7f0000000040)=ANY=[], @ANYRES64=r1, @ANYBLOB='\b\x00', @ANYBLOB, @ANYRES64=r2], 0x5, 0x1) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f00000003c0)={'broute\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0}, &(0x7f00000002c0)=0x50) sendto$inet(r1, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r3 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r4 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) add_key(&(0x7f0000000300)='.dead\x00', &(0x7f0000000440)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendfile(r1, r3, 0x0, 0x102000002) [ 524.175625][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 524.185052][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 524.197263][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 524.204433][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 524.281549][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 524.314402][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 524.884374][ T8901] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 524.894475][ T8901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 524.905365][ T8901] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 524.915932][ T8901] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 524.926914][ T8901] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 524.958413][ T8901] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 524.979516][ T8901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 525.006154][ T8901] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 525.030771][ T8901] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 525.056633][ T8901] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 525.081956][T17570] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 525.180330][T17570] 8021q: adding VLAN 0 to HW filter on device batadv0 10:15:43 executing program 0: 10:15:43 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x4203b, 0x0) 10:15:43 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 10:15:43 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:15:43 executing program 5: 10:15:43 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x0, 0x2) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f0000000240)=""/87) r1 = dup(r0) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000000)) r2 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) socket$pptp(0x18, 0x1, 0x2) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x2eb, 0x0}, &(0x7f00000003c0)=0x10) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000400)={r3, @in={{0x2, 0x4e23, @broadcast}}, 0x6, 0x4, 0x0, 0x1, 0xc}, 0x98) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b8000000190000e7000000005b000000ff010000000000b290cf7d0000000001e000000100000000800000000000000000000000000000000a0001000000002eaf4022c7bd909fbe12e83241f916933087", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0xb8}}, 0x0) sendmmsg(r2, &(0x7f0000004dc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f00000002c0)=ANY=[@ANYBLOB="0200000003000000ffff068000000000540000000000000000100000000000000800000000000000d2950759210062a0d3aaab6ea41a2fd36efc49b58e1b8d85a21fd5724ed0f4546128fc795a97005df5d45dd53db37a0ee78db207252e24a38cfb91f4590d84b3f4a6c2aaf1e482166c3c87892c79d723dc2cef072922ad537ff6da6be665d00076795a81ddbe5b9868a0b6738e8c9d70a8a5"]) 10:15:43 executing program 5: [ 526.629620][ T26] audit: type=1804 audit(1567160143.263:85): pid=17599 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/351/file0" dev="sda1" ino=16785 res=1 [ 526.655994][T17599] ima: Unable to reopen file for reading. 10:15:43 executing program 0: 10:15:43 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, 0x0, 0x0) [ 526.735588][T17607] ima: Unable to reopen file for reading. 10:15:43 executing program 4: 10:15:43 executing program 5: 10:15:43 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42063, 0x0) 10:15:43 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 10:15:43 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0xab1470a1448afcd6, 0x0, 0x0, 0x3) mlock(&(0x7f0000ffa000/0x4000)=nil, 0xa0ff20) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) 10:15:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1, &(0x7f0000000040)="11dca50d5e02000000f070") io_uring_setup(0x930, &(0x7f00000006c0)={0x0, 0x0, 0x293ce6dc2ee639e, 0x3, 0x252}) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) r1 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000000)=0x3e) recvfrom$unix(r3, 0x0, 0xfffffffffffffe45, 0x0, 0x0, 0x0) readahead(r4, 0x9, 0x4) fcntl$setown(r2, 0x8, r1) fcntl$setsig(r2, 0xa, 0x12) r6 = dup2(r2, r3) fstat(r5, &(0x7f0000000640)) tkill(r1, 0x400000000000016) creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$bt_BT_FLUSHABLE(r5, 0x112, 0x8, &(0x7f00000007c0)=0x1f, 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r5, 0x84, 0x0, &(0x7f0000000800)={0x0, 0x401, 0x1}, &(0x7f0000000840)=0x10) setsockopt$inet_sctp_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000880)={r7, 0x6, 0x6, 0x682337a8}, 0x10) io_uring_register$IORING_REGISTER_BUFFERS(r6, 0x0, &(0x7f00000005c0)=[{&(0x7f00000001c0)=""/212, 0xd4}, {&(0x7f00000002c0)=""/166, 0xa6}, {&(0x7f00000000c0)=""/56, 0x38}, {&(0x7f0000000380)=""/66, 0x42}, {&(0x7f0000000400)=""/183, 0xb7}, {&(0x7f00000004c0)=""/98, 0x62}, {&(0x7f0000000540)=""/72, 0x48}, {&(0x7f0000000100)=""/47, 0x2f}], 0x8) capset(&(0x7f0000000740)={0x200f1526, r1}, &(0x7f0000000780)={0xfffffffffffffff7, 0x1ff, 0x7fff, 0xfff, 0x480c, 0x2}) [ 527.090637][ T26] audit: type=1804 audit(1567160143.723:86): pid=17619 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/352/file0" dev="sda1" ino=16561 res=1 [ 527.090691][T17619] ima: Unable to reopen file for reading. [ 528.993479][ T9353] device bridge_slave_1 left promiscuous mode [ 528.999745][ T9353] bridge0: port 2(bridge_slave_1) entered disabled state [ 529.063440][ T9353] device bridge_slave_0 left promiscuous mode [ 529.069832][ T9353] bridge0: port 1(bridge_slave_0) entered disabled state [ 531.173702][ T9353] device hsr_slave_0 left promiscuous mode [ 531.212454][ T9353] device hsr_slave_1 left promiscuous mode [ 531.284213][ T9353] team0 (unregistering): Port device team_slave_1 removed [ 531.299729][ T9353] team0 (unregistering): Port device team_slave_0 removed [ 531.317175][ T9353] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 531.368567][ T9353] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 531.448628][ T9353] bond0 (unregistering): Released all slaves [ 531.565175][T17641] IPVS: ftp: loaded support on port[0] = 21 [ 531.660393][T17641] chnl_net:caif_netlink_parms(): no params data found [ 531.699470][T17641] bridge0: port 1(bridge_slave_0) entered blocking state [ 531.707341][T17641] bridge0: port 1(bridge_slave_0) entered disabled state [ 531.715606][T17641] device bridge_slave_0 entered promiscuous mode [ 531.762551][T17641] bridge0: port 2(bridge_slave_1) entered blocking state [ 531.769642][T17641] bridge0: port 2(bridge_slave_1) entered disabled state [ 531.785108][T17641] device bridge_slave_1 entered promiscuous mode [ 531.826095][T17641] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 531.837760][T17641] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 531.861994][T17641] team0: Port device team_slave_0 added [ 531.870036][T17641] team0: Port device team_slave_1 added [ 531.975384][T17641] device hsr_slave_0 entered promiscuous mode [ 532.012543][T17641] device hsr_slave_1 entered promiscuous mode [ 532.074038][T17641] bridge0: port 2(bridge_slave_1) entered blocking state [ 532.081119][T17641] bridge0: port 2(bridge_slave_1) entered forwarding state [ 532.088541][T17641] bridge0: port 1(bridge_slave_0) entered blocking state [ 532.095682][T17641] bridge0: port 1(bridge_slave_0) entered forwarding state [ 532.146316][T17641] 8021q: adding VLAN 0 to HW filter on device bond0 [ 532.161648][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 532.171340][ T8892] bridge0: port 1(bridge_slave_0) entered disabled state [ 532.188230][ T8892] bridge0: port 2(bridge_slave_1) entered disabled state [ 532.208322][T17641] 8021q: adding VLAN 0 to HW filter on device team0 [ 532.234048][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 532.253081][ T8892] bridge0: port 1(bridge_slave_0) entered blocking state [ 532.260248][ T8892] bridge0: port 1(bridge_slave_0) entered forwarding state [ 532.299342][ T8901] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 532.315709][ T8901] bridge0: port 2(bridge_slave_1) entered blocking state [ 532.322878][ T8901] bridge0: port 2(bridge_slave_1) entered forwarding state [ 532.375252][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 532.393645][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 532.413768][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 532.434742][T17641] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 532.455815][T17641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 532.472724][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 532.480946][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 532.557507][T17641] 8021q: adding VLAN 0 to HW filter on device batadv0 10:15:49 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:15:49 executing program 5: setreuid(0x0, 0xee00) geteuid() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000002c0)="11dca50d5e0bcfe47bf070") r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) r2 = geteuid() setreuid(r2, 0x0) ioprio_get$uid(0x3, r2) 10:15:49 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x2) 10:15:49 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 10:15:49 executing program 0: r0 = openat$usbmon(0xffffffffffffff9c, &(0x7f0000000000)='/dev/usbmon0\x00', 0x40000, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x5d, 0x4, 0x9, "4d90f8b9a100f7af4712456a607ba12b", "c50946d08c7bf88fe94edd53738c57f933a3ac99364e6c464c6cafb3bc42ab77140ea485321151a5d3a8be127063036e6214c36641c5a0f3448e8ab4b82da844a1985d1314491243"}, 0x5d, 0x3) r1 = socket$kcm(0x10, 0x400000000000002, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x4000000, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0000001c008102e00f80ecdb4cb9f207c804a00d000000880003fb0a0002000a0ada1b40d805000300c50083b8", 0x2e}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 10:15:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50dde0bcfe47bf070") setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x7, 0x4) add_key$user(0x0, &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) r3 = perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) fcntl$dupfd(r2, 0x406, r3) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(0xffffffffffffffff, 0x4010ae94, &(0x7f0000000240)={0x0, 0x6, 0xfff}) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000300)="2c253935fe96de8af0d9f555676e105d2435cef6f6cade", 0x17) ioctl$IMDELTIMER(0xffffffffffffffff, 0x80044941, &(0x7f00000002c0)) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000200)=[{0x10200000006}]}) r4 = fcntl$dupfd(r0, 0x0, r0) ppoll(&(0x7f00000001c0)=[{r4}], 0xa1, 0x0, 0x0, 0xfffffffffffffffc) [ 532.866686][T17655] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.0'. [ 532.904440][ T26] audit: type=1804 audit(1567160149.543:87): pid=17657 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/353/file0" dev="sda1" ino=17105 res=1 [ 532.904740][T17655] bridge: RTM_NEWNEIGH bridge0 with NTF_USE is not supported [ 532.934894][T17657] ima: Unable to reopen file for reading. 10:15:49 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) [ 533.018101][ T26] audit: type=1326 audit(1567160149.633:88): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17650 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c6ba code=0x0 10:15:49 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x3) 10:15:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008914, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x2, 0x400) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_buf(r2, 0x1, 0x2f, &(0x7f0000b56f40)=""/192, &(0x7f0000000040)=0xc0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fchown(r0, r3, r4) [ 533.346663][ T26] audit: type=1804 audit(1567160149.983:89): pid=17669 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/354/file0" dev="sda1" ino=16993 res=1 [ 533.346681][T17669] ima: Unable to reopen file for reading. 10:15:50 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 10:15:50 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x4) 10:15:50 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)}, 0x0) [ 533.751873][ T26] audit: type=1326 audit(1567160150.383:90): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17650 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c6ba code=0x0 10:15:50 executing program 1: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:15:50 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)}, 0x0) 10:15:50 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x2000000000001ffc) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x1001000004e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = accept(r0, 0x0, 0x0) write(r1, &(0x7f0000000100), 0x1ede5) shutdown(r1, 0x2) sendto$packet(r2, &(0x7f0000000040)='u', 0x1, 0x0, 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x80200, 0x0) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) recvmsg$kcm(r2, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 10:15:50 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) close(r0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self\x00', 0x0, 0x0) pidfd_send_signal(r0, 0x20000003, 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0xbfd2ff18f7b6ec1e, 0x70bd2a, 0x25dfdbfd, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x80) 10:15:50 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x800081, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000100)=0x3) [ 533.935106][ T26] audit: type=1804 audit(1567160150.573:91): pid=17688 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/355/file0" dev="sda1" ino=16689 res=1 [ 533.992363][T17688] ima: Unable to reopen file for reading. 10:15:50 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)}, 0x0) 10:15:50 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x5) 10:15:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="390000000209090368fe07002b00000000430a0014673a2ac590b42e000200450001070300001419001a00120002000e0001e1bae9ea35540dee09009d000500", 0x40}], 0x1) 10:15:50 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$rfkill(r0, 0x0, 0x0) r1 = socket$bt_rfcomm(0x1f, 0x1249223d076d581a, 0x3) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000000)=0x1f, &(0x7f0000000100)=0x2) 10:15:50 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f00000000c0)=0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x100000890f, &(0x7f0000000000)="11dca50d5e0bdce4e12ca0314334aa4f8c16fc4e01800000") r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x0, &(0x7f0000bfcffc), &(0x7f0000000040)=0x2) 10:15:50 executing program 1: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:15:51 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{0x0}], 0x1}, 0x0) [ 534.349163][T17710] ima: Unable to reopen file for reading. [ 534.355244][ T26] audit: type=1804 audit(1567160150.983:92): pid=17710 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/356/file0" dev="sda1" ino=16491 res=1 10:15:51 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) ioctl$RTC_PIE_OFF(r0, 0x7006) unlink(&(0x7f00000000c0)='./file0\x00') ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f0000000140)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0xfffffffffffffffa, 0xa80) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000080)={0x0, @aes128, 0x4, "9ab2084595cb2be7"}) 10:15:51 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x6) 10:15:51 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = gettid() kcmp(r4, 0x0, 0x0, 0xffffffffffffffff, r1) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0xf}}}, 0x1000, 0x8001}, 0x0) fstat(r3, &(0x7f0000004800)) getresgid(&(0x7f0000004880), &(0x7f00000048c0)=0x0, &(0x7f0000004900)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004940), 0x0) getuid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000005300)={{{@in6=@local, @in6=@local}}, {{@in=@local}}}, &(0x7f0000005400)=0xe8) stat(&(0x7f0000005440)='./file0\x00', 0x0) lstat(&(0x7f0000005640)='./file0\x00', 0x0) getresgid(&(0x7f0000005840), &(0x7f0000005880), 0x0) stat(0x0, &(0x7f0000005940)) lstat(0x0, &(0x7f0000005cc0)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000005d40), &(0x7f0000005d80)=0xc) getgid() getgroups(0x3ff97f33d6d5dad, &(0x7f0000000080)=[r5]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005e00)={{{@in6=@mcast2, @in6=@local}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000005f00)=0xe8) getgid() stat(&(0x7f0000005f40)='./file0\x00', &(0x7f0000005f80)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000006000), &(0x7f0000004b00)=0xc) open(&(0x7f0000006080)='./file0\x00', 0x101000, 0x0) sendfile(r1, r1, 0x0, 0x2000005) 10:15:51 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{0x0}], 0x1}, 0x0) 10:15:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000300)="f2f7074b6723657dd74a7f6e41d3abdb09ceb2bb6eeaa014d4", 0x19) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KDMKTONE(r2, 0x4b30, 0x6) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000340)="e36d47fa301d27d02fbb9e8e44c3cee9d062c17f55a781099d1b67b6429746317d73beb5fcd3b30c20c5cd9a7bc593df784750a0ca0c0b9585328017e50f493164dac84c24ea04e2f2dff8a2e11c1af4f76fd8ec467bac717ef13b93e3df4aaf4328cf1fd67f3fbdb0f7cbcdfb2f5cdeb2e77042ce7ce7283aa731a84071fb1f62bfb293c6f0895e81503f103a9759d50675b66cadd706f766253b49b3e57f7d10c63c9fd0477960ebc362c4018acb5d31799c43ae5722551f948e990b62a6102dde22f8f7cd9bd0f6e1a8c90ee63b2634ce671b1ad0ff6667a441db3e0c005c", 0xe0) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="11dca50d5e0bcfe47bf070") r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x81, 0x0) write$P9_RLOCK(r3, &(0x7f0000000080)={0x8, 0x35, 0x1, 0x3}, 0x8) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xffffffffffffffa0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3c0000001000010600"/20, @ANYRES32=0x0, @ANYBLOB="007d3adc5b9db95b89676fd800626f6e64000000000c00020008001200000000006fcf95037df42733cff949bc3f3346bbd872121f5d4ee23a9607ae244a8bfc4309445fed52961813f6a0917599a40acab7e9a0804d436f3113e7e774469bbaf3c7b5d9b091c7968426ea8dcd5ca2c7dd37ae39ae6b23b77fa7ceac2500"/142], 0x3c}}, 0x0) [ 534.803434][ T26] audit: type=1804 audit(1567160151.443:93): pid=17736 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/357/file0" dev="sda1" ino=17153 res=1 [ 534.836092][T17733] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 10:15:51 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x80002, 0x0) ioctl$sock_ifreq(r0, 0x8938, &(0x7f0000000000)={'veth1_to_bond\x00', @ifru_ivalue=0x7}) write$rfkill(r0, &(0x7f0000000080)={0xfffffffffffffffd}, 0x8) [ 534.848214][T17736] ima: Unable to reopen file for reading. 10:15:51 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{0x0}], 0x1}, 0x0) 10:15:51 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x7) 10:15:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x1) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)=ANY=[@ANYBLOB="3c00000010000b0c00"/20, @ANYRES32=0x0, @ANYRESDEC=r0], 0x3}}, 0x10) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000040)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000140)=0xe8) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={r1, r2, r3}, 0xc) [ 535.205979][T17750] ima: Unable to reopen file for reading. [ 535.206015][ T26] audit: type=1804 audit(1567160151.843:94): pid=17750 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/358/file0" dev="sda1" ino=16881 res=1 10:15:51 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)}], 0x1}, 0x0) [ 536.807792][T17771] IPVS: ftp: loaded support on port[0] = 21 [ 537.091145][T17771] chnl_net:caif_netlink_parms(): no params data found [ 537.230370][T17771] bridge0: port 1(bridge_slave_0) entered blocking state [ 537.237673][T17771] bridge0: port 1(bridge_slave_0) entered disabled state [ 537.245881][T17771] device bridge_slave_0 entered promiscuous mode [ 537.254721][T17771] bridge0: port 2(bridge_slave_1) entered blocking state [ 537.261838][T17771] bridge0: port 2(bridge_slave_1) entered disabled state [ 537.270582][T17771] device bridge_slave_1 entered promiscuous mode [ 537.279023][ T9353] device bridge_slave_1 left promiscuous mode [ 537.285712][ T9353] bridge0: port 2(bridge_slave_1) entered disabled state [ 537.345488][ T9353] device bridge_slave_0 left promiscuous mode [ 537.351740][ T9353] bridge0: port 1(bridge_slave_0) entered disabled state [ 539.553055][ T9353] device hsr_slave_0 left promiscuous mode [ 539.602419][ T9353] device hsr_slave_1 left promiscuous mode [ 539.680648][ T9353] team0 (unregistering): Port device team_slave_1 removed [ 539.696070][ T9353] team0 (unregistering): Port device team_slave_0 removed [ 539.708871][ T9353] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 539.753970][ T9353] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 539.853808][ T9353] bond0 (unregistering): Released all slaves [ 539.977484][T17771] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 539.989140][T17771] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 540.010714][T17771] team0: Port device team_slave_0 added [ 540.018321][T17771] team0: Port device team_slave_1 added [ 540.074544][T17771] device hsr_slave_0 entered promiscuous mode [ 540.112808][T17771] device hsr_slave_1 entered promiscuous mode [ 540.371288][T17771] 8021q: adding VLAN 0 to HW filter on device bond0 [ 540.405857][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 540.431377][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 540.449829][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 540.470817][T17771] 8021q: adding VLAN 0 to HW filter on device team0 [ 540.493986][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 540.512974][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 540.521674][ T2999] bridge0: port 1(bridge_slave_0) entered blocking state [ 540.528818][ T2999] bridge0: port 1(bridge_slave_0) entered forwarding state [ 540.558125][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 540.567127][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 540.576803][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 540.586390][ T8892] bridge0: port 2(bridge_slave_1) entered blocking state [ 540.603182][ T8892] bridge0: port 2(bridge_slave_1) entered forwarding state [ 540.612858][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 540.639332][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 540.651617][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 540.673981][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 540.682736][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 540.691178][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 540.701832][T17771] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 540.741589][T17771] 8021q: adding VLAN 0 to HW filter on device batadv0 10:15:57 executing program 1: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:15:57 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x8) 10:15:57 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)}], 0x1}, 0x0) 10:15:57 executing program 4: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x8, 0x4000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r2, &(0x7f000001e000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 10:15:57 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = gettid() kcmp(r4, 0x0, 0x0, 0xffffffffffffffff, r1) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0xf}}}, 0x1000, 0x8001}, 0x0) fstat(r3, &(0x7f0000004800)) getresgid(&(0x7f0000004880), &(0x7f00000048c0)=0x0, &(0x7f0000004900)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004940), 0x0) getuid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000005300)={{{@in6=@local, @in6=@local}}, {{@in=@local}}}, &(0x7f0000005400)=0xe8) stat(&(0x7f0000005440)='./file0\x00', 0x0) lstat(&(0x7f0000005640)='./file0\x00', 0x0) getresgid(&(0x7f0000005840), &(0x7f0000005880), 0x0) stat(0x0, &(0x7f0000005940)) lstat(0x0, &(0x7f0000005cc0)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000005d40), &(0x7f0000005d80)=0xc) getgid() getgroups(0x3ff97f33d6d5dad, &(0x7f0000000080)=[r5]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005e00)={{{@in6=@mcast2, @in6=@local}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000005f00)=0xe8) getgid() stat(&(0x7f0000005f40)='./file0\x00', &(0x7f0000005f80)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000006000), &(0x7f0000004b00)=0xc) open(&(0x7f0000006080)='./file0\x00', 0x101000, 0x0) sendfile(r1, r1, 0x0, 0x2000005) 10:15:57 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x24, 0x33, 0x119, 0x0, 0x0, {0x2, 0xf}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x20000018, @ipv4=@multicast1=0x4000a03}]}]}, 0x24}}, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) [ 541.108863][T17788] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 541.115890][T17783] ima: Unable to reopen file for reading. [ 541.117419][ T26] audit: type=1804 audit(1567160157.743:95): pid=17783 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/359/file0" dev="sda1" ino=17361 res=1 10:15:57 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$P9_RWALK(r0, &(0x7f0000000200)=ANY=[@ANYRES64], 0xffffff3e) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000080)=[r1, r1, r0, r1, r0, r1, r0, r0, r1, r0], 0xa) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x1, 0x28813, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:15:57 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)}], 0x1}, 0x0) 10:15:57 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xa) [ 541.214633][T17788] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 541.335527][ T26] audit: type=1804 audit(1567160157.973:96): pid=17796 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir433285996/syzkaller.jxj2Zw/361/bus" dev="sda1" ino=16515 res=1 10:15:58 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1005, 0x1) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008915, &(0x7f0000000100)="11dcfd8a5858f2965e7170") ioctl$sock_x25_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={@null=' \x00', 0xc, 'team0\x00'}) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f0000000080)=""/84) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000240)="e176e92ed2952fc37267e2195b4586d1a5ce44e410b7101bf945eefb01e9a497cc328a11d18e") ioctl$int_in(r0, 0x80006040045010, &(0x7f0000000000)) 10:15:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x80000, 0x0) bind$bt_l2cap(r2, &(0x7f0000000080)={0x1f, 0x8001, {0x1f, 0xfffffffffffff001, 0x0, 0x7, 0xa9, 0x3}, 0x8, 0x2}, 0xe) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005300)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f00000001c0)="0f007f8d2c054de8b079f7befa6c0c80fd8b7a036190af40eaeba138256e604ac99cbf2fe6a7dbc2e16940c2abbc92a34c30fdbe56961cc69a99e67dde1cc6c59f695ffe8e3b71cbca9dedd94c7ea46f34d8d0dfacc7b573d1481b3617e0dc828f501a5973953dc91eeebd5d23f523dac022628a83822df69e662f7b3e1c307b0c087087a6180a66b59b45a4a863ce0116b8686e170f6a76da5fa0ac0612b48cacb6071adfe78f7d75efda97a42107b27228b3d1b7bcf632d2945cb356aad64f353ff2063e125594c52bac0b47ab6e3d62", 0xd1}, {&(0x7f00000002c0)="bdb85ab9ee3244ef3f655835c0dbc7008530d245fb0b67053bbfdfab906b9769491e327780df5fe4eecea9e2a8c7e50f2fb54eb4998193686cf4ce4bd848b79d9e218e9779319160f7e7faa26d0fc1292a9c309619cee75271474f058a65c29710fef5184e774be291370b7aeedcc85f90c4d950eb9a2daa53fb42b1fe8b903743e7a177095cb9de178b8a8b632e231ed53a152b0ff44b35cf59ea63a5235932640c9230c0983bd5891fe7849bb9cda1a51b1558378330b43545668f84f1cc582941ac338b048a54dd244955936ee119feec77f4f6e0b9cace015a416c1ee10fd95a", 0xe2}, {&(0x7f00000000c0)="59620b9a7baffb440441d97b430d611b1d14f77cdbc02f185b71ac04cb982b9f03f07be4fb0189105ffc9953fe592c0b8d14246e31", 0x35}, {&(0x7f0000000100)="e053f14f424f3058c935bb872772a424d0aa5228e4680cdecd5f55ed28a41bd2529a6475cfa0e63716062b56bd1d8b70cbb705a29515394544d5a30352bbf7c2c131e2cf386a66561f4fdd08e027e2a03ff50649c81c24771f19d55641962f2506f0ca20e5a587fe1bb081363ccd52b27d19bd3c91cf51f1011ab34a230b", 0x7e}, {&(0x7f00000003c0)="3284ae847bff17b12c71a330a3b3ff64533fd93fcf739a015be7921bc233b498782337c1e2b0f11e000ed1fc0b05f9e3ef5a949b0d76d079ddd6d382937d2e644d8de1b460483c1217d1abab84e992867854a417232e00f3b78601be56701da68ec55ba83aacc74a985313ac56cd3788e218c40f324ec6e4a899dfb3fd184278ce14a9bd74338bac3a1b3722bd131885fb33d8dfbfc41f3360dadc8edae5ccd8a2620f1e173ba03a81b6ffc477d95ac459d977ca646611e4224dd6c5fa80ce7dae75bdfd4e046b8a3314095b887bd389c1b713a27e6671bd248b9ce78b", 0xdd}, {&(0x7f00000004c0)="a93e247c409c04d60407a4ff233ff60a1520806f9a3f0992841c750488a69a691bb8decb2949838261129b44c67997d8075d21df1b95ce", 0x37}, {&(0x7f0000000500)="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", 0x211}], 0x7}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0) 10:15:58 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c", 0x12}], 0x1}, 0x0) [ 541.429725][T17802] ima: Unable to reopen file for reading. [ 541.441039][ T26] audit: type=1804 audit(1567160158.063:97): pid=17802 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/360/file0" dev="sda1" ino=16553 res=1 [ 541.569355][ T26] audit: type=1804 audit(1567160158.133:98): pid=17796 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir433285996/syzkaller.jxj2Zw/361/bus" dev="sda1" ino=16515 res=1 [ 541.713008][ T26] audit: type=1804 audit(1567160158.143:99): pid=17805 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir433285996/syzkaller.jxj2Zw/361/bus" dev="sda1" ino=16515 res=1 10:15:58 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:15:58 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x48) 10:15:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x81, &(0x7f00000003c0)="11d9a50d6f036c7bf070") r1 = socket$key(0xf, 0x3, 0x2) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000200)={0xc7e2, 0x5, 0x20b, 0x3ff, 0x1, 0x4, 0xffff, 0x0, 0x0}, &(0x7f0000000280)=0x20) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f00000002c0)={r4, 0x7e, "ab87cfe37505eba1b2ebda2f9670fdae2fd821ee8ceeceb1b86f98e9b66f10f7e62bbb0ad415eecf39a419dcc648b8d9a0160a00efe51f2f3afca455a2114d5f10a63a0c1a3d59b598515c3dc9be938ebb40abde0a6230813d939b2124038a004b828fe833318ec3555cde292f25dcba436c7d8d41d71548e02734b965fa"}, &(0x7f0000000400)=0x86) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0xfa) sendmsg$key(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x2, 0x17, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r5 = dup2(r2, r1) ioctl$TUNSETFILTEREBPF(r5, 0x800454e1, &(0x7f0000000180)=r5) 10:15:58 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c", 0x12}], 0x1}, 0x0) 10:15:58 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000001c0)={'NETMAP\x00'}, &(0x7f0000000200)=0x1e) syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f00000002c0)="095abf578b6703cec012", 0xa, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000280)={r1, r2, r1}, &(0x7f00000000c0)=""/83, 0x53, 0x0) 10:15:58 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="40000000000025000400000005007c00000000000000200000000000"], 0x1c) sendfile(r0, r0, &(0x7f0000001000), 0xfffb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x32b, &(0x7f0000000000)=[{}]}, 0x10) 10:15:58 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c", 0x12}], 0x1}, 0x0) [ 542.173238][ T26] audit: type=1804 audit(1567160158.813:100): pid=17828 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/361/file0" dev="sda1" ino=16644 res=1 [ 542.205203][T17828] ima: Unable to reopen file for reading. 10:15:58 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x1) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20000, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r2, 0x80046402, &(0x7f0000000080)=0xfffffffeffffffff) setrlimit(0x7, &(0x7f0000000040)) accept(r1, 0x0, 0x0) 10:15:59 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x4c) 10:15:59 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xccd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffeff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'dummy0\x00', 0x0}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000980)={@mcast2, 0x0}, &(0x7f00000009c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000002240)=0xe8) sendmmsg$inet(r2, &(0x7f0000003e00)=[{{&(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10, &(0x7f0000000300)=[{&(0x7f00000001c0)="94d26fd5d7c41b0ee3c82098bd437df2a102bc058bec27542599759e221b393fad0e03a6c0cb961b670cf75c00594d68e7a8c3afd5541e2ba0265a8602956bb64929329f54e7a930486f391ce79518ab0466e9b63671a22a63849b69057e15a4d69a39e9f753b1cac678d1ddfed9182d146482ab15076e7617c0ae45314d", 0x7e}, {&(0x7f0000000240)="d3e00ef8482896ae10d61b6818fe018158fad5b894f75b41f56d34bd89fceea2f7246dc6223f267a3687802205548d5a130e506e8185deef2932d52761930cb2ad288c9d3452f9177386f5c3c1a572959cc25a92a00d8dd5cf1396f138d983f58d865fbf944783d8e25593f8f69e2f5969a8049b2e2ad58ddaf5b9258b06c54eb828cc6446c414b9593c230a601d49c30889d560160f28131d059e87c653f854211356558223760be0cdf43a61965f45", 0xb0}, {&(0x7f00000000c0)="c4e07123751feb477a7109fd0a62d9cc533ab5eeb9076344858f32cae1a8f716b94e8488bb5b7a79d79d83466444b04a", 0x30}], 0x3, &(0x7f0000000340)=[@ip_retopts={{0x90, 0x0, 0x7, {[@ssrr={0x89, 0x7, 0x1000, [@rand_addr=0x3]}, @rr={0x7, 0xf, 0x80, [@remote, @broadcast, @rand_addr=0x1f]}, @timestamp={0x44, 0xc, 0x6, 0x1, 0x5, [{[@loopback], 0x401}]}, @generic={0x89, 0xa, "c872938fff323dcc"}, @ssrr={0x89, 0x1b, 0xc0000000, [@initdev={0xac, 0x1e, 0x1, 0x0}, @remote, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @noop, @rr={0x7, 0x23, 0x0, [@broadcast, @multicast2, @loopback, @multicast2, @dev={0xac, 0x14, 0x14, 0x22}, @dev={0xac, 0x14, 0x14, 0x1b}, @rand_addr=0x3, @loopback]}, @rr={0x7, 0x7, 0x99dd, [@rand_addr=0x6]}, @ra={0x94, 0x6, 0x7f}, @timestamp={0x44, 0x8, 0x0, 0x1, 0xb9, [{[], 0x7fffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8e7}}], 0xa8}}, {{&(0x7f0000000400)={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000000540)=[{&(0x7f0000000440)="89713bbc29f5af85ad3854a11e270ee7b52536c0a6e7699b9fdb68b5fdec08757342fdca9d956f0dc79d507dcfdbd55c6750dcf338bc55902549204a", 0x3c}, {&(0x7f0000000480)="ae7a076eed8a6e511b0d83c20469eeda5f27d8b10aa00ba1680e525afa1858991ec42025326dd9994e57c1ce480bbdfabda6278f5bcabd5fd4f1082cb6943a14bdf383cea7d17800710d0dbf5c429ffa7285dd3467b30c201ffd2f16f1cac9aac0c8dcfe3209af9628fff3da8e572923cbcc193f43d2851f7f4dd281592490f606bec943c3673da8eadbc08e8282e39b89641f1da6646b8fc05ccc7c038dc2dbd75c1dc6f690128ddd1cbe500a", 0xad}], 0x2, &(0x7f00000005c0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x10000}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @ip_retopts={{0x2c, 0x0, 0x7, {[@lsrr={0x83, 0x1b, 0x9, [@empty, @rand_addr=0x77c1, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @broadcast, @local]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x81}}, @ip_retopts={{0x54, 0x0, 0x7, {[@generic={0x94, 0xb, "7aff104ee5465c77a0"}, @noop, @end, @generic={0x1, 0x5, "61924f"}, @lsrr={0x83, 0xb, 0x0, [@remote, @multicast1]}, @noop, @ra={0x94, 0x6}, @end, @timestamp={0x44, 0x1c, 0x29d9, 0x0, 0x2, [{[], 0x4703}, {[@loopback], 0x401}, {[@broadcast], 0x43}, {[], 0xc295}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x81}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5}}, @ip_retopts={{0x70, 0x0, 0x7, {[@noop, @timestamp={0x44, 0x14, 0x2, 0x1, 0xd6, [{[], 0x3}, {[@local], 0x6}, {[], 0x2}]}, @generic={0x7, 0x12, "1b704e0bdacb2ba2ffeceed450af5654"}, @rr={0x7, 0x13, 0x8001, [@multicast2, @loopback, @dev={0xac, 0x14, 0x14, 0x23}, @empty]}, @cipso={0x86, 0x14, 0x0, [{0x5, 0x8, "9c15c5936259"}, {0x7, 0x3, "c6"}, {0x2, 0x3, '$'}]}, @noop, @ssrr={0x89, 0xf, 0x6, [@empty, @dev={0xac, 0x14, 0x14, 0x23}, @multicast1]}, @noop]}}}], 0x1a8}}, {{&(0x7f0000000780)={0x2, 0x4e22, @local}, 0x10, &(0x7f0000000940)=[{&(0x7f00000007c0)="35732708c66e470333239a05581d25294b5f5da0857f53a51e4fb050f52afbe495f416fe59d872b2eab5336d1ad73115220b0769e1eeacb47bdc26291256c881cbd49621ff2709d301807e88c0d7b6a9d354f5dbc588f866ef5a80f5aee99b098a252f768f10c8e5f9f27120d07ae6879fde3d1cf15d1d421c10428a7106dbb2c5b0a7b31bfaf015f093f1b56ddaa12d04b268c724ebd064", 0x98}, {&(0x7f0000000880)="c484", 0x2}, {&(0x7f00000008c0)="7907a366b5afa4822830aa4d79c69d27dd2056", 0x13}, {&(0x7f0000000900)}], 0x4, &(0x7f0000000a00)=[@ip_retopts={{0xc8, 0x0, 0x7, {[@ssrr={0x89, 0x7, 0x737f, [@dev={0xac, 0x14, 0x14, 0x19}]}, @rr={0x7, 0xb, 0x2, [@dev={0xac, 0x14, 0x14, 0x28}, @dev={0xac, 0x14, 0x14, 0x16}]}, @cipso={0x86, 0x3c, 0x258c, [{0x7, 0x4, "97c4"}, {0x7, 0x2}, {0x5, 0x5, "bea672"}, {0x1, 0x3, "d3"}, {0x7, 0x12, "f170d0f98497ea3a37ade427216a089d"}, {0x0, 0x7, "38104f5cc4"}, {0x7, 0xf, "cb0d6fbb6cbaa7a63cfbed9bcf"}]}, @ra={0x94, 0x6, 0xfffffffffffffff9}, @generic={0x83, 0x2}, @cipso={0x86, 0x58, 0x7d, [{0x1, 0xf, "29cf70dad5d6deac4cd120b409"}, {0x7, 0xc, "6294c2297749e53a6a30"}, {0x6, 0xf, "2e07fd90b3473690de7f8eb27e"}, {0x7, 0xf, "1f16aa78f30fae5d192fa6bb9b"}, {0x7, 0xc, "653fb213622d54642863"}, {0x5, 0xd, "124ad3d98dca5a5a06123c"}]}, @rr={0x7, 0x7, 0x4, [@multicast1]}, @noop, @end]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x2}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xff}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x81}}, @ip_ttl={{0x14}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @loopback, @rand_addr=0x8001}}}], 0x148}}, {{0x0, 0x0, &(0x7f0000002080)=[{&(0x7f0000000b80)="69ecf2fa209d06d69b5780325f596631633f246b54dbd77978bf0375d6bbdf08e167d60e894aa97b027fab8ddfeec316eedc18fafca68b3d664a68dc4bfe89cdb13f3b05e500edbba475b3323e9f08e5a436ce74fe9feba55b1b5ba86b7552bbda68b613fe3d2cff7a93d420858cc955f02d7bf52d5d9dc64bafeda3497a5de230d446acdeabb700129b469bc5d6ccb9", 0x90}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)="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", 0x1000}, {&(0x7f0000001c80)="f84e83b99a6711ea78a0672a60e813c8e7a007a34cc4f659d60f053c4dbe69633534", 0x22}, {&(0x7f0000001cc0)="ad673fbccd080c2bee73e4ff7b53867e10beaa9bed746206bfbb27460e96b90ed8b5bd3413fa7a2b0c1eaa87b1d7b6054c6ad0f850267bcae081b56b5f018c78d633f663bebc4e9f91e47b801f4d512a9d0a1a6645ef78f901944aa167290516f1e7e3a0d151d8ac1d9ecdd94be50dcecbe3c41be43683825c82eb0271fd4325346670c963c11f04e42bc377c5e8ac42006a11654b6148b9400d623b244a73c5fdbe620c1df70f89bfe56a3ffb60b53c6365c6d7b1d4074766c21d4068106a727483e940d874a59605b2b008fed4b9f323", 0xd1}, {&(0x7f0000001dc0)="210f96ee4bdcf0f758d8a9e625067727a076042a7bde9d0bf44346b7a16177bf8bf0481d9ddaec3a8e885c6ea3334211f0d2f5660636b56821d51fa4c228c0a67ab57ec08f5385541753291a9d975ccc116aecc800b6dd982894c52d753730d405e0f82f566c978e23cbe3b27e2e3cdf1592630756e22046033ae9d755dcd96dc26364f9e1", 0x85}, {&(0x7f0000001e80)="dd3cc301c948d1f39db1157bfb6785ebbf6b0068cb685e1fc1c07f6fc2a16377ce81254148c5c318419cac", 0x2b}, {&(0x7f0000001ec0)="b10c042e3750bbaac02c862469e56ec8555a7aec482fc2533f16b822f396d6ecb65d4e5320d5c88f99cb855f3ed3539720730e41735b1b06c6b4e4f5781d32ca11c07f1f27af8f8d8a29b6200b789a51a8baa56802da1a3d3bbaa02bae8823eaaf2e53dc36bf84e3677460244f70214513bec787f784af9f6fa5fe0a373a4cd6e780c3c3ca4fbd66f262383ce8c2", 0x8e}, {&(0x7f0000001f80)="cdc8df302551206412864e9cc7d6d26a537b8368ab9636b0f18691abae6f23af2c1be22e2c3f5fb0d03b3041e0431f533795c618a7a9d7044be551e02271ba185430180c973f9599a675ce8e536dc658057e64bbd4bf74e4be68ffb7d43722ad9481787ad91d899c71193bec8b8e6d29144f848672ab18bd133fbc678c0783fa100e90a70e84b10d7fe8d5c4facaea4875a7cc17e63addb98505311cf52a208d1e86536a11bdac2f6a1d5d0c5c7120716c581b0f3e3edf22aaea6777d49f1dcc83bec3", 0xc3}], 0x9, &(0x7f0000002280)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @broadcast, @multicast1}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9}}, @ip_ttl={{0x14, 0x0, 0x2, 0x200}}, @ip_retopts={{0x100, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x2, 0x0, 0x80000000, [{[@local], 0x7}, {[], 0x6}, {[@empty]}]}, @timestamp={0x44, 0x38, 0x6, 0x1, 0xa73, [{[@local], 0x8}, {[@local], 0x3747}, {[], 0x8}, {[], 0x10000}, {[], 0x2}, {[], 0x3}, {[@initdev={0xac, 0x1e, 0x1, 0x0}], 0x400}, {[@loopback], 0x5}, {}]}, @rr={0x7, 0x7, 0x6, [@dev={0xac, 0x14, 0x14, 0xc}]}, @cipso={0x86, 0x4a, 0x9, [{0x7, 0xf, "04a0e7f8d3a5a3c4be6f27c9fe"}, {0x6, 0xd, "1ed0e24dcea653541526b2"}, {0x1, 0x10, "56361bac175cb00b4c8987bc3679"}, {0x1, 0x6, "cffed497"}, {0x0, 0x8, "02f7644796ed"}, {0x5, 0xa, "f6130006d62cdc12"}]}, @lsrr={0x83, 0x23, 0x80000000, [@empty, @empty, @remote, @empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x10}, @dev={0xac, 0x14, 0x14, 0x17}, @rand_addr=0x4]}, @ra={0x94, 0x6, 0x4}, @rr={0x7, 0x23, 0x3, [@remote, @broadcast, @local, @local, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty]}, @noop]}}}], 0x168}}, {{&(0x7f0000002400)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000002500)=[{&(0x7f0000002440)="be76b7fadd6ba0cbf52b67e64870fe5d1d46f8be9ab5a3b01da68b41f322cd4e2131069ca1611cf4eb195a750fef2312c262f8bb64f0114596f2c153158f1b0dc786d30338db3a41d6b85874e64ec11d99d394f3ae624c5c9113f8d9e0dca532dd2485c53578877bfa17578fa7928404939f71a03c6cab5a948a6e3f8d5513c93956ed", 0x83}], 0x1, &(0x7f0000002540)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}], 0x18}}, {{&(0x7f0000002580)={0x2, 0x4e23, @rand_addr=0xcf}, 0x10, &(0x7f0000003940)=[{&(0x7f00000025c0)="163720af23f4ca5e613861590497b2145515b1d64f867e0070600f71d1bc4b0e0a478cc505a9db686a69c892a95917f280cfd3f007b52117e358ae60cf16be845b15c28ec7c3a23492e95ab515f4c52149bc3410d3fbca078bf77cd6a7a01934162f2f95bf3be6f7276ce4409562d5619def2f24c55069efafe972efc2d0bfe61fd7239897bc04cdf3424bdcc9149ac99926ff03f4113be5de976cecaec96895a934e09fe05f2bbad471bc5c4e0423ec6d755242fa90450adeb1375228029d6dfd", 0xc1}, {&(0x7f00000026c0)="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", 0x1000}, {&(0x7f00000036c0)="fb020e0369f5a7e9470195367e4a12db7c9c170bf86338cd2bb595c7bfada82dda1b2abaa43d23127417e0169363b3ffc581302a1fe8842248bef27f80a2550ff0fb8d5001241584eaa0ecf4fc874d6a362215aaa750f40a48bcff3786956a5aec883ecd05c19163bfe749bbe3c7ba9ceea0ed01e474cf8074551a95a964df55761101d45f6be8493e012694411387cdae0692a54149f3f30a5cbfad3f40c47f35a38843ed6cde2b4ffbd7f6e42e49e1c8917d992458e4e457dee1f84e50cb1b47e1f72308d8cd756fb811789a2d2d2d48af9b77add6a0de5b4d6a5cdfa54f06c4afcb3b774eac38768dfc", 0xeb}, {&(0x7f00000037c0)="66f89144a8a33a32b5893d2e8de7fc4555a7badbab86256c1b98f088fa586905e3405233176919ca1eec3d2e07867c6955f46d9c60aaa99921b9b36188d26ce221fc26c2ec0a8fced0056ad1d278403ed275d742d64ee7708ebe54ede62b1d7c60f49bee", 0x64}, {&(0x7f0000003840)="4406874a0245520c4ac174189c93e9d2d71a46ee8bc423f62c16c29bc3412d38c5204f131a4c39d0b931555ec9e5969121e46b6941f8291e37f7a03de6c94c9e5d1ca7cb069d9f382cb25e28fb943042a0e0ed74020eecd2760abb253ec06c04e49ee60ad3ce5a08f17a52e7cefa7f5741e01725ff176d088e56d3161921d52a907b4cacf93e5cfef8b26fcf6b3c5d2b0043d700bd58e02331ef5c5133cf575df092c78a345f1c5d8b89b8cb3eb18f7e8cc7ca8d69b091fb321b33d123eca2066566d965ec257aaa6640a7282425a2164a2945463d018410", 0xd8}], 0x5, &(0x7f00000039c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0xff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8000}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x71}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}], 0x78}}, {{&(0x7f0000003a40)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000003c80)=[{&(0x7f0000003a80)="f7a9f1bbf8802d4e88e039c39c1f263d1130a88c4c0aa545fc845384d09e59f0ddc67de66b5cd89566f431df9d83b9f7d68ff3047f15432c295bc079cb7347e89ccb37cb70b4e20648b7fa99268596e9813da53c8136ab28aa743a", 0x5b}, {&(0x7f0000003b00)="d1f643640cc52d95475dce548eb221c38e69f3d5cfdff427c2556c4095c1d1e8e3cce518ee804012d9b94ed38e7f7086c6617662117ea61ff34e33c06a", 0x3d}, {&(0x7f0000003b40)="b02400d977bcc33c1be1c3612a444ba76d524949d8d6e763711ea96e61ffe1c64d6215c846f47bd4dad5927764c0a7d8948856c39bd278b6288592b099e02960eb5cc0ac4df7b9345866d07f57e70993563bb60de48189831168782d4658d6c67d2269fd2566b3a7a81f3d1c00c6aa308bba8f0e130a86176c6a7c8f66b52cf21493da72da51256dc358a68457c066f19b80b3cad00db43c614266396c711e6ff9913aadddda750dd498191087def52b68e2d6eecf0f0f763b2c098d0a07e3e7faae85152677149c7d9ab46f9730c198ff6dba8592448b4ee55a781a8e5e6b5318ec32d86b6000", 0xe7}, {&(0x7f0000003c40)="976569b3f8c88821b3ae648cde5dbaa5c0eb72c6ab23e5ee5c0a93541f870c675042ad3d0e2ba3d563c045", 0x2b}], 0x4, &(0x7f0000003cc0)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x4}}, @ip_retopts={{0x58, 0x0, 0x7, {[@cipso={0x86, 0x45, 0x2c00000000000000, [{0x6, 0xb, "85f62187cfd0d362b8"}, {0x0, 0x10, "c6d2bb8e2942eb90bc1119bd3c8f"}, {0x7, 0xc, "e29a309cb573934b2179"}, {0x7, 0x7, "9ed229bf41"}, {0x5, 0x5, "a02ccb"}, {0x1, 0xc, "ab2dead7b3deb4b02954"}]}, @noop, @noop]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x4a, 0x7, [{0x0, 0xb, "29841e116300c1fa20"}, {0x7, 0xf, "c3cbdd4786fe4b307bf46ae9a4"}, {0x5, 0xc, "295d875f8cc8a9c78f3d"}, {0x6, 0x11, "2709250cdf2da17282b9e2791e07f4"}, {0x5, 0xa, "fda064e34c4fa9fa"}, {0x5, 0x3, '&'}]}, @generic={0x0, 0xe, "57df34273fb025edea7ad540"}, @end]}}}], 0x110}}], 0x7, 0x4000) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0xffffffff}) 10:15:59 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:15:59 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa300", 0x1b}], 0x1}, 0x0) 10:15:59 executing program 0: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) socket$packet(0x11, 0x3, 0x300) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000680)={0x0, 0xc6, &(0x7f0000000580)="8a34b0dccb8d8d56d6a18bb25d730c07a432da2065ccaa44e6712b5a3d283d799f107f0b29eeaa3f739315f64e2a16a1f884c2b4f913fed1bd29721a72d3ffe5737378e9cdb2627e8feee41ed78b97576aaec851edf857ce9d8360473833ebfb3d4ac1a11a9876ecab17ea4d7342f2efa38545f9778c670cf6c607eecf9a32218bc9ca27005e3baa0163a4eb79959813fb2a5de8d405500c6bc8c59d48e5760dadde8bfdab572c5bee7f296ef55601ed67735b90263f9ea3a6f65a20599c738029dcf44a4324"}) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000000)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000000040)=r2) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000540)={0x3}) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000340)=ANY=[@ANYBLOB="050000000000000000200000000000005a00000000000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB='\x00'/90], @ANYBLOB="000000000000000000f01000000000000100000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='\x00'], @ANYBLOB="000000000000000000600000000000001200000070f06336", @ANYPTR=&(0x7f0000000180)=ANY=[@ANYBLOB='\x00'/18], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000008000000000000000000000000000eaffffffca4d84acda091de5effe5b8133de4d00"/122], @ANYBLOB="00000000000000000200000000000000dc00000000000000", @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000070ae62e606c300"/220], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) write$UHID_CREATE(r0, &(0x7f0000000400)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0, 0xffffffffffffffcf, 0x0, 0xffffffffffffffff}, 0xfffffef6) [ 542.568456][ T26] audit: type=1804 audit(1567160159.203:101): pid=17847 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/362/file0" dev="sda1" ino=16540 res=1 [ 542.568461][T17847] ima: Unable to reopen file for reading. 10:15:59 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x68) 10:15:59 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa300", 0x1b}], 0x1}, 0x0) 10:15:59 executing program 4: accept(0xffffffffffffffff, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000180)=0x80) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffe, 0x8000, 0x5, 0x7ff, 0x0}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={r1, 0x3, 0x20}, &(0x7f0000000280)=0xc) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ptmx\x00', 0x101001, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(r2, 0x0, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x208040) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r3, 0x12, 0x2, &(0x7f0000000040)=""/111, &(0x7f00000000c0)=0x6f) [ 542.847483][T17858] ima: Unable to reopen file for reading. [ 542.848134][ T26] audit: type=1804 audit(1567160159.483:102): pid=17858 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/363/file0" dev="sda1" ino=16646 res=1 10:15:59 executing program 0: socket$inet6(0xa, 0x2, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000280)='/dev/radio#\x00', 0x2, 0x2) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000080)=0x5, 0x4) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 10:15:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) socket$inet(0x10, 0x3, 0x0) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000080)) 10:15:59 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa300", 0x1b}], 0x1}, 0x0) 10:15:59 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x6c) 10:15:59 executing program 4: r0 = userfaultfd(0x0) r1 = memfd_create(&(0x7f0000000040)='\x00', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x12, r1, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e53fe8)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000007fe0)={{&(0x7f0000000000/0x4000)=nil, 0x4000}, 0x1}) ioctl$UFFDIO_UNREGISTER(r0, 0xc020aa04, &(0x7f0000007ffc)={&(0x7f0000000000/0x2000)=nil, 0x2000}) 10:15:59 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000", 0x1f}], 0x1}, 0x0) [ 543.217235][ T26] audit: type=1804 audit(1567160159.853:103): pid=17876 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/364/file0" dev="sda1" ino=16520 res=1 [ 543.217253][T17876] ima: Unable to reopen file for reading. [ 544.950792][T17894] IPVS: ftp: loaded support on port[0] = 21 [ 545.242509][T17894] chnl_net:caif_netlink_parms(): no params data found [ 545.385517][T17894] bridge0: port 1(bridge_slave_0) entered blocking state [ 545.393249][T17894] bridge0: port 1(bridge_slave_0) entered disabled state [ 545.401358][T17894] device bridge_slave_0 entered promiscuous mode [ 545.409932][T17894] bridge0: port 2(bridge_slave_1) entered blocking state [ 545.417201][T17894] bridge0: port 2(bridge_slave_1) entered disabled state [ 545.425132][T17894] device bridge_slave_1 entered promiscuous mode [ 545.437604][ T7] device bridge_slave_1 left promiscuous mode [ 545.445031][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 545.493257][ T7] device bridge_slave_0 left promiscuous mode [ 545.499523][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 547.713410][ T7] device hsr_slave_0 left promiscuous mode [ 547.752422][ T7] device hsr_slave_1 left promiscuous mode [ 547.817728][ T7] team0 (unregistering): Port device team_slave_1 removed [ 547.830593][ T7] team0 (unregistering): Port device team_slave_0 removed [ 547.845591][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 547.910055][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 547.994075][ T7] bond0 (unregistering): Released all slaves [ 548.113307][T17894] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 548.125135][T17894] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 548.146773][T17894] team0: Port device team_slave_0 added [ 548.154306][T17894] team0: Port device team_slave_1 added [ 548.214912][T17894] device hsr_slave_0 entered promiscuous mode [ 548.252742][T17894] device hsr_slave_1 entered promiscuous mode [ 548.413325][T17894] 8021q: adding VLAN 0 to HW filter on device bond0 [ 548.454454][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 548.475932][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 548.493147][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 548.504347][T17894] 8021q: adding VLAN 0 to HW filter on device team0 [ 548.527345][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 548.550899][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 548.571802][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 548.579250][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 548.598880][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 548.620354][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 548.640624][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 548.665753][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 548.673214][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 548.690538][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 548.700692][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 548.751005][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 548.773466][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 548.792606][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 548.801138][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 548.823069][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 548.836602][T17894] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 548.916428][T17894] 8021q: adding VLAN 0 to HW filter on device batadv0 10:16:05 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:16:05 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8923, &(0x7f0000000000)={'bond0\x00\x00\x00\x00\x06\x00\x00\x01\x00', @ifru_names='bridge_slave_1\x00'}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x400, 0x0) write$P9_RMKNOD(r1, &(0x7f0000000080)={0x14, 0x13, 0x2, {0x0, 0x4, 0x5}}, 0x14) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000140)={0x15, 0x110, 0xfa00, {r2, 0xad4, 0x0, 0x0, 0x0, @ib={0x1b, 0x8, 0x7, {"73f77d993c9d007eb97fc7e0461189fe"}, 0x401, 0x7ff, 0x2}, @ib={0x1b, 0x7, 0x3, {"49dd1ecc0d36d5608f228713bcf98a4c"}, 0x14, 0x5, 0x4}}}, 0x118) 10:16:05 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x80402) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000)=0xe5, 0x4) ioctl$SIOCGETNODEID(r0, 0x8038550a, 0x0) 10:16:05 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000", 0x1f}], 0x1}, 0x0) 10:16:05 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x13, &(0x7f0000000140)=0x32, 0x4) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x1, 0x0, 0xfffff038}, {0x80010006}]}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:16:05 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x74) [ 549.292237][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 549.298352][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 549.310135][T17911] ima: Unable to reopen file for reading. [ 549.310160][ T26] audit: type=1804 audit(1567160165.943:104): pid=17911 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/365/file0" dev="sda1" ino=16557 res=1 10:16:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$netrom(0xffffffffffffffff, &(0x7f00000000c0)={{0x3, @netrom}, [@default, @netrom, @netrom, @null, @remote, @bcast, @default, @bcast]}, &(0x7f0000000180)=0x48) r0 = socket$alg(0x26, 0x5, 0x0) recvmmsg(r0, 0x0, 0xffffff90, 0x2000, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000001, 0x0, 0x0, 0x2, 0x0) 10:16:06 executing program 4: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x13, &(0x7f00000001c0)=@broute={'broute\x00\x00\x00\x00\x00P\xe0\x00', 0x20, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x2, 0x0, 0x0}, 0x108) r1 = gettid() r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0xfffffffffffffffe, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x4}, 0x0, 0x0, &(0x7f0000000100)={0x4, 0x4, 0xfffffffffffffffa, 0x6}, &(0x7f0000000140)=0x8000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x7fff}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r1, r2, 0x0, 0xe, &(0x7f0000000040)='broute\x00\x00\x00\x00\x00P\xe0\x00', r3}, 0x30) 10:16:06 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000", 0x1f}], 0x1}, 0x0) [ 549.374778][T17914] ima: Unable to reopen file for reading. 10:16:06 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x7a) 10:16:06 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x13, &(0x7f0000000140)=0x32, 0x4) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x1, 0x0, 0xfffff038}, {0x80010006}]}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:16:06 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)=0x1) r1 = dup(r0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)={0x160, r2, 0x300, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x74, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x902}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x35d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffff7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xd763}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x10001}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7ff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x200}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7ff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffff}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80000001}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x160}, 0x1, 0x0, 0x0, 0x40}, 0x20040000) setns(r1, 0x4000000) ioctl$TCSETS(r0, 0x8925, &(0x7f0000000000)) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x2, 0x0, &(0x7f00000003c0), 0x20004c2, &(0x7f0000000400)={[{@noflush_merge='noflush_merge'}, {@test_dummy_encryption='test_dummy_encryption'}, {@acl='acl'}, {@noinline_data='noinline_data'}, {@user_xattr='user_xattr'}, {@noinline_dentry='noinline_dentry'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@nodiscard='nodiscard'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'md5sum'}}, {@smackfsroot={'smackfsroot'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}) [ 549.764407][ T26] audit: type=1804 audit(1567160166.403:105): pid=17933 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/366/file0" dev="sda1" ino=16570 res=1 [ 549.807545][T17933] ima: Unable to reopen file for reading. [ 549.863688][T17936] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 549.893368][T17936] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 549.955567][T17936] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 550.014868][T17936] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock 10:16:06 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:16:06 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b", 0x21}], 0x1}, 0x0) 10:16:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendmsg$sock(r0, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002200)=[{&(0x7f0000002100)='2', 0x1}], 0x1}, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)=ANY=[], 0x10040) recvmsg(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0), 0x119, 0x0, 0x21f}, 0x142) 10:16:06 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x300) 10:16:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x2, 0x80) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000680)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000006c0)=0x20) clock_gettime(0x7, &(0x7f00000000c0)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r1, 0xc4c85512, &(0x7f0000000180)={{0x9, 0x3, 0x401, 0x100000001, 'syz0\x00'}, 0x0, [0x0, 0x1, 0x3, 0x4, 0xa5, 0x7ff, 0x200, 0xffff, 0x8, 0x6, 0x6, 0x28b3, 0x1, 0x9, 0x9, 0x4, 0x3e, 0x1, 0xfffffffffffffffa, 0x6, 0x7, 0x5, 0x4, 0x1, 0x9, 0x0, 0x6c, 0x4, 0x81, 0xffff, 0x4, 0x4, 0x59, 0x1000, 0x1, 0x100, 0xed, 0x4, 0x401, 0xe2, 0x10001, 0x5, 0x100000001, 0xffff, 0x81, 0x56e7, 0x8, 0x9, 0x4, 0x79, 0x80, 0xfff, 0x1, 0x4a4, 0x1f, 0x7, 0x401, 0x9ce4, 0x0, 0xfff, 0x0, 0x4, 0xfffffffffffffff9, 0x5, 0x254, 0x400000000000000, 0x6, 0x0, 0x60000000000000, 0x76, 0xb0, 0x7, 0xffffffffffffffe0, 0x1000, 0x401, 0xffffffffffff7dd2, 0xafe2, 0xffff, 0x1000000000000000, 0xffff, 0x4, 0x1, 0x3577, 0x7fff, 0x8, 0xff, 0x556, 0x2, 0xff, 0x9, 0x1, 0x5, 0x1000, 0x401, 0x7, 0x7, 0x9, 0xffffffffffffffc0, 0x45a, 0x8, 0xfe, 0x1f, 0x5, 0xfffffffffffffffa, 0xffffffff, 0x9, 0x6, 0x7, 0x0, 0x7, 0x6, 0x6, 0x6, 0x0, 0x4, 0x0, 0x2, 0x7, 0x3, 0x400000000, 0xfffffffffffffff7, 0x452e, 0x9, 0xc6f, 0xd27, 0x6, 0x100, 0x86], {r2, r3+30000000}}) r4 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x13, &(0x7f0000000040)={@loopback, 0x0, 0x2}, 0x20) syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x2000) [ 550.358681][ T26] audit: type=1804 audit(1567160166.993:106): pid=17958 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/367/file0" dev="sda1" ino=16589 res=1 [ 550.358699][T17958] ima: Unable to reopen file for reading. 10:16:07 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b", 0x21}], 0x1}, 0x0) 10:16:07 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101002, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x632c81, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000001c0)={0x0, 0x93, "481457b472f2b41bc6ab19f6e51f149233952b090d474f2b0d1d4e215f7abcc62d3f51bbce0910b1f0e9bbf99c0be6e9ee1846b112a552c939d27cdfa640c5c61277939d81187b78c4391fdd22cec771c7332090eac3f3f6a8ea89891f522ceb522aa3ae945cabcbfde7d4b5b694f40e11c082a125c52fc4eb580ff8e18aa84851c0d1bfab1309002dcf92c6de3c1e48cddbcf"}, &(0x7f0000000280)=0x9b) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000003c0)={r2, 0x7f}, &(0x7f0000000400)=0x8) r3 = dup3(r1, r0, 0xef1a4d155d0c7136) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000100)={0x0, 0x4, [0xcc1]}) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000140)={0x3, &(0x7f00000000c0)=[{0x3, 0x2, 0x5, 0x5}, {0x9, 0x57d, 0x202000000000, 0xfff}, {0xe4, 0xf14, 0x2, 0x4}]}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, r5, 0x2, 0x70bd25, 0x25dfdbff, {}, ["", "", "", ""]}, 0x1c}}, 0x20000800) ioctl(r4, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="850000000800000026a82f08bc065a9a740039404774f9258d91fe7d51dfb4a4bc2deb5f5b01c71ee6df9ea77e8e909bbe235d560000040000d17a9160cf52ff6f5dde1327e7d867224f8bd0600a310a22a9b1d96b16a9e132b06fd90472408e7053ba8698ed9a0b1f57c32bfa02808027abe5faf25a0a027e378a8c"], &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153}, 0x3e) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) pwritev(r0, &(0x7f00000000c0), 0x0, 0x0) 10:16:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000340)=ANY=[@ANYBLOB="1f0000000000000000000040050001000000e7fc4b83bbb6a23b4b6942b7871001000000000000002560b700ef"]) r3 = getgid() setgid(r3) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x2, [{0x488}]}) 10:16:07 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:16:07 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b", 0x21}], 0x1}, 0x0) 10:16:07 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x500) 10:16:07 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1f, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000280)={0xb, 0x10, 0xfa00, {&(0x7f00000000c0), r1, 0x2}}, 0x18) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x2, 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') preadv(r2, &(0x7f0000000040), 0xe2cc9738b611b6d, 0x0) 10:16:07 executing program 0: setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000008000)={0x8003, {{0x2, 0x0, @remote}}}, 0xfe9b) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x200000c, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x18000, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000080)={0x2, 0x10001, 0x9, 0x2, 0x1e6, 0x99e}) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000007ffc)={&(0x7f0000006000/0x1000)=nil, 0x1000}) [ 551.090710][ T26] audit: type=1804 audit(1567160167.723:107): pid=17986 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/368/file0" dev="sda1" ino=16571 res=1 [ 551.090728][T17986] ima: Unable to reopen file for reading. 10:16:07 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b18", 0x22}], 0x1}, 0x0) 10:16:07 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0xf, 0x0, &(0x7f0000000100)=0xde) 10:16:08 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x600) 10:16:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000, &(0x7f0000000280)="11dca50d5e0bcfe47bf070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000000)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x6, 0x2, 0xbe, 0x1f, 'syz1\x00', 0x7ff}, 0x2, 0x3, 0x100000001, r2, 0x5, 0x1, 'syz1\x00', &(0x7f0000000040)=['/dev/sequencer\x00', 'eth1%\x00', '&/vboxnet1\x00', 'security\'\x00', '\x00'], 0x2b, [], [0xfff, 0x3f, 0xef07, 0x7]}) close(r0) 10:16:08 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b18", 0x22}], 0x1}, 0x0) 10:16:08 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) writev(r0, &(0x7f0000000540), 0x100000000000013c) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000000)=0xfffffffffffff5c2) [ 551.590096][ T26] audit: type=1804 audit(1567160168.223:108): pid=18013 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/369/file0" dev="sda1" ino=16575 res=1 [ 551.630903][T18013] ima: Unable to reopen file for reading. 10:16:08 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0xbbc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x11, 0x2, 0x0) fchdir(r1) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000001c0)={'ipddp0\x00', 0x8000}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bond0\x00\x05\x00\x00\x00 \x00\x00\x00\x00\x03', 0xffb}) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xffffffffffffff82, 0x200102) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000280)={[0x1, 0x5000, 0x4, 0x1000], 0x401, 0x82, 0xf68}) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=0x0, &(0x7f0000000140)=0x4) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x200000, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000180)={r3, 0x2}, 0x8) write$smack_current(r2, &(0x7f0000000080)='bond0\x00', 0x6) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000240)) pipe(&(0x7f0000000100)) [ 551.888459][T18023] device bond0 entered promiscuous mode [ 551.964265][T18023] device bond_slave_0 entered promiscuous mode [ 551.970727][T18023] device bond_slave_1 entered promiscuous mode [ 553.594546][T18035] IPVS: ftp: loaded support on port[0] = 21 [ 553.871472][T18035] chnl_net:caif_netlink_parms(): no params data found [ 553.907706][ T7] device bridge_slave_1 left promiscuous mode [ 553.914720][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 553.963326][ T7] device bridge_slave_0 left promiscuous mode [ 553.969637][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 556.203074][ T7] device hsr_slave_0 left promiscuous mode [ 556.252395][ T7] device hsr_slave_1 left promiscuous mode [ 556.314468][ T7] team0 (unregistering): Port device team_slave_1 removed [ 556.328721][ T7] team0 (unregistering): Port device team_slave_0 removed [ 556.343187][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 556.375052][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 556.464961][ T7] bond0 (unregistering): Released all slaves [ 556.565925][T18035] bridge0: port 1(bridge_slave_0) entered blocking state [ 556.573250][T18035] bridge0: port 1(bridge_slave_0) entered disabled state [ 556.581465][T18035] device bridge_slave_0 entered promiscuous mode [ 556.591394][T18035] bridge0: port 2(bridge_slave_1) entered blocking state [ 556.598893][T18035] bridge0: port 2(bridge_slave_1) entered disabled state [ 556.607222][T18035] device bridge_slave_1 entered promiscuous mode [ 556.628943][T18035] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 556.640937][T18035] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 556.665980][T18035] team0: Port device team_slave_0 added [ 556.675005][T18035] team0: Port device team_slave_1 added [ 556.745406][T18035] device hsr_slave_0 entered promiscuous mode [ 556.782717][T18035] device hsr_slave_1 entered promiscuous mode [ 556.876608][T18035] 8021q: adding VLAN 0 to HW filter on device bond0 [ 556.894489][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 556.905632][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 556.914106][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 556.974876][T18035] 8021q: adding VLAN 0 to HW filter on device team0 [ 556.999230][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 557.010091][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 557.019213][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 557.026399][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 557.044379][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 557.054033][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 557.064176][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 557.077084][ T8902] bridge0: port 2(bridge_slave_1) entered blocking state [ 557.084245][ T8902] bridge0: port 2(bridge_slave_1) entered forwarding state [ 557.125749][ T8901] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 557.146265][ T8901] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 557.184151][ T8901] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 557.205633][ T8901] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 557.224724][ T8901] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 557.247817][T18035] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 557.347564][T18035] 8021q: adding VLAN 0 to HW filter on device batadv0 10:16:14 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:16:14 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000380)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000100)={0x1}) 10:16:14 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b18", 0x22}], 0x1}, 0x0) 10:16:14 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x6, 0xa0000) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e22, 0x2, @loopback, 0x8000}}}, &(0x7f0000000140)=0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e22, 0x1, @empty, 0x4}}, 0x5, 0xca}, &(0x7f0000000240)=0x90) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x4000) fcntl$setstatus(r2, 0x4, 0x6800) 10:16:14 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x700) 10:16:14 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-generic\x00'}, 0x58) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000100)="95", 0x1}], 0x1, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000040)={0x3, "fbb9ff"}, 0x4) [ 557.694985][T18054] kcapi: manufacturer command 1 unknown. [ 557.706494][ T26] audit: type=1804 audit(1567160174.343:109): pid=18053 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/370/file0" dev="sda1" ino=16609 res=1 [ 557.706510][T18053] ima: Unable to reopen file for reading. 10:16:14 executing program 5: r0 = epoll_create1(0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x6, 0x40) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000040)=0x5) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f00000000c0)={0x8001000c}) 10:16:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x80003, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f00000000c0)={0x2, 0x1, 0x0, 0x475c8283, 0x0, 0x5f7}) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000200007041dfffd946f610500020000251f000003002808000500100004000300280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 10:16:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000300)={0x1, 0x5, 0x1000, 0xca, &(0x7f0000000040)="7b194bcb9f34c013fa5939a0425853012ca42fc138cee86ba7f41ae2f363adc3c52635f7c35c64fc19e65fbd688671002d4a73f0384d654df57ba234be0c8cfdd1c025fb15f33dbbb1d5d9ba8e0bfec4ceb2907fb36de5d0ec5a2e2be03642f271671b8e35ccab030de04e1a88fa4ec7af7c0b8b1e6ac12da2a5376e30c93a38fa556ae76c01965fccbdb26e76c0628764b6a902b0c5573012f1766582199c48d604cc63818b081737cfbd41d5b899a9ce247446e8390e3955ceda2d48f67af8ed71f80cda36098fc019", 0xd5, 0x0, &(0x7f0000000140)="c94090a1dadacd1b4adfaf65ab35c191abb5c851e75b1fdf955846ecfea61dce6cf2971b54dc44d59516b036b38751738565aecb5e41e3af1040cea8e0c16bebcd5cb41dc3c3f1dfca4653329f1c5202a12b8bac1d56ea194b21b4670206749acbddb17536e9b63f819093250d2286046af6ade26720f0adf49ec620d861b67fbc69dc20be24ab6b6886aa62107d00ca35dd8703b359d2a5cfecdf046390257b6e34c74d686b73ab2395f8002cafaea58896d550a7f71ad2d6de5b71a47c554bdddd77d42d581e2a78d25e4e14a5699c7b714f1bcf"}) r1 = syz_open_dev$rtc(&(0x7f0000000280)='/dev/rtc#\x00', 0x0, 0x400000) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000380)={0x37, 0x26, 0x12, 0x4, 0x7, 0x0, 0x2, 0x73, 0xffffffffffffffff}) setxattr$security_ima(&(0x7f0000000440)='./file0\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0xa, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x20007, 0x0) 10:16:14 executing program 2 (fault-call:1 fault-nth:0): r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:16:14 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xa00) [ 558.034391][T18068] FAULT_INJECTION: forcing a failure. [ 558.034391][T18068] name failslab, interval 1, probability 0, space 0, times 0 [ 558.144120][T18068] CPU: 1 PID: 18068 Comm: syz-executor.2 Not tainted 5.3.0-rc6-next-20190827 #74 [ 558.153273][T18068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 558.163430][T18068] Call Trace: [ 558.166752][T18068] dump_stack+0x172/0x1f0 [ 558.171099][T18068] should_fail.cold+0xa/0x15 [ 558.175831][T18068] ? fault_create_debugfs_attr+0x180/0x180 [ 558.181685][T18068] ? ___might_sleep+0x163/0x280 [ 558.186556][T18068] __should_failslab+0x121/0x190 [ 558.191510][T18068] should_failslab+0x9/0x14 [ 558.196031][T18068] kmem_cache_alloc_node+0x268/0x740 [ 558.201423][T18068] __alloc_skb+0xd5/0x5e0 [ 558.205768][T18068] ? netdev_alloc_frag+0x1b0/0x1b0 [ 558.210933][T18068] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 558.217368][T18068] ? netlink_autobind.isra.0+0x228/0x310 [ 558.223104][T18068] netlink_sendmsg+0x972/0xd60 [ 558.227882][T18068] ? netlink_unicast+0x710/0x710 [ 558.232999][T18068] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 558.238564][T18068] ? apparmor_socket_sendmsg+0x2a/0x30 [ 558.244045][T18068] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 558.250314][T18068] ? security_socket_sendmsg+0x8d/0xc0 [ 558.255962][T18068] ? netlink_unicast+0x710/0x710 [ 558.260911][T18068] sock_sendmsg+0xd7/0x130 [ 558.265344][T18068] ___sys_sendmsg+0x803/0x920 [ 558.270043][T18068] ? copy_msghdr_from_user+0x440/0x440 [ 558.275608][T18068] ? __kasan_check_read+0x11/0x20 [ 558.280669][T18068] ? __fget+0x384/0x560 [ 558.284837][T18068] ? ksys_dup3+0x3e0/0x3e0 [ 558.289275][T18068] ? __fget_light+0x1a9/0x230 [ 558.293957][T18068] ? __fdget+0x1b/0x20 [ 558.298036][T18068] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 558.304386][T18068] __sys_sendmsg+0x105/0x1d0 [ 558.308993][T18068] ? __sys_sendmsg_sock+0xd0/0xd0 [ 558.314044][T18068] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 558.319947][T18068] ? do_syscall_64+0x26/0x760 [ 558.324639][T18068] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 558.330711][T18068] ? do_syscall_64+0x26/0x760 [ 558.335398][T18068] __x64_sys_sendmsg+0x78/0xb0 [ 558.340268][T18068] do_syscall_64+0xfa/0x760 [ 558.344789][T18068] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 558.350684][T18068] RIP: 0033:0x459879 [ 558.354675][T18068] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 558.374414][T18068] RSP: 002b:00007f77ea36fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 558.382836][T18068] RAX: ffffffffffffffda RBX: 00007f77ea36fc90 RCX: 0000000000459879 [ 558.391050][T18068] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 558.399143][T18068] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 558.407210][T18068] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f77ea3706d4 [ 558.415204][T18068] R13: 00000000004c773e R14: 00000000004dcf58 R15: 0000000000000004 10:16:15 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0xffffff19) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f00000001c0)=@gcm_128={{0x303}, "ac4c26dc476dfc2d", "bdc2a9db3dc45554c6458f9ca381c513", "696d17d0", "306a9f8b6ffa58e9"}, 0x28) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f00000000c0)={0x1, 0x3f}, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f00000003c0)={{0x401, 0x801}, {0x653, 0x406}, 0x81, 0x4, 0x8a68}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000500)="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", 0xffffffffffffff51) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) fdatasync(r1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) [ 558.446228][ T26] audit: type=1804 audit(1567160175.083:110): pid=18073 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/371/file0" dev="sda1" ino=16612 res=1 [ 558.473201][T18073] ima: Unable to reopen file for reading. [ 558.770858][T18064] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 558.789203][T18081] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 558.832702][T18081] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 10:16:15 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:16:15 executing program 2 (fault-call:1 fault-nth:1): r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:16:15 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x3f00) 10:16:15 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280), 0x4) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000000), &(0x7f00000000c0)=0xc) 10:16:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0xffffffffffffffe5) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x100, 0x50000) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x8000, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r1, 0xc040563e, &(0x7f0000000040)={0x0, 0x0, 0x100, 0x2, {0x10000, 0x20000000000003, 0x1, 0x7fff}}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x40, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x94, "b935360aeac9d8d688018b66dd6f97969cd35e74636fbc941dc7b52a0b74151d6e14ec998124bb54f8f976679958d1f1b54117158e3b51fba727ad7c31dd90cac1803a9d13a2b15cfe1a7db0a967f72086bf52181632457182b8a05b4f7569ed1f829383fc082c44ae5a01b91e21ec3c6f370d68ff07b75c1354760da7f2b4377c86c1556ebbd09ad39ac1fad2e69834c6f85910"}, &(0x7f0000000240)=0x9c) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000280)={r3, 0x40955ae2, 0x20}, &(0x7f00000002c0)=0xc) ioctl(r0, 0x800000000008982, &(0x7f0000000080)) timer_create(0x5, &(0x7f0000000300)={0x0, 0x15, 0x5}, &(0x7f0000000340)=0x0) timer_gettime(r4, &(0x7f0000000380)) [ 558.982231][T18064] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 559.022842][T18093] FAULT_INJECTION: forcing a failure. [ 559.022842][T18093] name failslab, interval 1, probability 0, space 0, times 0 [ 559.057857][T18092] ima: Unable to reopen file for reading. 10:16:15 executing program 5: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) syz_open_dev$sg(&(0x7f00000001c0)='/dev/sg#\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r2) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000140)={0xff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getresgid(0x0, 0x0, 0x0) [ 559.057883][ T26] audit: type=1804 audit(1567160175.693:111): pid=18092 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/372/file0" dev="sda1" ino=16607 res=1 [ 559.121709][T18093] CPU: 1 PID: 18093 Comm: syz-executor.2 Not tainted 5.3.0-rc6-next-20190827 #74 [ 559.130944][T18093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 559.130958][T18093] Call Trace: [ 559.130983][T18093] dump_stack+0x172/0x1f0 [ 559.131007][T18093] should_fail.cold+0xa/0x15 [ 559.154216][T18093] ? fault_create_debugfs_attr+0x180/0x180 [ 559.160015][T18093] ? ___might_sleep+0x163/0x280 [ 559.164858][T18093] __should_failslab+0x121/0x190 [ 559.169787][T18093] should_failslab+0x9/0x14 [ 559.174283][T18093] kmem_cache_alloc_node_trace+0x274/0x750 [ 559.180098][T18093] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 559.186085][T18093] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 559.191884][T18093] __kmalloc_node_track_caller+0x3d/0x70 [ 559.197689][T18093] __kmalloc_reserve.isra.0+0x40/0xf0 [ 559.203143][T18093] __alloc_skb+0x10b/0x5e0 [ 559.207553][T18093] ? netdev_alloc_frag+0x1b0/0x1b0 [ 559.212665][T18093] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 559.218896][T18093] ? netlink_autobind.isra.0+0x228/0x310 [ 559.224528][T18093] netlink_sendmsg+0x972/0xd60 [ 559.229306][T18093] ? netlink_unicast+0x710/0x710 [ 559.234274][T18093] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 559.239901][T18093] ? apparmor_socket_sendmsg+0x2a/0x30 [ 559.245350][T18093] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 559.251579][T18093] ? security_socket_sendmsg+0x8d/0xc0 [ 559.257033][T18093] ? netlink_unicast+0x710/0x710 [ 559.261965][T18093] sock_sendmsg+0xd7/0x130 [ 559.266387][T18093] ___sys_sendmsg+0x803/0x920 [ 559.271059][T18093] ? copy_msghdr_from_user+0x440/0x440 [ 559.276687][T18093] ? __kasan_check_read+0x11/0x20 [ 559.281730][T18093] ? __fget+0x384/0x560 [ 559.285876][T18093] ? ksys_dup3+0x3e0/0x3e0 [ 559.290296][T18093] ? __fget_light+0x1a9/0x230 [ 559.294964][T18093] ? __fdget+0x1b/0x20 [ 559.299040][T18093] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 559.305546][T18093] __sys_sendmsg+0x105/0x1d0 [ 559.310129][T18093] ? __sys_sendmsg_sock+0xd0/0xd0 [ 559.315144][T18093] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 559.321237][T18093] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 559.326688][T18093] ? do_syscall_64+0x26/0x760 [ 559.331356][T18093] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 559.337409][T18093] ? do_syscall_64+0x26/0x760 [ 559.342089][T18093] __x64_sys_sendmsg+0x78/0xb0 [ 559.346845][T18093] do_syscall_64+0xfa/0x760 [ 559.351345][T18093] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 559.357232][T18093] RIP: 0033:0x459879 [ 559.361205][T18093] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 559.380975][T18093] RSP: 002b:00007f77ea36fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 559.389567][T18093] RAX: ffffffffffffffda RBX: 00007f77ea36fc90 RCX: 0000000000459879 [ 559.397528][T18093] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 559.405489][T18093] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 559.413589][T18093] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f77ea3706d4 [ 559.421636][T18093] R13: 00000000004c773e R14: 00000000004dcf58 R15: 0000000000000004 10:16:16 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x4000) 10:16:16 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000080)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0xbeb554514e165e6b, 0x3, 0x1, 0x553166f505173a82, 0x2}}) 10:16:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0xffffffffffffffe5) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x100, 0x50000) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x8000, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r1, 0xc040563e, &(0x7f0000000040)={0x0, 0x0, 0x100, 0x2, {0x10000, 0x20000000000003, 0x1, 0x7fff}}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x40, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x94, "b935360aeac9d8d688018b66dd6f97969cd35e74636fbc941dc7b52a0b74151d6e14ec998124bb54f8f976679958d1f1b54117158e3b51fba727ad7c31dd90cac1803a9d13a2b15cfe1a7db0a967f72086bf52181632457182b8a05b4f7569ed1f829383fc082c44ae5a01b91e21ec3c6f370d68ff07b75c1354760da7f2b4377c86c1556ebbd09ad39ac1fad2e69834c6f85910"}, &(0x7f0000000240)=0x9c) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000280)={r3, 0x40955ae2, 0x20}, &(0x7f00000002c0)=0xc) ioctl(r0, 0x800000000008982, &(0x7f0000000080)) timer_create(0x5, &(0x7f0000000300)={0x0, 0x15, 0x5}, &(0x7f0000000340)=0x0) timer_gettime(r4, &(0x7f0000000380)) 10:16:16 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:16:16 executing program 2 (fault-call:1 fault-nth:2): r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:16:16 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(r0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x4c, 0x8000) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0xc0505350, &(0x7f0000000100)={{0x0, 0x6}, {0x200000000000, 0x7}, 0x66a4, 0x2, 0x8}) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 559.842274][T18114] FAULT_INJECTION: forcing a failure. [ 559.842274][T18114] name failslab, interval 1, probability 0, space 0, times 0 [ 559.922254][T18114] CPU: 0 PID: 18114 Comm: syz-executor.2 Not tainted 5.3.0-rc6-next-20190827 #74 [ 559.931495][T18114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 559.941577][T18114] Call Trace: [ 559.945010][T18114] dump_stack+0x172/0x1f0 [ 559.949368][T18114] should_fail.cold+0xa/0x15 [ 559.954079][T18114] ? fault_create_debugfs_attr+0x180/0x180 [ 559.960019][T18114] __should_failslab+0x121/0x190 [ 559.964989][T18114] should_failslab+0x9/0x14 [ 559.969514][T18114] kmem_cache_alloc+0x47/0x710 [ 559.971745][ T26] audit: type=1804 audit(1567160176.603:112): pid=18117 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/373/file0" dev="sda1" ino=16604 res=1 [ 559.974297][T18114] ? lock_acquire+0x190/0x410 [ 559.974330][T18114] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 559.974349][T18114] skb_clone+0x154/0x3d0 [ 559.974371][T18114] netlink_deliver_tap+0x94d/0xbf0 [ 559.974394][T18114] netlink_unicast+0x5a2/0x710 [ 559.974411][T18114] ? netlink_attachskb+0x7c0/0x7c0 [ 559.974427][T18114] ? _copy_from_iter_full+0x25d/0x8c0 [ 559.974440][T18114] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 559.974456][T18114] ? __check_object_size+0x3d/0x437 [ 559.974474][T18114] netlink_sendmsg+0x8a5/0xd60 [ 560.000872][T18117] ima: Unable to reopen file for reading. [ 560.004060][T18114] ? netlink_unicast+0x710/0x710 [ 560.004079][T18114] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 560.004097][T18114] ? apparmor_socket_sendmsg+0x2a/0x30 [ 560.004115][T18114] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 560.004131][T18114] ? security_socket_sendmsg+0x8d/0xc0 [ 560.004143][T18114] ? netlink_unicast+0x710/0x710 [ 560.004169][T18114] sock_sendmsg+0xd7/0x130 [ 560.093857][T18114] ___sys_sendmsg+0x803/0x920 [ 560.098664][T18114] ? copy_msghdr_from_user+0x440/0x440 [ 560.104285][T18114] ? __kasan_check_read+0x11/0x20 [ 560.109333][T18114] ? __fget+0x384/0x560 [ 560.113606][T18114] ? ksys_dup3+0x3e0/0x3e0 [ 560.118060][T18114] ? __fget_light+0x1a9/0x230 10:16:16 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000500)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r1, 0x13) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) sched_setparam(0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000000c0)=@ipx, 0x80, 0x0}}], 0x3fffffffffffe7e, 0x0, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000180)='uid_map\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) [ 560.122849][T18114] ? __fdget+0x1b/0x20 [ 560.126937][T18114] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 560.133198][T18114] __sys_sendmsg+0x105/0x1d0 [ 560.133213][T18114] ? __sys_sendmsg_sock+0xd0/0xd0 [ 560.133245][T18114] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 560.133258][T18114] ? do_syscall_64+0x26/0x760 [ 560.133274][T18114] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 560.133287][T18114] ? do_syscall_64+0x26/0x760 [ 560.133305][T18114] __x64_sys_sendmsg+0x78/0xb0 [ 560.133322][T18114] do_syscall_64+0xfa/0x760 [ 560.133345][T18114] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 560.133357][T18114] RIP: 0033:0x459879 [ 560.133377][T18114] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 560.143001][T18114] RSP: 002b:00007f77ea36fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 560.143017][T18114] RAX: ffffffffffffffda RBX: 00007f77ea36fc90 RCX: 0000000000459879 10:16:16 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x4800) 10:16:16 executing program 0: r0 = fsopen(&(0x7f0000000180)='nfsd\x00', 0x3) fsconfig$FSCONFIG_SET_FLAG(r0, 0x5, &(0x7f0000000100)='s\xf7ZM\xc6,\x0f <~msnt\x00', 0x0, 0x5) [ 560.143025][T18114] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 560.143035][T18114] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 560.143043][T18114] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f77ea3706d4 [ 560.143051][T18114] R13: 00000000004c773e R14: 00000000004dcf58 R15: 0000000000000004 10:16:17 executing program 0: r0 = getuid() setreuid(0x0, r0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000580)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000340)={&(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001680)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYRESDEC=r2, @ANYRESHEX=r2, @ANYBLOB="d17df0c1975f98a2707a9aaa9a98e3360dbe68e617c42c5fc74ef056496897cab72a60b6db38d9d632a97e7e6852efc7e2139b179c9c988f8d935e31298dd2e0d7507ab91e1f48a5e4b9d223104342423e9bd1f5feb983627505fac77cb6b5cd3c0c4de5f592da269de0e2a85bdd8ca74f8b62eeb9a819642f04f005c088a6796f3bdac71839f415bb84c7b96fad146a346054ec42e0fb92d9e68f5c44c1c21afff2d2981e327564d1189192b0592b3bc71e3f1e1d0f5f40153ae3cb08ff215f5bfa953ece437c8163a7577d69fdd770c80d7aba96a3abbfa84677bd58a5d3f1b7126df284b16e5b6e8e3e3fa38e4b03caa5257c97cd407310a04278d9e648cd539b44543acb1fd0ab69e9dd7ad9f6d61381ef71daaf35136b02dac56d16114a0d9ab80f8af6a89d3e5444268e38744a5ecdaa31cc38d76a4b1a67b271b4e185abf5b530633d12661997598a0a666afae0f5552a8cbf28b24d290a22d8e88f28a19afce7d8381118c4b2ec6ba998b8378fd1fe1c5fce80095d4a2db95869edb785e1c306db2f830e29803a2d3589b8fd25a0223497d7c4d333102a8ef689ba2db183bc86a2f4391621c7b263f1d9310f8dd957a1f7a9dc2c04ea0b9faaa272dae42b2b95d4387f00e6108c1de66775f2d8c02aed3e93bccc62db40400bff43cc0726fd554c33ec97b45168cfde6041523854c5701752d81f8b8e3a45cfbc5d7954d3fd8cf592680d4df93adae0f69b4d582b4b86b8d9244e4b8c1b81184f51c657e03f1540e55184bc1fbcfd3ae3591d3819deec074623c74a4be3b466533e92f1bf5afad7f2e4ca85a6c1b362e0d84a83bf0037cc4039382a98e61e953a213c78d0b7ec892562982de7d4a5bbbb1f9de6098113ab0497d867b50936d341637062f087da5438a5b3b2dcc9960b4830cfcb21f85fa273bf10a188b263ba07698f4da0594153e07da98d05333bd238ccf8c98278bb402556af1b1b8e2f19a6a66d1bdbbf4d33d1cf7a0ce793667c374ac2664719e53eed9daf05d6164da58ce1e42eb387432732a877512a95b0ee1f6a772d5c123f3547c6c67d43aead90a07a41450bece3a38db6a9371c21eb9efaf8259794f21b9b54d37e4831c443da0156f647ee6a1ac9345b87f5a20a857eefc01ad4d29ad6b9eba4faca33dd14a30dd4102fa50c629d75a19156898b8642b1560937163cf1c71766f56bc81e9b9aabad2ce6c7143a03ec10e4a2137660f78b1034be6841919bbe39cd9b08ad41bbcd062d379e190c0a54a2d62dabdb976e488bc13e0d2153122ca3f0cd198e3b4aedcedbc581525b9db5dad8a8fb13bdca25024a85a2cae6007b92cad397280c2461606d93c66a51f3513e1b62078637c7d2de363f1af71e1bb4da2cc53aa1eccf6aeed0a3294df415c1fbc63040034bd75d89068450e81f1aeb05dc877cb88b3aa84d1cfbe9e3b4346f5de78d30a79f86c1b0081b9dace38c80b9bb9443bccb8e10d5dc50c32ac6541b55b98fd54eaaaa4ff42fb671dca8ad8501bd6336e31685c1bcc740d127e609a682584b3303bb75e5600d65f41623b576942d2090cf5a429f2aabdc35a331843024b3eea6a2ff9135f80657324dcc14283a5c71bd958fb048516814fe7e8277ed42f5ed5706e82415ea3e47158b20522d1bed21105f41ebadda7c809807f846f7f728978fcdf11b2338519bc5b81f9cd6ed04718e19a8f7ec627b1a3c8f540b6214c0b2a73de3c843ff477714da16568a2aa6d06b3d5a782b434026c7f54c57c0678d098ed0ad340039baf29b89f068d4d29d4fe2a4be5340ecd7a6de923b00979492e1bbb78ac306a1179f74a423da8b1f78021b5fc0462d2fcbe3daeae0b55bfbc6a327aa3802d9d33b2369a868b3f1ca5b8fa522f3378b3422e33eb403da56fd52e8f8e6d236ef39ea2452115d2ed06c009cfae1935cef26a61851d8bab16b1fcc4a417c6d553bc5c240cf513f8657ae6de4b3e97d00e82b3ff5c24d17016faf30fe7b42147f7063253bafd4376d1be70d29cb6ca9f6f9261ae453782996f3be7176ad96a2f342b71293bd8acf0faced63f0b62a679cc9501f19afffbc0bacbb8f18e8ef1033082120e35cce2a124430afc860e8f8b0ce7136e69020e46af8615751ab03aca303ec814d481b0879fab135a797c91b9b02dbfe3b44f726a542ac7b98629f6ee3568a717a71c592b79262672a09c7dcec247335dd0ac5987519a682808953279324636ee6dbf905949088c00144147aa2f1a97664715dbd2aafb8fa9b93f1f950c191b973cb5eceefe03284cea183217b830c34d4070745cd8cb8fa30439967540cf84143c535643a6a27b30f060c0a7e2a1715856a95a55bdb113d42335e93cdf417e2b0d26afa9d022d1366e291c7d53c38a3f76395deddf07433412c87e18e56068b0ffb772d9f2b20de024607d9421eed934836ee0eff3460dc0993b5bc9d94d0a852677c14e446082c4dad77a0598571351e61de451855391d06ce490c0e9b0db84c71b1721186e68367b1edee5a7e806d1955406100702248c57488e53fd35476c4f46394fd93461e0ab10a975a46d1a5ae09c5d0f5cb52150f67ed9020eb6bea49b8201b22a0bf77edbee3cc52d6658a35dc2850c6fc1d914ed2f2487adcab9b12ed61c691fd4c07dc3f51453a3d98389805065e6684731440862b47271d9baba9792be1d0ed05bb168f04e09584d8dc1c2da5ebc03531cadbba3e0ee451663b7e2dd248972536a0e36426951f0117fb2164d545519a54150b4db4c8b70f265cf608c0c4ae4af1102d22bfe3d1b4fd1fdde7b52899bef86b1f7fb45d1407e02e6299767566aea1458ff210b5a4c9d3c56a9f7f7d84947707a890c1f610bcabace5f3994c61006363e872773f0634b6f20cc59a4866cff85c30fe53e0301190132aa325500dedd412feefdc25ae8ff26d26c4b06f40b9225f06f9c13e9f7b66b5027c34d715257a1a76f7609e5f9122517b6a9c8b1484f71122f06a86cf3e58b3d250e4a14a7732c42918ee8d4b55dbe7e00a1406083e78e4697cad359bc5af13a95d97bef1c9ec9d1e0863186b9b5279b56e11a1fa776f854469b79705f9f2bfb815333a7b49f6330fef34e1008dc8caaddcebfdf84f20d134d45d7756b1bb8ac67f33c525841f23b78f6e2f4cc344fa63fe4e8e5066442253c78a14efc9f640e4134cf093c07208712b8a32882c1c6698f83fd15077ece378ed86ddaabcab8497d49a1c7fb1a7ddea3a5897324960a20f7bd1763cd534a48f705406960cbfc5ed84f23a7387aefba337d896fe1ea5d84a19b224856ec9dda6b3ac79b97e3845d5a3d895b549e5700c7e9a1ac411b18516e0c14c2d4f4381e9bf046e3a6c4a6ec32cddae12fa075fc210dfc5044fab710813b2e4126dc0f739b2fd2d609fcc9fdb439e11994f5d82967413087b6c6a5d1c6e2d8d8943dffb050c988304d7859c31d68a3441baee5c432835096e6a83289be066f93798db45050138aebeab29dab80ea27cfa4457fd11851998b5efe9538fcddd9a4998985faae2d6964ce76fed738fdf1e7b56225bb257a81f98c7a6126e8afe0d26c58b4dc2b03a6e84ee689b946b41d6f78718cf489f83a5dfc1b7cde86d1aebb7d4c7b32b9f0210a659a556abd03f80c12ee562c74f5325bb932b9dada3ac8cf86cf2cd7a5795ed9ddf4c0872c18e19d327b359d0b76951428d43a2e454205c292d518d01ce75aad76fbd9679af2d224d90b22cf461fe0aa2f05e57335d74437d0a57375e16f10fd69563d5152d63c0d2e680bfe715d7abbd530df3638cb2dfcabcae647c57b3b384e2216dd9504642b3045e55f266aaf71527290006ce619fb838cb114daeae0547c61e56788082b071695d045df38e8304999209e5cc15abbb7329c179bfbab45d640293b0278bce633536b7670dfb42319f60255b8530da95eadb66c569efad188b865e27a1c579561cf89a3df6923bfb4db915777f68392618584da4a516da569a4c7d4c1c323f70d6f77e4299cf4ed4ea530954f95e90e605503929516342efb1d310b0f993404d6a7464f904891d1aba46e500b192de91bf0a2b475694140eee11db777e70a00ed10a3cc75966a8f43712cd124a2669f88135429c4867941762b54cdb2698e8cb2c05fa6f36acf02e7c6eadefc852e92e9cc42673948f902af598e2963b216829b02dbbe2167277c43668384d9b9d7392f6854815f7d4e4645f95ec2de47c7399bf988e212c73b355f23826692b64951e316197b75a21ef23d0396e4d83deaffa18f6bf358dc73621c8c11f01ddb4141243303cc30091001ab73b92fbe6b9719583471f8efb725e189cb3223f8d9bfc123161fd9c75a450e6252771241afc637d7d156ad2bd3dccc940eddb4b2ab67cd80836a261192f1c3543d8c7983418d9e608610291d271fc0a95c3419aae06b905d8b8361434720e0c8355db5041878a65aa8f52cbcbfc74d6c5bbfa49916a2774d68535dbc96a0c01998ebe9e51cae798dee3fc91ef6d222742ff62ef87b39054bdf9805104244acf7a84e06f7de22610e1f695dddce5d11e6e987d36b7984b957b3e2e8957c14ae682cde1e87bbeeb04442379a9130277d4c3b6c94aa127fa7ef1f6f6a4123c4a49b9c84e54cdeb377b9ef049ac8e06de4330c49dfaff62a96ca87c7216e8404c1843359b6f48206818719823a26df8a62743b842605c8571aa609494cd3d00b92436f22ca2c13e0c666f36bef12af8a8ea792f0d3e3ac5b7d6a63e8f298d729b30ccd39d03d6f91ab10fc09db05d5c61bb9669334cc80faec4c16f266b807f898791f4ebe35f285dd5fd73f52da66f6e5bc598cd5ab97aada2bef733f8e2a5530f224308167cd1dafe6c55c7cfab183ef755a3e2b7fce1b1ede8170d4df5325cd4fb52b05c83c700fbc921f384db213e04165f8491015c73e61a0d3dec72f1f3c030490ffba657a61da0b70688f000b581f950df2b0ee5b66d3986c0c210a819da8a0f92f0e28af22683ec652d51026ac6b767b816a7b619d340c564dd3c1f30d4dc125ad91c688c5a99645e8989600482807c83360dbcb35f9eb9ad1b77525c05bd2fe526ddd01f3042eeb6c041f156ac5d5c5c5707565d3ec807ee19121a1b7923e87c901ce9c0cfcc65741cf1c49463f1ebd57bb8eb0c5de24b839e415d7618f729641a053aa4310be1fd21dddf97263ab333797e5c3a8e36fb0f6ad1f756948336bde7571cf72bb828caf136ae6f93fdfd8e32cdf8aae2340eb6e1ffc74d82cf1d3c17d0d6c8ba4eeaa9e0bff23df2983ced5e623ccdd9b3003627f7ea2dc159f1b0c5198cc21d756dd809e8e7c7b97b2a93a165cecc7da2d593d0f2fd014f0fb7ee30f6f67d95513518b02f33d05cdaedff1aa373deb01f033d69519bd2e54b98d635f8cdc6fbc9d5a341c20d3e9f6c5948127168fd0798c8eeb64bd347874f6264fef5f9c0f7821863c11dee2720bc877a874ed74e11273893c8fd8b3a0f75abb129423ed2fb2e11b47c20f15d4c3ec0e27cf3c655694c3f7c5d5d3ddcd7988c5b1d9c20047df606edf196e785bad0398ac1a077e405c69fae3b229703cd186756f4b88ac3aac5f5ed3a637ae1d0c39075f7ad0ef39e6948525763d1de3b669b00652ce7aabaa2d2be143e6083e4eb036904267e9b892974562a5f4879cfe6841f4d87bf12cb4da82ddd976646f35a274c6a40c62e8115a966baae3bf6e9fc84410f733fcc38d26aa53ee831f557f3f26feb12a7e465ad5f830de38c08cbaf8a4982e2a46ea8d21388198b90a0e945cf29", @ANYBLOB="b3e10907c11632b6ce6ee97c54ef6918859dbe9e50deb7015540d72e8e73e3ac66f97e43da736936c9b1304f775c1141fed2fd8d66e4cb6752f2762dc258df5c1113c192eff09c51c5395e9999ffe47f20efcdabc906bd62c05d531bc369d94f7fa237a4216443f2ed42eab6"], @ANYRESHEX=r1, @ANYRESOCT=0x0], @ANYRES16=r2, @ANYBLOB="000528bd7000fedbdf2565431bf7350c00000008000400060000001c00010008000b00736970000800050100090002006c00000008000800010001000800050000000000080002003b00000008000b0073697000080002"], 0x3}, 0x1, 0x0, 0x0, 0x44}, 0x800) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='security.capability\x00', &(0x7f0000000500)=@v3={0x3000000, [{0x7, 0x7f}, {0x3, 0x1ff}], r3}, 0x18, 0x1) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) open(&(0x7f00000000c0)='./file0\x00', 0x2003, 0x100) r6 = open(&(0x7f0000000100)='.\x00', 0x10080, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, 0x0) setsockopt$packet_drop_memb(r6, 0x107, 0x2, &(0x7f0000000540)={r5, 0x1, 0x6, @remote}, 0x10) mount(&(0x7f0000000240)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='udf\x00', 0x8, 0x0) [ 560.509263][ T26] audit: type=1804 audit(1567160177.143:113): pid=18133 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/374/file0" dev="sda1" ino=16615 res=1 [ 560.509303][T18133] ima: Unable to reopen file for reading. 10:16:17 executing program 2 (fault-call:1 fault-nth:3): r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:16:17 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = getpid() fcntl$setown(r0, 0x8, r1) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r2, 0x800455d1, &(0x7f0000000100)) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) 10:16:17 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = socket$inet(0x2, 0x200000802, 0x9) r2 = socket$l2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$l2tp(r0, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) connect$l2tp(r2, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x3, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x32) [ 560.720679][T18143] FAULT_INJECTION: forcing a failure. [ 560.720679][T18143] name failslab, interval 1, probability 0, space 0, times 0 [ 560.814564][T18143] CPU: 0 PID: 18143 Comm: syz-executor.2 Not tainted 5.3.0-rc6-next-20190827 #74 [ 560.823729][T18143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 560.833804][T18143] Call Trace: [ 560.837125][T18143] dump_stack+0x172/0x1f0 [ 560.841499][T18143] should_fail.cold+0xa/0x15 [ 560.846145][T18143] ? fault_create_debugfs_attr+0x180/0x180 [ 560.852111][T18143] ? ___might_sleep+0x163/0x280 [ 560.857027][T18143] __should_failslab+0x121/0x190 [ 560.861993][T18143] should_failslab+0x9/0x14 [ 560.866518][T18143] kmem_cache_alloc_node+0x268/0x740 [ 560.871838][T18143] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 560.878024][T18143] __alloc_skb+0xd5/0x5e0 [ 560.882394][T18143] ? netdev_alloc_frag+0x1b0/0x1b0 [ 560.887620][T18143] ? rcu_read_unlock+0x5e/0xa0 [ 560.892422][T18143] netlink_ack+0x25c/0xb50 [ 560.896872][T18143] ? netlink_sendmsg+0xd60/0xd60 [ 560.901836][T18143] ? find_held_lock+0x35/0x130 [ 560.906610][T18143] netlink_rcv_skb+0x376/0x450 [ 560.906627][T18143] ? rtnetlink_put_metrics+0x590/0x590 [ 560.906641][T18143] ? netlink_ack+0xb50/0xb50 [ 560.906657][T18143] ? __kasan_check_read+0x11/0x20 [ 560.906685][T18143] ? netlink_deliver_tap+0x254/0xbf0 [ 560.906709][T18143] rtnetlink_rcv+0x1d/0x30 [ 560.936393][T18143] netlink_unicast+0x531/0x710 [ 560.941210][T18143] ? netlink_attachskb+0x7c0/0x7c0 [ 560.946344][T18143] ? _copy_from_iter_full+0x25d/0x8c0 [ 560.951734][T18143] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 560.957476][T18143] ? __check_object_size+0x3d/0x437 [ 560.962830][T18143] netlink_sendmsg+0x8a5/0xd60 [ 560.967737][T18143] ? netlink_unicast+0x710/0x710 [ 560.972699][T18143] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 560.978373][T18143] ? apparmor_socket_sendmsg+0x2a/0x30 [ 560.983862][T18143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 560.990126][T18143] ? security_socket_sendmsg+0x8d/0xc0 [ 560.995697][T18143] ? netlink_unicast+0x710/0x710 [ 561.000843][T18143] sock_sendmsg+0xd7/0x130 [ 561.005288][T18143] ___sys_sendmsg+0x803/0x920 [ 561.009990][T18143] ? copy_msghdr_from_user+0x440/0x440 10:16:17 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x4c00) 10:16:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x2, 0x40) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000280)={0xa60, 0xf636, 0x8, 'queue1\x00', 0x3}) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x2000000000000000, 0x80, &(0x7f0000000000)=@nat={'nat\a\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x19, 0x1, 0x1b8, [0x20000080, 0x0, 0x0, 0x200000b0, 0x20000208], 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="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"]}, 0x230) [ 561.015478][T18143] ? __kasan_check_read+0x11/0x20 [ 561.020528][T18143] ? __fget+0x384/0x560 [ 561.024720][T18143] ? ksys_dup3+0x3e0/0x3e0 [ 561.029169][T18143] ? __fget_light+0x1a9/0x230 [ 561.033978][T18143] ? __fdget+0x1b/0x20 [ 561.038070][T18143] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 561.044342][T18143] __sys_sendmsg+0x105/0x1d0 [ 561.048963][T18143] ? __sys_sendmsg_sock+0xd0/0xd0 [ 561.054120][T18143] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 561.059607][T18143] ? do_syscall_64+0x26/0x760 [ 561.064314][T18143] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 561.070412][T18143] ? do_syscall_64+0x26/0x760 [ 561.075161][T18143] __x64_sys_sendmsg+0x78/0xb0 [ 561.080839][T18143] do_syscall_64+0xfa/0x760 [ 561.085374][T18143] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 561.091371][T18143] RIP: 0033:0x459879 [ 561.095287][T18143] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 561.115138][T18143] RSP: 002b:00007f77ea36fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 561.123569][T18143] RAX: ffffffffffffffda RBX: 00007f77ea36fc90 RCX: 0000000000459879 [ 561.131565][T18143] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 561.139563][T18143] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 561.147556][T18143] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f77ea3706d4 [ 561.155636][T18143] R13: 00000000004c773e R14: 00000000004dcf58 R15: 0000000000000004 [ 561.177388][T18156] xt_nfacct: accounting object `syz1' does not exists [ 561.290059][T18156] xt_nfacct: accounting object `syz1' does not exists [ 561.299064][ T26] audit: type=1804 audit(1567160177.933:114): pid=18165 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/375/file0" dev="sda1" ino=16594 res=1 [ 561.336651][T18165] ima: Unable to reopen file for reading. [ 562.676411][T18171] IPVS: ftp: loaded support on port[0] = 21 [ 562.958439][T18171] chnl_net:caif_netlink_parms(): no params data found [ 562.994515][T18171] bridge0: port 1(bridge_slave_0) entered blocking state [ 563.001857][T18171] bridge0: port 1(bridge_slave_0) entered disabled state [ 563.009854][T18171] device bridge_slave_0 entered promiscuous mode [ 563.127032][T18171] bridge0: port 2(bridge_slave_1) entered blocking state [ 563.134619][T18171] bridge0: port 2(bridge_slave_1) entered disabled state [ 563.143820][T18171] device bridge_slave_1 entered promiscuous mode [ 563.165522][T18171] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 563.177880][T18171] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 563.193780][ T7] device bridge_slave_1 left promiscuous mode [ 563.206432][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 563.253450][ T7] device bridge_slave_0 left promiscuous mode [ 563.259873][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 565.492869][ T7] device hsr_slave_0 left promiscuous mode [ 565.542573][ T7] device hsr_slave_1 left promiscuous mode [ 565.600631][ T7] team0 (unregistering): Port device team_slave_1 removed [ 565.616282][ T7] team0 (unregistering): Port device team_slave_0 removed [ 565.629589][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 565.679384][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 565.783524][ T7] bond0 (unregistering): Released all slaves [ 565.897255][T18171] team0: Port device team_slave_0 added [ 565.907664][T18171] team0: Port device team_slave_1 added [ 565.966186][T18171] device hsr_slave_0 entered promiscuous mode [ 566.022660][T18171] device hsr_slave_1 entered promiscuous mode [ 566.119614][T18171] 8021q: adding VLAN 0 to HW filter on device bond0 [ 566.135273][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 566.144651][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 566.157108][T18171] 8021q: adding VLAN 0 to HW filter on device team0 [ 566.222218][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 566.231293][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 566.240416][T15358] bridge0: port 1(bridge_slave_0) entered blocking state [ 566.247837][T15358] bridge0: port 1(bridge_slave_0) entered forwarding state [ 566.264458][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 566.278107][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 566.289266][T15358] bridge0: port 2(bridge_slave_1) entered blocking state [ 566.296456][T15358] bridge0: port 2(bridge_slave_1) entered forwarding state [ 566.311373][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 566.320476][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 566.350056][T18171] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 566.368300][T18171] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 566.390017][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 566.400060][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 566.419878][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 566.431826][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 566.448891][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 566.459734][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 566.476311][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 566.508813][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 566.521044][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 566.543510][T18171] 8021q: adding VLAN 0 to HW filter on device batadv0 10:16:23 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:16:23 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x6, 0x80000) ioctl$VIDIOC_G_JPEGCOMP(r2, 0x808c563d, &(0x7f0000000180)) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x8) bind$inet(r3, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) rmdir(&(0x7f00000000c0)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0xffffffffffffffff, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) 10:16:23 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8f714ea6ca24d8e90225863c560aeadffffff79a4f0ff00000004b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000092f7cae2c43519d69b0c941335a9e9f65b8cecd0"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x84800) accept4$bt_l2cap(r1, 0x0, &(0x7f00000000c0), 0x80000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", 0x0, 0x100}, 0x28) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000ec0), 0x4) 10:16:23 executing program 2 (fault-call:1 fault-nth:4): r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:16:23 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x258042, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, &(0x7f0000000080)={0x1, {r1, r2+30000000}, 0x5, 0x101}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)=0x0) r4 = openat$cgroup_ro(r0, &(0x7f0000000100)='rdma.current\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x9, 0x3, 0x0, 0x3f, 0x0, 0x3f, 0x20000, 0x1, 0x1, 0x3, 0x4a23, 0x9, 0x101, 0x5, 0x100000000, 0x5, 0x4, 0x4, 0x7, 0x7ff, 0x10001, 0x4, 0x400, 0x4, 0x2, 0x4, 0x1, 0x7, 0x7, 0xffff, 0x81, 0x2, 0xffffffff, 0x4, 0x0, 0x63, 0x0, 0xffffffffffffffe1, 0x3, @perf_config_ext={0x6}, 0x4000, 0xe53, 0x8, 0x2, 0x8, 0x7, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r6 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x5, 0x404201) ioctl$VIDIOC_G_EDID(r4, 0xc0285628, &(0x7f0000000240)={0x0, 0xe1, 0x341, [], &(0x7f0000000200)=0x800}) ioctl$PIO_UNIMAP(r6, 0x4b67, &(0x7f00000002c0)={0x2, &(0x7f0000000280)=[{0x8}, {0x8, 0x1}]}) r7 = add_key(&(0x7f0000000300)='id_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)="e0b4585af8d43a590014ffa47e8f4ac4f3a60a8e30106deffcda365acbf1f81dc84eb4ebf66ebb75fe7c30f02a913adb39944053f6a4188170a6a0411c3b40ddeb42050f3e7e0327efe74e73fb6d03cfb33edb8a96fa2e727f22c69332ba1b4128ded5babee213d6c52fcbe70efb79807e6d5205ddb4e8c9f885e893af1c8bb5f0debd978d2895847360a7744c8e81164556f5a4f615500edf179471fa3e6041cd6bdf583b9b1a618803f7884ab103d542f2547800d816e155cca1534ab915f397c64b76d267943d879ed2965ea680c35d389eb60909c0bc72625d913fe15b890a547eebae126ce24b4a895b23b5", 0xee, 0xfffffffffffffffa) keyctl$clear(0x7, r7) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000480)={{0xec5923f, 0x3}, 'port1\x00', 0x2, 0x40, 0x80000000, 0x400, 0xbff, 0x3, 0x6, 0x0, 0x2, 0x9}) r8 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer2\x00', 0x80, 0x0) fremovexattr(r5, &(0x7f0000000580)=@known='com.apple.FinderInfo\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000005c0)={0x0, 0x7c, "b56cc14d38e977b1e969df4687e15ebb8e68c220a7c75e62a79064d1b11a28bdc6f4811ee67b7536c987ff43750a2b17b33dc7a2e8493b89e8d9011b2050d68bdfb13a6ce344e5bbe15d9bdeb920a70b291dc046e2abeba53910fee424949776010f34660f4beea424ad1dcfd8a58ce85fd6c70b34a4da977040b035"}, &(0x7f0000000680)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, &(0x7f00000006c0)={0x9, 0x206, 0x9, 0x7, r9}, &(0x7f0000000700)=0x10) ioctl$sock_inet_SIOCGIFBRDADDR(r6, 0x8919, &(0x7f0000000740)={'syzkaller0\x00', {0x2, 0x4e24, @multicast1}}) ioctl$TIOCSRS485(r8, 0x542f, &(0x7f0000000780)={0x1, 0x5, 0x100}) setsockopt$IP_VS_SO_SET_EDITDEST(r8, 0x0, 0x489, &(0x7f00000007c0)={{0x5c, @broadcast, 0x4e24, 0x1, 'sh\x00', 0x20, 0x0, 0x76}, {@remote, 0x4e23, 0x0, 0x3, 0x2, 0x68}}, 0x44) getsockopt$netrom_NETROM_N2(r4, 0x103, 0x3, &(0x7f0000000840)=0x5, &(0x7f0000000880)=0x4) keyctl$search(0xa, r7, &(0x7f00000008c0)='cifs.idmap\x00', &(0x7f0000000900)={'syz', 0x0}, r7) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r4, 0x6, 0x21, &(0x7f0000000940)="b01b8bd1d580cd6699508a7c4c59fa97", 0x10) ioctl$PPPIOCSDEBUG(r6, 0x40047440, &(0x7f0000000980)=0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000009c0)) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000a00)) write$P9_RLERRORu(r6, &(0x7f0000000a40)={0x19, 0x7, 0x1, {{0xc, 'id_resolver\x00'}, 0xca55}}, 0x19) ptrace$poke(0x4, r3, &(0x7f0000000a80), 0x1f) accept4$ax25(r8, 0x0, &(0x7f0000000ac0), 0x80800) ioctl$TIOCGSOFTCAR(r8, 0x5419, &(0x7f0000000b00)) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, &(0x7f0000000b40)={0xa693, 0x200, 0x401, 0x6, r9}, &(0x7f0000000b80)=0x10) 10:16:23 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x6800) [ 566.882749][T18188] FAULT_INJECTION: forcing a failure. [ 566.882749][T18188] name failslab, interval 1, probability 0, space 0, times 0 [ 566.913191][T18188] CPU: 0 PID: 18188 Comm: syz-executor.2 Not tainted 5.3.0-rc6-next-20190827 #74 [ 566.922353][T18188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 566.928658][ T26] audit: type=1804 audit(1567160183.553:115): pid=18185 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/376/file0" dev="sda1" ino=16565 res=1 [ 566.932414][T18188] Call Trace: [ 566.932442][T18188] dump_stack+0x172/0x1f0 [ 566.932468][T18188] should_fail.cold+0xa/0x15 [ 566.958028][T18185] ima: Unable to reopen file for reading. [ 566.960646][T18188] ? fault_create_debugfs_attr+0x180/0x180 10:16:23 executing program 4: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000180)={0x3f}, 0x8, 0x800) fcntl$getown(r0, 0x9) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @rand_addr="ffd722dce20f92597102784bad12b4ec"}, {0x2, 0x0, 0xffffffffffffffff, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000, 0xfd000000]}}, r2}}, 0x48) r3 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x101, 0x182) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000080)=0x81) 10:16:23 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x6c00) [ 566.960677][T18188] ? ___might_sleep+0x163/0x280 [ 566.985944][T18188] __should_failslab+0x121/0x190 [ 566.990909][T18188] should_failslab+0x9/0x14 [ 566.995529][T18188] kmem_cache_alloc_node_trace+0x274/0x750 [ 567.001351][T18188] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 567.007350][T18188] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 567.013309][T18188] __kmalloc_node_track_caller+0x3d/0x70 [ 567.018971][T18188] __kmalloc_reserve.isra.0+0x40/0xf0 [ 567.024380][T18188] __alloc_skb+0x10b/0x5e0 [ 567.028851][T18188] ? netdev_alloc_frag+0x1b0/0x1b0 [ 567.033988][T18188] ? rcu_read_unlock+0x5e/0xa0 [ 567.038773][T18188] netlink_ack+0x25c/0xb50 [ 567.043220][T18188] ? netlink_sendmsg+0xd60/0xd60 [ 567.043238][T18188] ? find_held_lock+0x35/0x130 [ 567.043258][T18188] netlink_rcv_skb+0x376/0x450 [ 567.057904][T18188] ? rtnetlink_put_metrics+0x590/0x590 [ 567.063378][T18188] ? netlink_ack+0xb50/0xb50 [ 567.063395][T18188] ? __kasan_check_read+0x11/0x20 [ 567.063416][T18188] ? netlink_deliver_tap+0x254/0xbf0 [ 567.063447][T18188] rtnetlink_rcv+0x1d/0x30 [ 567.082744][T18188] netlink_unicast+0x531/0x710 [ 567.087748][T18188] ? netlink_attachskb+0x7c0/0x7c0 [ 567.092876][T18188] ? _copy_from_iter_full+0x25d/0x8c0 [ 567.098274][T18188] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 567.104002][T18188] ? __check_object_size+0x3d/0x437 [ 567.109599][T18188] netlink_sendmsg+0x8a5/0xd60 [ 567.114393][T18188] ? netlink_unicast+0x710/0x710 [ 567.119355][T18188] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 567.124935][T18188] ? apparmor_socket_sendmsg+0x2a/0x30 10:16:23 executing program 4: r0 = dup(0xffffffffffffffff) getsockopt$sock_buf(r0, 0x1, 0x3b, &(0x7f00000002c0)=""/199, &(0x7f0000000000)=0xc7) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x2, 0x4) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0xa0080) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000280)={0xa, 0x4e22, 0x0, @empty}, 0x1c) [ 567.130415][T18188] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 567.136717][T18188] ? security_socket_sendmsg+0x8d/0xc0 [ 567.142204][T18188] ? netlink_unicast+0x710/0x710 [ 567.147246][T18188] sock_sendmsg+0xd7/0x130 [ 567.151823][T18188] ___sys_sendmsg+0x803/0x920 [ 567.156525][T18188] ? copy_msghdr_from_user+0x440/0x440 [ 567.162362][T18188] ? __kasan_check_read+0x11/0x20 [ 567.167496][T18188] ? __fget+0x384/0x560 [ 567.171687][T18188] ? ksys_dup3+0x3e0/0x3e0 [ 567.176131][T18188] ? __fget_light+0x1a9/0x230 [ 567.181363][T18188] ? __fdget+0x1b/0x20 [ 567.185453][T18188] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 567.191708][T18188] __sys_sendmsg+0x105/0x1d0 [ 567.196297][T18188] ? __sys_sendmsg_sock+0xd0/0xd0 [ 567.196327][T18188] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 567.196342][T18188] ? do_syscall_64+0x26/0x760 [ 567.196357][T18188] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 567.196375][T18188] ? do_syscall_64+0x26/0x760 [ 567.222779][T18188] __x64_sys_sendmsg+0x78/0xb0 [ 567.227572][T18188] do_syscall_64+0xfa/0x760 10:16:23 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xcb, 0x0, 0x0, 0x0, 0x4}) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0x10305}, 0xfffffee2) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0x4}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000200)=[{&(0x7f0000000000)="fb", 0x1}], 0x1, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) ioctl$sock_bt_bnep_BNEPCONNDEL(r4, 0x400442c9, &(0x7f0000000180)={0x6}) ioctl$RTC_UIE_OFF(r4, 0x7004) ioctl$sock_SIOCGIFCONF(r3, 0x8912, &(0x7f0000000140)=@req={0x28, &(0x7f0000000100)={'veth0_to_hsr\x00', @ifru_settings={0x20, 0x860, @raw_hdlc=&(0x7f00000000c0)={0x3, 0x9}}}}) accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r4, 0x400448c8, &(0x7f0000000340)={r3, r1, 0x6ed, 0xd0, &(0x7f0000000240)="887b750705fa704754c8f36da46f15d1275f2a298cf24310b35dd5cd2271f54efe1e0ba715cf209c8cfa6ad7f2d43fd508b34fe6de1fd3db6e405a7daa192254915b35ec87a6f0b0ab15d08b87587ff89f6e974d8ad01370d3082787bc2459551ec87c4aa6017fba577ef270f9f511e9266b6c1ca546a8076e42e191170b260ecdba4082eb8bde495de159a21dfce7c220d663c1ce10eabeaca777fef525b5442615d9a6c5b33bee23c3f8928d83e8486639ee62ea9cf377349fe047b391784f234408fa280841c398554bf40ae2cdcf", 0x3f, 0x1, 0x6, 0x8, 0x4, 0x3, 0x77, 'syz0\x00'}) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4030000006e", 0x10) splice(r3, 0x0, r5, 0x0, 0x80000001, 0xd) [ 567.232104][T18188] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 567.238020][T18188] RIP: 0033:0x459879 [ 567.241928][T18188] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 567.261776][T18188] RSP: 002b:00007f77ea36fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 567.270209][T18188] RAX: ffffffffffffffda RBX: 00007f77ea36fc90 RCX: 0000000000459879 10:16:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1800"/20, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 567.278213][T18188] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 567.286237][T18188] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 567.294261][T18188] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f77ea3706d4 [ 567.302293][T18188] R13: 00000000004c773e R14: 00000000004dcf58 R15: 0000000000000004 10:16:24 executing program 5: r0 = socket$kcm(0x2, 0x27, 0x73) recvmsg(r0, 0x0, 0x0) recvmsg$kcm(r0, 0x0, 0x100) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x263) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000680)=""/144, 0x90}, {&(0x7f0000000800)=""/164, 0xa4}, {0x0}, {&(0x7f0000000ac0)=""/243, 0xf3}, {&(0x7f0000000bc0)=""/144, 0x90}], 0x5}, 0x40) write$cgroup_subtree(r2, 0x0, 0xfffffffffffffded) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0xe6, 0x0, 0x7, 0x800, 0x109, 0x0, 0x100000001, 0x0, 0x10000000000, 0x373a, 0x0, 0x1000, 0x9, 0x0, 0x0, 0x3, 0x0, 0x2, 0xab6, 0x0, 0x7, 0x2, 0x8000, 0x0, 0x1, 0x0, 0x20, 0x3, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7, 0x4, @perf_config_ext={0x800, 0x8}, 0x6500, 0x0, 0x400, 0x2, 0x40, 0x400, 0x3}, 0xffffffffffffffff, 0x0, r2, 0x8) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000dc0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0xfff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8001, 0x0, 0x0, 0x852, 0x221, 0xff, 0x400, 0x3ff, 0x1000, 0x1f, 0x81, 0x0, 0x100000000, 0x4, 0x0, 0x0, 0x5, 0xc000000000000000, 0x2, 0x68, 0x8, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x2, @perf_bp={0x0, 0x4}, 0x7ac77124c03fff49, 0x9, 0x1f, 0x5, 0xff, 0x6, 0x6}, r5, 0x8, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="51c880468d1dfd8580feb0818202a38b627a2ab693fa9326fc390a2bd9f50a43b9cc50c82288ecda9cb3be39747d90d2a384ba1c4ef0f3175c38779c7cc8f17acb1fb6847b088b459547b5e4f086552bcf15ca07c6d21c275034d3e9fbe0abfb40b9667eec8139dc77af97a3c525b1"], 0x6f) write$cgroup_pid(r4, &(0x7f0000000280), 0x12) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000400)=r5, 0x4) mmap$perf(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000000, 0x10010, r5, 0x0) ioctl$CAPI_GET_FLAGS(r2, 0x80044323, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={r5, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000540)={0x9, 0x4}, 0x0, 0x0, &(0x7f0000000580)={0x3, 0x8, 0x0, 0x2}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0x9}}, 0x10) write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)=0x1000) write$cgroup_pid(r4, &(0x7f0000000000), 0xfffffea6) write$cgroup_subtree(r5, &(0x7f00000003c0)={[{0x0, 'rdma'}]}, 0x6) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000d80)={r4, r3}) socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x9, 0x80000000, 0x800, 0x172, 0x0, 0x100, 0x4000, 0xc, 0x0, 0x400, 0x0, 0xffffffff, 0x0, 0x1ff, 0x0, 0x81, 0x7, 0x80000000, 0x1ff, 0xf4, 0x40, 0xeb, 0x0, 0x100000000, 0x3, 0x1, 0x7, 0x355, 0x0, 0x6, 0x7, 0x0, 0x8, 0x0, 0x7fff, 0x6, 0x0, 0x83, 0x2, @perf_bp={0x0}, 0x100, 0xc010, 0x0, 0x3, 0xd55b, 0x6, 0x7}, 0x0, 0x3, 0xffffffffffffffff, 0x0) [ 567.430645][ T26] audit: type=1804 audit(1567160184.063:116): pid=18207 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/377/file0" dev="sda1" ino=16633 res=1 [ 567.430661][T18207] ima: Unable to reopen file for reading. 10:16:25 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r0, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:16:25 executing program 2 (fault-call:1 fault-nth:5): r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:16:25 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x7400) 10:16:25 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000040)={0x6, 0x10, [0x101, 0xfffffffffffffffc, 0x400e800000, 0x100]}) sysfs$3(0x3) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001140)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) 10:16:25 executing program 5: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf74, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x9, 0xffffffffffff8001, 0x0, 0x0, 0x0, 0x0, 0x59, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x627, 0x5, 0x400, 0x0, 0x1, 0x0, 0x8, 0x3, @perf_bp={&(0x7f0000000180), 0x2}, 0x0, 0x0, 0x5, 0x3, 0x6, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setreuid(0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) r2 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x10001, 0x80) ioctl$VIDIOC_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f0000000280)={0x0, 0x0, [], @bt={0x3bd, 0x800, 0xd8, 0x3, 0x80000001, 0x100000001, 0x4, 0x7}}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) 10:16:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r2 = accept$alg(r0, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000040)={0x0, 0x4, 0x100, 0x10000}) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x10128) recvmmsg(r2, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000000680)=""/120, 0x78}, {&(0x7f0000000300)=""/230, 0xffffff6f}], 0x3}}], 0x1, 0x0, &(0x7f0000008bc0)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000700)="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", 0x1000) [ 568.471479][T18234] FAULT_INJECTION: forcing a failure. [ 568.471479][T18234] name failslab, interval 1, probability 0, space 0, times 0 [ 568.478475][T18235] ima: Unable to reopen file for reading. [ 568.484836][ T26] audit: type=1804 audit(1567160185.113:117): pid=18235 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/378/file0" dev="sda1" ino=16660 res=1 [ 568.523215][T18234] CPU: 0 PID: 18234 Comm: syz-executor.2 Not tainted 5.3.0-rc6-next-20190827 #74 [ 568.532449][T18234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 568.542957][T18234] Call Trace: [ 568.546279][T18234] dump_stack+0x172/0x1f0 [ 568.550640][T18234] should_fail.cold+0xa/0x15 [ 568.555260][T18234] ? fault_create_debugfs_attr+0x180/0x180 [ 568.561291][T18234] __should_failslab+0x121/0x190 [ 568.566621][T18234] should_failslab+0x9/0x14 [ 568.571148][T18234] kmem_cache_alloc+0x47/0x710 [ 568.576128][T18234] ? lock_acquire+0x190/0x410 [ 568.580843][T18234] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 568.587237][T18234] skb_clone+0x154/0x3d0 [ 568.591679][T18234] netlink_deliver_tap+0x94d/0xbf0 [ 568.597249][T18234] __netlink_sendskb+0x62/0xc0 [ 568.602037][T18234] netlink_unicast+0x60a/0x710 [ 568.606825][T18234] ? netlink_attachskb+0x7c0/0x7c0 [ 568.612050][T18234] netlink_ack+0x607/0xb50 [ 568.616589][T18234] ? netlink_sendmsg+0xd60/0xd60 [ 568.621663][T18234] ? find_held_lock+0x35/0x130 [ 568.626424][T18234] netlink_rcv_skb+0x376/0x450 [ 568.631184][T18234] ? rtnetlink_put_metrics+0x590/0x590 [ 568.637125][T18234] ? netlink_ack+0xb50/0xb50 [ 568.641729][T18234] ? __kasan_check_read+0x11/0x20 [ 568.646746][T18234] ? netlink_deliver_tap+0x254/0xbf0 [ 568.652199][T18234] rtnetlink_rcv+0x1d/0x30 [ 568.656601][T18234] netlink_unicast+0x531/0x710 [ 568.661618][T18234] ? netlink_attachskb+0x7c0/0x7c0 [ 568.666821][T18234] ? _copy_from_iter_full+0x25d/0x8c0 [ 568.672183][T18234] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 568.677889][T18234] ? __check_object_size+0x3d/0x437 [ 568.683166][T18234] netlink_sendmsg+0x8a5/0xd60 [ 568.688397][T18234] ? netlink_unicast+0x710/0x710 [ 568.693430][T18234] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 568.698990][T18234] ? apparmor_socket_sendmsg+0x2a/0x30 [ 568.705049][T18234] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 568.711723][T18234] ? security_socket_sendmsg+0x8d/0xc0 [ 568.717599][T18234] ? netlink_unicast+0x710/0x710 [ 568.722532][T18234] sock_sendmsg+0xd7/0x130 [ 568.727032][T18234] ___sys_sendmsg+0x803/0x920 [ 568.731968][T18234] ? copy_msghdr_from_user+0x440/0x440 [ 568.737425][T18234] ? __kasan_check_read+0x11/0x20 [ 568.742453][T18234] ? __fget+0x384/0x560 [ 568.746600][T18234] ? ksys_dup3+0x3e0/0x3e0 [ 568.751109][T18234] ? __fget_light+0x1a9/0x230 [ 568.755775][T18234] ? __fdget+0x1b/0x20 [ 568.759831][T18234] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 568.766059][T18234] __sys_sendmsg+0x105/0x1d0 [ 568.770633][T18234] ? __sys_sendmsg_sock+0xd0/0xd0 [ 568.775750][T18234] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 568.781195][T18234] ? do_syscall_64+0x26/0x760 [ 568.785857][T18234] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 568.792086][T18234] ? do_syscall_64+0x26/0x760 [ 568.797021][T18234] __x64_sys_sendmsg+0x78/0xb0 [ 568.801777][T18234] do_syscall_64+0xfa/0x760 [ 568.806292][T18234] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 568.812428][T18234] RIP: 0033:0x459879 [ 568.816314][T18234] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 568.835988][T18234] RSP: 002b:00007f77ea36fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 568.844731][T18234] RAX: ffffffffffffffda RBX: 00007f77ea36fc90 RCX: 0000000000459879 [ 568.852686][T18234] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 568.860656][T18234] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 10:16:25 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x7a00) 10:16:25 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r0, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) [ 568.868783][T18234] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f77ea3706d4 [ 568.876740][T18234] R13: 00000000004c773e R14: 00000000004dcf58 R15: 0000000000000004 10:16:25 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="a5055e0bcfe47bf06c0000") ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 10:16:25 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000000)={0x1}, 0x8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x0, 0x0}, 0xdc05}], 0xc6, 0x24000000) openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) 10:16:25 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) symlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000000)=0x9, 0x4) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) clone(0x34004102, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0xfffffffffffffc01, 0x200) bind$pptp(r2, &(0x7f0000000100)={0x18, 0x2, {0x1, @remote}}, 0x1e) 10:16:25 executing program 2 (fault-call:1 fault-nth:6): r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:16:25 executing program 4: perf_event_open(&(0x7f0000000400)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x80800) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) getgroups(0x2, &(0x7f0000000000)=[0xee01, 0xee00]) setregid(r2, 0x0) process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000280)=""/61, 0x144}], 0x1, &(0x7f0000002540)=[{&(0x7f00000001c0)=""/63, 0x3f}], 0x1, 0x0) 10:16:26 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:16:26 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000000)={0x1}, 0x8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x0, 0x0}, 0xdc05}], 0xc6, 0x24000000) openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) 10:16:26 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x2, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:16:26 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) [ 570.034692][T18276] ptrace attach of "/root/syz-executor.4"[8895] was attempted by "/root/syz-executor.4"[18276] [ 570.113534][ T26] audit: type=1804 audit(1567160186.753:118): pid=18279 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/379/file0" dev="sda1" ino=16548 res=1 [ 570.113540][T18279] ima: Unable to reopen file for reading. 10:16:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) 10:16:27 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xff00) [ 570.421095][T18284] device nr0 entered promiscuous mode [ 570.583327][ T26] audit: type=1804 audit(1567160187.223:119): pid=18290 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/380/file0" dev="sda1" ino=16618 res=1 [ 570.608644][T18290] ima: Unable to reopen file for reading. [ 571.434878][T18298] IPVS: ftp: loaded support on port[0] = 21 [ 571.711154][T18298] chnl_net:caif_netlink_parms(): no params data found [ 571.747060][T18298] bridge0: port 1(bridge_slave_0) entered blocking state [ 571.754571][T18298] bridge0: port 1(bridge_slave_0) entered disabled state [ 571.762980][T18298] device bridge_slave_0 entered promiscuous mode [ 571.879350][T18298] bridge0: port 2(bridge_slave_1) entered blocking state [ 571.886717][T18298] bridge0: port 2(bridge_slave_1) entered disabled state [ 571.895874][T18298] device bridge_slave_1 entered promiscuous mode [ 572.019212][T18298] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 572.030433][T18298] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 572.051917][T18298] team0: Port device team_slave_0 added [ 572.061277][T18298] team0: Port device team_slave_1 added [ 572.215176][T18298] device hsr_slave_0 entered promiscuous mode [ 572.252790][T18298] device hsr_slave_1 entered promiscuous mode [ 572.292356][T18298] debugfs: Directory 'hsr0' with parent '/' already present! [ 572.502888][T18298] 8021q: adding VLAN 0 to HW filter on device bond0 [ 572.518320][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 572.528817][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 572.537441][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 572.546644][ T7] device bridge_slave_1 left promiscuous mode [ 572.553310][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 572.593469][ T7] device bridge_slave_0 left promiscuous mode [ 572.599735][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 574.803007][ T7] device hsr_slave_0 left promiscuous mode [ 574.843553][ T7] device hsr_slave_1 left promiscuous mode [ 574.895689][ T7] team0 (unregistering): Port device team_slave_1 removed [ 574.910671][ T7] team0 (unregistering): Port device team_slave_0 removed [ 574.925339][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 574.978741][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 575.055026][ T7] bond0 (unregistering): Released all slaves [ 575.149376][T18298] 8021q: adding VLAN 0 to HW filter on device team0 [ 575.162538][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 575.171297][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 575.181538][ T2999] bridge0: port 1(bridge_slave_0) entered blocking state [ 575.188773][ T2999] bridge0: port 1(bridge_slave_0) entered forwarding state [ 575.198784][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 575.212291][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 575.221237][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 575.231911][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 575.239554][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 575.247581][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 575.262718][ T8901] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 575.285214][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 575.294946][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 575.305336][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 575.315588][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 575.324852][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 575.333631][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 575.346460][T18298] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 575.358239][T18298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 575.403414][ T8901] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 575.411506][ T8901] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 575.428857][ T8901] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 575.456354][T18298] 8021q: adding VLAN 0 to HW filter on device batadv0 10:16:32 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, &(0x7f0000000080)={{0x3, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r0, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:16:32 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x6, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:16:32 executing program 0: io_uring_setup(0xabd, &(0x7f0000000000)) 10:16:32 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0x3, 0x80000000000000, 0x100000001, 0x800}) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r0, 0xc040564a, &(0x7f0000000140)={0x0, 0x0, 0x100a, 0x0, 0x0, 0x0, 0x0, 0x1}) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x40000) recvfrom$ax25(r1, &(0x7f0000000280)=""/201, 0xc9, 0x103, &(0x7f00000000c0)={{0x3, @bcast, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) fcntl$setsig(r0, 0xa, 0x37) read(r0, &(0x7f0000000180)=""/193, 0xc1) 10:16:32 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x1000000) 10:16:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) [ 575.952805][T18313] ima: Unable to reopen file for reading. [ 575.953338][ T26] audit: type=1804 audit(1567160192.593:120): pid=18313 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/381/file0" dev="sda1" ino=16684 res=1 10:16:32 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x40141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x112, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x44000) ftruncate(r0, 0x20fffe) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000005f00)={'filter\x00', 0x1000000000000199}, 0x438) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0xfffffffffffffcbc) recvmmsg(0xffffffffffffffff, &(0x7f0000009000)=[{{0x0, 0x0, &(0x7f0000004200)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) madvise(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x9) 10:16:32 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:16:32 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x2000000) 10:16:32 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FICLONE(r0, 0x40049409, 0xffffffffffffffff) [ 576.286537][ T26] audit: type=1804 audit(1567160192.923:121): pid=18327 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/382/file0" dev="sda1" ino=16682 res=1 [ 576.324668][T18327] ima: Unable to reopen file for reading. 10:16:33 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000100)=0x10) 10:16:33 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xc, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) [ 576.907618][T18320] device nr0 entered promiscuous mode 10:16:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000040)=""/162, 0xa2}], 0x1}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000000)=""/25, 0x19}, {0x0}, {0x0}], 0x3}, 0x6) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xbf9d, 0x0, 0x0, 0x800e0053e) shutdown(r3, 0x0) readv(r2, &(0x7f0000000500)=[{0x0}, {0x0}, {&(0x7f0000000400)=""/144, 0x90}], 0x3) shutdown(r4, 0x0) shutdown(r2, 0x0) 10:16:33 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x3000000) 10:16:33 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:16:33 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) clock_gettime(0x0, &(0x7f0000000340)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000080)={{{@in=@dev, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x6, 0x40000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) r1 = socket$inet(0x10, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000480)='/dev/ubi_ctrl\x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)=r2, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001fd8)=ANY=[], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) quotactl(0x0, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f00000002c0)) ptrace$getregs(0xc, 0x0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000440), 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0x200000) getsockname$inet6(r3, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, &(0x7f0000000380)=0x1c) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 10:16:33 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xe, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:16:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) [ 577.327573][ T26] audit: type=1804 audit(1567160193.963:122): pid=18349 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/383/file0" dev="sda1" ino=16684 res=1 [ 577.327578][T18349] ima: Unable to reopen file for reading. 10:16:34 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) [ 577.397705][T18348] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 10:16:34 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x4000000) 10:16:34 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) [ 577.487167][T18358] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 10:16:34 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) [ 577.614843][ T26] audit: type=1804 audit(1567160194.253:123): pid=18366 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/384/file0" dev="sda1" ino=16670 res=1 [ 577.653094][T18366] ima: Unable to reopen file for reading. 10:16:34 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) 10:16:34 executing program 5: dup(0xffffffffffffffff) shutdown(0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000000)=""/25, 0x19}, {0x0}, {0x0}, {0x0}], 0x4}, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xbf9d, 0x0, 0x0, 0x800e0053e) shutdown(r0, 0x0) readv(r1, &(0x7f0000000600)=[{&(0x7f0000000740)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7) shutdown(r1, 0x0) [ 577.742529][T18367] device nr0 entered promiscuous mode 10:16:34 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x5000000) 10:16:34 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x60, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:16:34 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) [ 577.986997][ T26] audit: type=1804 audit(1567160194.623:124): pid=18382 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/385/file0" dev="sda1" ino=16673 res=1 [ 577.987021][T18382] ima: Unable to reopen file for reading. 10:16:34 executing program 5: 10:16:34 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x6000000) [ 578.299165][ T26] audit: type=1804 audit(1567160194.933:125): pid=18391 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/386/file0" dev="sda1" ino=16669 res=1 [ 578.331645][T18391] ima: Unable to reopen file for reading. 10:16:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) 10:16:35 executing program 5: 10:16:35 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4bc, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) [ 579.142005][T18403] device nr0 entered promiscuous mode [ 580.030294][T18406] IPVS: ftp: loaded support on port[0] = 21 [ 580.500117][T18406] chnl_net:caif_netlink_parms(): no params data found [ 580.542205][T18406] bridge0: port 1(bridge_slave_0) entered blocking state [ 580.549638][T18406] bridge0: port 1(bridge_slave_0) entered disabled state [ 580.558023][T18406] device bridge_slave_0 entered promiscuous mode [ 580.763256][T18406] bridge0: port 2(bridge_slave_1) entered blocking state [ 580.770773][T18406] bridge0: port 2(bridge_slave_1) entered disabled state [ 580.779387][T18406] device bridge_slave_1 entered promiscuous mode [ 580.801614][T18406] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 580.816090][T18406] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 581.025102][T18406] team0: Port device team_slave_0 added [ 581.033420][T18406] team0: Port device team_slave_1 added [ 581.285354][T18406] device hsr_slave_0 entered promiscuous mode [ 581.322625][T18406] device hsr_slave_1 entered promiscuous mode [ 581.756292][T18406] 8021q: adding VLAN 0 to HW filter on device bond0 [ 581.776425][ T8901] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 581.787501][ T8901] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 581.795730][ T8901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 581.968235][T18406] 8021q: adding VLAN 0 to HW filter on device team0 [ 581.986288][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 581.995467][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 582.004443][ T8892] bridge0: port 1(bridge_slave_0) entered blocking state [ 582.011517][ T8892] bridge0: port 1(bridge_slave_0) entered forwarding state [ 582.019956][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 582.029315][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 582.037983][ T8892] bridge0: port 2(bridge_slave_1) entered blocking state [ 582.045128][ T8892] bridge0: port 2(bridge_slave_1) entered forwarding state [ 582.054075][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 582.067157][ T7] device bridge_slave_1 left promiscuous mode [ 582.074406][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 582.123739][ T7] device bridge_slave_0 left promiscuous mode [ 582.129928][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 582.194357][ T7] device bridge_slave_1 left promiscuous mode [ 582.200542][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 582.243382][ T7] device bridge_slave_0 left promiscuous mode [ 582.249579][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 586.442901][ T7] device hsr_slave_0 left promiscuous mode [ 586.482360][ T7] device hsr_slave_1 left promiscuous mode [ 586.534673][ T7] team0 (unregistering): Port device team_slave_1 removed [ 586.550025][ T7] team0 (unregistering): Port device team_slave_0 removed [ 586.565447][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 586.619924][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 586.711571][ T7] bond0 (unregistering): Released all slaves [ 586.843269][ T7] device hsr_slave_0 left promiscuous mode [ 586.872297][ T7] device hsr_slave_1 left promiscuous mode [ 586.945442][ T7] team0 (unregistering): Port device team_slave_1 removed [ 586.958141][ T7] team0 (unregistering): Port device team_slave_0 removed [ 586.973887][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 587.008032][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 587.112052][ T7] bond0 (unregistering): Released all slaves [ 587.216730][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 587.235015][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 587.244037][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 587.255047][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 587.277553][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 587.285490][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 587.294466][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 587.303763][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 587.312933][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 587.326129][T18406] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 587.341404][T18406] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 587.352789][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 587.361250][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 587.384515][T18406] 8021q: adding VLAN 0 to HW filter on device batadv0 10:16:44 executing program 0: 10:16:44 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:16:44 executing program 5: 10:16:44 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x600, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:16:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) 10:16:44 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x7000000) [ 587.820675][ T26] audit: type=1804 audit(1567160204.453:126): pid=18419 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/387/file0" dev="sda1" ino=16529 res=1 10:16:44 executing program 5: 10:16:44 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x8000000) 10:16:44 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xa00, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) [ 588.090177][ T26] audit: type=1804 audit(1567160204.723:127): pid=18429 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/388/file0" dev="sda1" ino=16657 res=1 [ 588.090196][T18429] ima: Unable to reopen file for reading. 10:16:44 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xc00, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:16:44 executing program 5: 10:16:45 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xa000000) [ 588.520369][T18439] ima: Unable to reopen file for reading. [ 588.520394][ T26] audit: type=1804 audit(1567160205.153:128): pid=18439 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/389/file0" dev="sda1" ino=16529 res=1 [ 589.048985][T18424] device nr0 entered promiscuous mode [ 590.269402][T18444] IPVS: ftp: loaded support on port[0] = 21 [ 590.354325][T18444] chnl_net:caif_netlink_parms(): no params data found [ 590.399346][T18444] bridge0: port 1(bridge_slave_0) entered blocking state [ 590.407202][T18444] bridge0: port 1(bridge_slave_0) entered disabled state [ 590.415755][T18444] device bridge_slave_0 entered promiscuous mode [ 590.425140][T18444] bridge0: port 2(bridge_slave_1) entered blocking state [ 590.433319][T18444] bridge0: port 2(bridge_slave_1) entered disabled state [ 590.441739][T18444] device bridge_slave_1 entered promiscuous mode [ 590.469645][T18444] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 590.490350][T18444] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 590.513511][T18444] team0: Port device team_slave_0 added [ 590.524095][T18444] team0: Port device team_slave_1 added [ 590.585377][T18444] device hsr_slave_0 entered promiscuous mode [ 590.682573][T18444] device hsr_slave_1 entered promiscuous mode [ 590.732231][T18444] debugfs: Directory 'hsr0' with parent '/' already present! [ 590.946373][T18444] bridge0: port 2(bridge_slave_1) entered blocking state [ 590.953486][T18444] bridge0: port 2(bridge_slave_1) entered forwarding state [ 590.961448][T18444] bridge0: port 1(bridge_slave_0) entered blocking state [ 590.968613][T18444] bridge0: port 1(bridge_slave_0) entered forwarding state [ 591.117934][T18444] 8021q: adding VLAN 0 to HW filter on device bond0 [ 591.132974][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 591.141557][ T8892] bridge0: port 1(bridge_slave_0) entered disabled state [ 591.149900][ T8892] bridge0: port 2(bridge_slave_1) entered disabled state [ 591.164779][T18444] 8021q: adding VLAN 0 to HW filter on device team0 [ 591.293343][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 591.302082][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 591.310685][T15358] bridge0: port 1(bridge_slave_0) entered blocking state [ 591.317910][T15358] bridge0: port 1(bridge_slave_0) entered forwarding state [ 591.326510][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 591.336096][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 591.344670][T15358] bridge0: port 2(bridge_slave_1) entered blocking state [ 591.351906][T15358] bridge0: port 2(bridge_slave_1) entered forwarding state [ 591.359745][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 591.369341][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 591.378373][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 591.387597][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 591.398118][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 591.406271][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 591.415632][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 591.507596][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 591.516293][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 591.528454][T18444] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 591.540435][T18444] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 591.629261][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 591.638563][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 591.738457][T18444] 8021q: adding VLAN 0 to HW filter on device batadv0 10:16:48 executing program 5: clone(0x84007bf7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffffb55) r0 = getpid() mknod(&(0x7f0000000100)='./file0\x00', 0x1142, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) creat(&(0x7f0000000240)='./file0\x00', 0x0) prctl$PR_GET_TIMERSLACK(0x1e) ptrace(0x11, r0) 10:16:48 executing program 0: r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000240)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x46a, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f00000000c0)={&(0x7f0000000580)={'sha512-avx2\x00'}}) 10:16:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) 10:16:48 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x0, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:16:48 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xe00, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:16:48 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x3f000000) 10:16:48 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf00, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) [ 592.082599][ T26] audit: type=1804 audit(1567160208.693:129): pid=18460 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/390/file0" dev="sda1" ino=16703 res=1 [ 592.108659][T18460] ima: Unable to reopen file for reading. 10:16:48 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x40000000) 10:16:48 executing program 0: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) shutdown(r0, 0x2) r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) mknod$loop(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:16:48 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f00, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) [ 592.331229][T18464] device nr0 entered promiscuous mode 10:16:49 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4000, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) [ 592.445530][ T26] audit: type=1804 audit(1567160209.083:130): pid=18481 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/391/file0" dev="sda1" ino=16722 res=1 [ 592.476081][T18481] ima: Unable to reopen file for reading. [ 592.526061][T18481] ima: Unable to reopen file for reading. 10:16:49 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x48000000) [ 592.792751][ T26] audit: type=1804 audit(1567160209.433:131): pid=18489 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/392/file0" dev="sda1" ino=16717 res=1 [ 592.819465][T18489] ima: Unable to reopen file for reading. 10:16:49 executing program 5: syz_emit_ethernet(0x0, &(0x7f0000000380)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000300), 0x3) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 10:16:49 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x5865, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) [ 593.230114][ T7] device bridge_slave_1 left promiscuous mode [ 593.238658][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 593.283434][ T7] device bridge_slave_0 left promiscuous mode [ 593.290049][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 595.533044][ T7] device hsr_slave_0 left promiscuous mode [ 595.592545][ T7] device hsr_slave_1 left promiscuous mode [ 595.644961][ T7] team0 (unregistering): Port device team_slave_1 removed [ 595.658308][ T7] team0 (unregistering): Port device team_slave_0 removed [ 595.673276][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 595.752077][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 595.851140][ T7] bond0 (unregistering): Released all slaves [ 595.971823][T18505] IPVS: ftp: loaded support on port[0] = 21 [ 596.103903][T18505] chnl_net:caif_netlink_parms(): no params data found [ 596.185145][T18505] bridge0: port 1(bridge_slave_0) entered blocking state [ 596.198091][T18505] bridge0: port 1(bridge_slave_0) entered disabled state [ 596.210308][T18505] device bridge_slave_0 entered promiscuous mode [ 596.231586][T18505] bridge0: port 2(bridge_slave_1) entered blocking state [ 596.252578][T18505] bridge0: port 2(bridge_slave_1) entered disabled state [ 596.276153][T18505] device bridge_slave_1 entered promiscuous mode [ 596.374763][T18505] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 596.400537][T18505] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 596.445078][T18505] team0: Port device team_slave_0 added [ 596.455101][T18505] team0: Port device team_slave_1 added [ 596.545802][T18505] device hsr_slave_0 entered promiscuous mode [ 596.609789][T18505] device hsr_slave_1 entered promiscuous mode [ 596.715227][T18505] bridge0: port 2(bridge_slave_1) entered blocking state [ 596.722396][T18505] bridge0: port 2(bridge_slave_1) entered forwarding state [ 596.729898][T18505] bridge0: port 1(bridge_slave_0) entered blocking state [ 596.737048][T18505] bridge0: port 1(bridge_slave_0) entered forwarding state [ 596.922516][T18505] 8021q: adding VLAN 0 to HW filter on device bond0 [ 596.956768][T12604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 596.972810][T12604] bridge0: port 1(bridge_slave_0) entered disabled state [ 596.996094][T12604] bridge0: port 2(bridge_slave_1) entered disabled state [ 597.041360][T18505] 8021q: adding VLAN 0 to HW filter on device team0 [ 597.066037][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 597.075557][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 597.084341][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 597.091673][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 597.109010][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 597.118099][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 597.127015][ T8892] bridge0: port 2(bridge_slave_1) entered blocking state [ 597.134290][ T8892] bridge0: port 2(bridge_slave_1) entered forwarding state [ 597.143292][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 597.163878][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 597.173701][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 597.182875][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 597.191977][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 597.205825][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 597.218478][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 597.230674][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 597.250577][T18505] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 597.265357][T18505] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 597.280059][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 597.291653][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 597.310432][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 597.348294][T18505] 8021q: adding VLAN 0 to HW filter on device batadv0 10:16:54 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x0, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:16:54 executing program 0: unshare(0x60020000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) 10:16:54 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x4c000000) 10:16:54 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x6000, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:16:54 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000000)={0x0, 0x5, 0xa, [0x101, 0x100000000, 0x7, 0x5, 0xffff, 0x3ff, 0x7, 0x5, 0x15cd, 0x200]}, &(0x7f0000000080)=0x1c) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={r2, 0x6}, 0x8) 10:16:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) 10:16:54 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x6558, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) [ 597.664394][T18520] IPVS: ftp: loaded support on port[0] = 21 [ 597.679861][ T26] audit: type=1804 audit(1567160214.313:132): pid=18523 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/393/file0" dev="sda1" ino=16727 res=1 [ 597.706268][T18523] ima: Unable to reopen file for reading. 10:16:54 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f00000001c0)='./file0\x00') clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_WIE_ON(r0, 0x700f) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x1, 0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x4e23, 0x5, @rand_addr="cecdbc643a783f524404782cfbd2003e", 0x4800}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) r2 = socket$inet6(0xa, 0x3, 0x2f) openat(r0, &(0x7f0000000240)='./file0\x00', 0x181000, 0x1) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write(r2, 0x0, 0x0) quotactl(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) 10:16:54 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x68000000) [ 597.859062][T18525] device lo entered promiscuous mode 10:16:54 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x8100, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) [ 597.997690][ T26] audit: type=1804 audit(1567160214.633:133): pid=18541 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/394/file0" dev="sda1" ino=16650 res=1 [ 598.025278][T18541] ima: Unable to reopen file for reading. 10:16:54 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xbc04, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:16:54 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x6c000000) [ 598.267090][ T26] audit: type=1804 audit(1567160214.903:134): pid=18554 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/395/file0" dev="sda1" ino=16741 res=1 [ 598.295426][T18554] ima: Unable to reopen file for reading. [ 598.433779][T18525] IPVS: ftp: loaded support on port[0] = 21 [ 598.605898][T18529] device nr0 entered promiscuous mode 10:16:55 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x0, 0x4, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:16:57 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x10081, 0x0) syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x20, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x100, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$VIDIOC_DBG_G_CHIP_INFO(r1, 0xc0c85666, &(0x7f0000000240)={{0x4, @name="59e41cca62b0552abace84e2b3e69f069bb98c479740786295e0fe9058bfcfe7"}, "17323ad109313cb3165827b0d0face8daeb59f2e3dc15ddb00720e80f5113673", 0x1}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x800, 0x400000) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x0, 0x2) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000340)={0x0, 0x7e, "bb266f14cc57132161579bacfb0b6ae90dd9aa6fe2cd8ee57bda8d1306998132e9b0515b9e43fb6568eb3f96cc042168807ae26783548f75f492f06d6a1146bfc3505046f238d398661d95313910b9bacc74e4a08daa4d8154e81e9d44eef5018732f9d05902ff7a32c9e117db946c275b723f9dc3e6bf541c0817ef636b"}) r2 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) ioctl$EVIOCGABS2F(r2, 0x401845e0, &(0x7f0000000000)=""/38) 10:16:57 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf000, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:16:57 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x74000000) 10:16:57 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x14, &(0x7f00000000c0)={r1}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000002c0)={r1, 0x80000000, 0x20}, &(0x7f0000000300)=0xc) socket$inet_sctp(0x2, 0x5, 0x84) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25GETUID(r3, 0x89e0, &(0x7f0000000280)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, r4}) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000000)={r2}, 0x10) 10:16:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) 10:16:57 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x0, 0x8, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) [ 600.861312][ T26] audit: type=1804 audit(1567160217.493:135): pid=18569 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/396/file0" dev="sda1" ino=16725 res=1 [ 600.888124][T18569] ima: Unable to reopen file for reading. 10:16:57 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x34000, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:16:57 executing program 5: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x40, 0x0) ioctl$CAPI_GET_MANUFACTURER(r0, 0xc0044306, &(0x7f00000002c0)=0x1) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000380)=0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f00000003c0)=r5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) getpeername$inet(r2, &(0x7f0000000300)={0x2, 0x0, @multicast1}, &(0x7f0000000340)=0x10) 10:16:57 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x7a000000) 10:16:57 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400300, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:16:57 executing program 0: bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(0xffffffffffffffff, 0x10001) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=""/215, &(0x7f0000000100)=0xd7) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 601.299951][ T26] audit: type=1804 audit(1567160217.933:136): pid=18590 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/397/file0" dev="sda1" ino=16648 res=1 [ 601.326730][T18590] ima: Unable to reopen file for reading. 10:16:58 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xf6ffffff) 10:16:58 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf0ffff, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:16:58 executing program 0: mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) exit(0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='children\x00') ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000100)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x4000, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000080)={0x400}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006d00)=[{{0x0, 0x0, &(0x7f00000027c0)=[{&(0x7f00000016c0)=""/214, 0xd6}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/current\x00') preadv(r2, &(0x7f00000017c0), 0x1fe, 0x0) [ 601.686244][ T26] audit: type=1804 audit(1567160218.323:137): pid=18604 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/398/file0" dev="sda1" ino=16752 res=1 [ 601.712727][T18604] ima: Unable to reopen file for reading. 10:16:58 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x1000000, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) [ 601.771352][T18604] ima: Unable to reopen file for reading. 10:16:58 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xfeffffff) [ 602.068558][ T26] audit: type=1804 audit(1567160218.703:138): pid=18617 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/399/file0" dev="sda1" ino=16724 res=1 [ 602.096398][T18617] ima: Unable to reopen file for reading. 10:16:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) [ 602.314136][ T7] device bridge_slave_1 left promiscuous mode [ 602.321044][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 602.363811][ T7] device bridge_slave_0 left promiscuous mode [ 602.374243][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 604.672990][ T7] device hsr_slave_0 left promiscuous mode [ 604.722348][ T7] device hsr_slave_1 left promiscuous mode [ 604.807045][ T7] team0 (unregistering): Port device team_slave_1 removed [ 604.828802][ T7] team0 (unregistering): Port device team_slave_0 removed [ 604.847038][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 604.897178][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 604.984892][ T7] bond0 (unregistering): Released all slaves [ 605.109178][T18629] IPVS: ftp: loaded support on port[0] = 21 [ 605.263074][T18629] chnl_net:caif_netlink_parms(): no params data found [ 605.394658][T18629] bridge0: port 1(bridge_slave_0) entered blocking state [ 605.401995][T18629] bridge0: port 1(bridge_slave_0) entered disabled state [ 605.419120][T18629] device bridge_slave_0 entered promiscuous mode [ 605.430900][T18629] bridge0: port 2(bridge_slave_1) entered blocking state [ 605.446257][T18629] bridge0: port 2(bridge_slave_1) entered disabled state [ 605.458591][T18629] device bridge_slave_1 entered promiscuous mode [ 605.513539][T18629] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 605.526520][T18629] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 605.554502][T18629] team0: Port device team_slave_0 added [ 605.562799][T18629] team0: Port device team_slave_1 added [ 605.634595][T18629] device hsr_slave_0 entered promiscuous mode [ 605.672590][T18629] device hsr_slave_1 entered promiscuous mode [ 605.721004][T18629] bridge0: port 2(bridge_slave_1) entered blocking state [ 605.728616][T18629] bridge0: port 2(bridge_slave_1) entered forwarding state [ 605.736183][T18629] bridge0: port 1(bridge_slave_0) entered blocking state [ 605.743317][T18629] bridge0: port 1(bridge_slave_0) entered forwarding state [ 605.860546][T18629] 8021q: adding VLAN 0 to HW filter on device bond0 [ 605.891764][T12604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 605.918541][T12604] bridge0: port 1(bridge_slave_0) entered disabled state [ 605.943070][T12604] bridge0: port 2(bridge_slave_1) entered disabled state [ 605.984525][T18629] 8021q: adding VLAN 0 to HW filter on device team0 [ 606.003349][T12604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 606.011855][T12604] bridge0: port 1(bridge_slave_0) entered blocking state [ 606.019079][T12604] bridge0: port 1(bridge_slave_0) entered forwarding state [ 606.047127][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 606.057928][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 606.065187][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 606.076288][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 606.096943][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 606.106977][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 606.117334][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 606.135020][T18629] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 606.150172][T18629] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 606.161994][ T8901] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 606.208590][T18629] 8021q: adding VLAN 0 to HW filter on device batadv0 10:17:03 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0xd, 0x80001) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000280)={0x40, 0xfffffffffffffffd}) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000000)=0x800) 10:17:03 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x2000000, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:17:03 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xff000000) 10:17:03 executing program 0: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xfeffffff) 10:17:03 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x0, 0x0, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:17:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) [ 606.516165][ T26] audit: type=1804 audit(1567160223.153:139): pid=18646 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/400/file0" dev="sda1" ino=16776 res=1 [ 606.516182][T18646] ima: Unable to reopen file for reading. [ 606.607113][T18650] ima: Unable to reopen file for reading. 10:17:03 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4000000, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:17:03 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xffffff7f) 10:17:03 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f00000014c0)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/.yz1\'', 0x1ff) socket$kcm(0x29, 0x7, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f00000000c0)=0xa7) r3 = socket$kcm(0xa, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r2, 0x4, 0x7}, 0xffffff49) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890b, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x3, &(0x7f00000013c0)={'filter\x00', 0x4}, 0x68) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890c, &(0x7f0000000000)) timer_create(0x7, &(0x7f0000000200)={0x0, 0x2a, 0x3, @tid=r0}, &(0x7f0000000240)) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r6, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x13012, r6, 0x0) [ 606.641325][ T26] audit: type=1804 audit(1567160223.243:140): pid=18650 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir724857630/syzkaller.hdFHRe/7/file0" dev="sda1" ino=16763 res=1 10:17:03 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0xbd7d3f2d084a9be9, 0x42) ioctl$VIDIOC_G_ENC_INDEX(r0, 0x8818564c, &(0x7f0000000380)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0xe59b05b2737b5921, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000200)={0x6, 0x88, "089989aea5abea0e58e13ce0753f55607c12b5309e3235539ae5ecd7e0ae216b6094bf3873f95852d4d95369a7eb47333cae9e7bf1808ac75a75aa8333ed9e2447166ee1e86a05048851641dba53285db6b565f2ca291a2154c1698bcf35ef3724beab6a74b7f4fff6dbdc29979fdd09b4554d836df1d391019ef4c534e2c331e6837595db7098db"}) capset(&(0x7f0000000000)={0x24020019980330}, &(0x7f0000000140)) llistxattr(&(0x7f00000001c0)='./file0\x00', 0x0, 0x33e) 10:17:03 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x6000000, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) [ 606.897117][T18662] ima: Unable to reopen file for reading. [ 606.897153][ T26] audit: type=1804 audit(1567160223.533:141): pid=18662 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/401/file0" dev="sda1" ino=16763 res=1 10:17:03 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xfffffff6) 10:17:03 executing program 0: r0 = fsopen(&(0x7f0000000000)='sysfs\x00', 0x0) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f0000000080)={0x9, &(0x7f0000000180)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @dev}, {}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}]}) fsconfig$FSCONFIG_SET_BINARY(r0, 0x3, &(0x7f0000000140)='silent\x00', &(0x7f0000000080), 0x0) 10:17:03 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xa000000, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) [ 607.183727][ T26] audit: type=1804 audit(1567160223.823:142): pid=18674 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/402/file0" dev="sda1" ino=16773 res=1 [ 607.209609][T18674] ima: Unable to reopen file for reading. 10:17:03 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000001780)={0x10c, 0x0, &(0x7f0000001580)=ANY=[@ANYBLOB="00634040020000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000", @ANYPTR=&(0x7f0000000180)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r0, @ANYBLOB="000000000000000000000000852a646600000000", @ANYRES32=r0, @ANYBLOB="000000000000000000000000852a747001000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/17], @ANYBLOB="110000000000000002000000000000003500000000000000"], @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="0963104000000000000000000000000000000000076304400300000012634840020000000000000000000000000000000000000010000000000000000000000070000000000000001800000000000000", @ANYPTR=&(0x7f0000000400)=ANY=[@ANYBLOB="852a747001000000", @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/229], @ANYBLOB="142b0000000000000200000000af54002a00000000000000856164660000000006306f89abf3cbbf89000003000000000000000009000000852a747000000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB='\x00'/176], @ANYBLOB="b00000000000000001000000000000002300000000000000"], @ANYPTR=&(0x7f0000000480)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00(\x00\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="4004000000000000046304400300000001634040030000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000", @ANYPTR=&(0x7f00000014c0)=ANY=[@ANYBLOB="852a747000000000", @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYBLOB='\x00'/4096], @ANYBLOB="001000000000000001000000000000002b00000000000000852a62730a00000000000000000000000000000000000000852a6873000100"/72], @ANYPTR=&(0x7f0000001540)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00(\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0b6300000f630c400200"/20], 0xb0, 0x0, &(0x7f00000016c0)="abd349528b6cdc1c798c06964014333ff13bb5ae8522adcfdb5cb3e6ed38a3e1cbb4f9bdfb6f8abd430b01da4a6a628930013b4c33ca7f1e8b87dda0ee024fdc81082fb23883b1cacfe31dd789a8b1719e74546f6025a505818c6e8597938d86ae3ea4f8a63a15bb10665edf863437bb1ebebfca950d308e2dddef2280a2a69a69de6dbde29a1f269ebe3f54152d1d34e207dd59082d7785a9923f6144001ea2f45af49f90e6509fec419db643be5938"}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x4000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f00000017c0)={0x6, {{0xa, 0x4e24, 0x1, @dev={0xfe, 0x80, [], 0x13}, 0x6}}, 0x0, 0x1, [{{0xa, 0x4e23, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x33}}]}, 0x110) write$cgroup_type(r1, &(0x7f0000000000)='threaded\xa0', 0x4000) 10:17:03 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xfffffffe) 10:17:04 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xc000000, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:17:04 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x0, 0x0, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:17:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) 10:17:04 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ftruncate(r0, 0x7fff) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x11, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000000)={&(0x7f0000012000/0x2000)=nil, 0x2000}) [ 607.724747][ T26] audit: type=1804 audit(1567160224.363:143): pid=18697 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/403/file0" dev="sda1" ino=16783 res=1 [ 607.730628][T18697] ima: Unable to reopen file for reading. 10:17:04 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x800000000000006, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f00000003c0)='system.posix_acl_access\x00'}, 0x30) fcntl$setown(r0, 0x8, r1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x44000, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000480)) fsetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000040)='/dev/loop#\x00', 0xb, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/dev\x00') getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e22, @multicast1}}, 0x3, 0x4, 0x100000001, 0x8001, 0x40}, &(0x7f00000001c0)=0x98) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000200)={r4, 0x3, 0x18000000000}, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000380)={r3, &(0x7f0000000280)="255f70ec80cffc5c9e6b3d9d5b3cbc8ba0d17030486e44a40b229ce4b90194884ed95ee0b5303586ef08532402d47bc7cc6987fbcc9c83fa5a43159d1e453654709edb0b675252a8be130d33588b0ada97aeece429928a8cfa22953ed82f7bed308821ddeee45d062a2c2e02aed640475672c356c0f067f01f93743eb27458e411fd83da8f298369919bf9d70d17b822c8dab15b35a915543417164e28d0bf65b3be3e2dbcd314ad30a27ceb16b3c9ce681b19544a39f3b782fcb235044bc1ae279a803be823074dcf7c9eb8891f0406a86d6c58f1ee812b9a8cfba3e9165df4e5c8d5ddfeb7f472b308f51320285124439b0d", &(0x7f0000000080)=""/4}, 0x18) syz_open_dev$sndtimer(&(0x7f0000000240)='/dev/snd/timer\x00', 0x0, 0x0) socket$caif_stream(0x25, 0x1, 0x1) 10:17:04 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xe000000, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:17:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$IMCTRLREQ(r1, 0x80044945, &(0x7f0000000080)={0x200, 0x8, 0x0, 0x100000000000}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0xfffffffffffffffe) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000100)={0x7c, 0x0, [0x4b564d01, 0xfff]}) syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x3f7b, 0x4000) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xae80) 10:17:04 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x0, 0x0, 0x8f8c, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) [ 608.020332][T18697] ima: Unable to reopen file for reading. [ 608.064203][T18704] device nr0 entered promiscuous mode 10:17:04 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf000000, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:17:04 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x1000000000000) [ 608.310071][ T26] audit: type=1804 audit(1567160224.943:144): pid=18721 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/404/file0" dev="sda1" ino=16767 res=1 [ 608.310089][T18721] ima: Unable to reopen file for reading. 10:17:05 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x10000000, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:17:05 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x10000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000300)={'nat\x00', 0x0, 0x4, 0xff, [], 0x2, &(0x7f0000000140)=[{}, {}], &(0x7f0000000200)=""/255}, &(0x7f0000000380)=0x78) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x9, 0x2, [0x0, 0x13ae]}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000100)={r2, 0x4}, 0x8) setsockopt$inet6_tcp_int(r1, 0x6, 0x5, &(0x7f0000000040)=0x3f, 0xfffffffffffffdaa) r3 = socket$caif_seqpacket(0x25, 0x5, 0x0) dup3(r0, r3, 0x0) 10:17:05 executing program 5: syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xe004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) pipe(0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x101000, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f00000001c0)={{0x2e, @broadcast, 0x4e24, 0x3, 'wrr\x00', 0x12, 0x4, 0x4f}, {@multicast1, 0x4e21, 0x0, 0x81, 0x3, 0x80}}, 0x44) fallocate(r1, 0x1, 0x0, 0x369e5d84) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000500)={{}, 0x0, 0xfff, 'id1\x00', 'timer0\x00', 0x0, 0x0, 0x0, 0x0, 0x8000}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000003c0)='./file1\x00', 0x0) 10:17:05 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x100000000000000) [ 608.658906][T18737] ima: Unable to reopen file for reading. [ 608.662274][ T26] audit: type=1804 audit(1567160225.293:145): pid=18737 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/405/file0" dev="sda1" ino=16784 res=1 [ 608.874140][ T26] audit: type=1804 audit(1567160225.513:146): pid=18739 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir285723006/syzkaller.HdA5uO/381/file0" dev="sda1" ino=16764 res=1 10:17:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) 10:17:05 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:17:05 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8af112bd1ffffff0000000200000000030005000000000002004e20e0000001000000f7ff000000"], 0x60}}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000100)=0x400) ioctl$VIDIOC_G_AUDOUT(r1, 0x80345631, &(0x7f0000000040)) 10:17:05 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x200000000000000) 10:17:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r1, &(0x7f00000000c0)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x837363e137813805) dup3(r0, r1, 0x0) [ 609.225097][ T26] audit: type=1804 audit(1567160225.863:147): pid=18750 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/406/file0" dev="sda1" ino=16766 res=1 [ 609.265863][T18750] ima: Unable to reopen file for reading. [ 609.298370][T18758] ima: Unable to reopen file for reading. [ 609.489130][T18760] device nr0 entered promiscuous mode [ 610.688410][T18769] IPVS: ftp: loaded support on port[0] = 21 [ 610.969529][T18769] chnl_net:caif_netlink_parms(): no params data found [ 611.100992][T18769] bridge0: port 1(bridge_slave_0) entered blocking state [ 611.108524][T18769] bridge0: port 1(bridge_slave_0) entered disabled state [ 611.116772][T18769] device bridge_slave_0 entered promiscuous mode [ 611.125715][T18769] bridge0: port 2(bridge_slave_1) entered blocking state [ 611.133710][T18769] bridge0: port 2(bridge_slave_1) entered disabled state [ 611.142057][T18769] device bridge_slave_1 entered promiscuous mode [ 611.266841][T18769] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 611.278476][T18769] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 611.300943][T18769] team0: Port device team_slave_0 added [ 611.409363][T18769] team0: Port device team_slave_1 added [ 611.464668][T18769] device hsr_slave_0 entered promiscuous mode [ 611.493579][T18769] device hsr_slave_1 entered promiscuous mode [ 611.532271][T18769] debugfs: Directory 'hsr0' with parent '/' already present! [ 611.630066][T18769] bridge0: port 2(bridge_slave_1) entered blocking state [ 611.637457][T18769] bridge0: port 2(bridge_slave_1) entered forwarding state [ 611.663975][ T7] device bridge_slave_1 left promiscuous mode [ 611.670179][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 611.703582][ T7] device bridge_slave_0 left promiscuous mode [ 611.709929][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 613.913006][ T7] device hsr_slave_0 left promiscuous mode [ 613.962375][ T7] device hsr_slave_1 left promiscuous mode [ 614.025158][ T7] team0 (unregistering): Port device team_slave_1 removed [ 614.040594][ T7] team0 (unregistering): Port device team_slave_0 removed [ 614.056029][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 614.108450][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 614.221451][ T7] bond0 (unregistering): Released all slaves [ 614.323718][T15358] bridge0: port 2(bridge_slave_1) entered disabled state [ 614.355401][T18769] 8021q: adding VLAN 0 to HW filter on device bond0 [ 614.376384][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 614.385002][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 614.396831][T18769] 8021q: adding VLAN 0 to HW filter on device team0 [ 614.462479][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 614.471368][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 614.480524][T15358] bridge0: port 1(bridge_slave_0) entered blocking state [ 614.487912][T15358] bridge0: port 1(bridge_slave_0) entered forwarding state [ 614.504389][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 614.513976][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 614.522774][T15358] bridge0: port 2(bridge_slave_1) entered blocking state [ 614.529838][T15358] bridge0: port 2(bridge_slave_1) entered forwarding state [ 614.539227][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 614.561675][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 614.572288][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 614.582639][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 614.591583][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 614.601473][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 614.620024][T18769] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 614.631146][T18769] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 614.646425][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 614.655762][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 614.665219][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 614.677701][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 614.687848][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 614.705728][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 614.723728][T18769] 8021q: adding VLAN 0 to HW filter on device batadv0 10:17:11 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x0, 0x8, 0x0, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:17:11 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x40000000, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:17:11 executing program 5: openat$hwrng(0xffffffffffffff9c, 0x0, 0x10000, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r0, &(0x7f0000000000), r0, &(0x7f0000000040), 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) 10:17:11 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x300000000000000) 10:17:11 executing program 0: r0 = socket$kcm(0xa, 0x522000000003, 0x11) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000)=0x6, 0x4) r1 = dup2(r0, r0) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000200)={0x1, 0x2, 0x9, 0x6, 0x80000001, 0x0, 0xb21}) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@nl=@unspec={0x3300000000000000, 0xffffff7f00001100, 0x0, 0x80fe}, 0x80, 0x0}, 0x0) recvmsg(r0, &(0x7f00000004c0)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000380)=[{&(0x7f0000000140)=""/163, 0xa3}, {&(0x7f0000000280)=""/252, 0xfc}, {&(0x7f0000000200)}], 0x3, &(0x7f00000003c0)=""/238, 0xee}, 0x40000043) 10:17:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) [ 615.147638][ T26] audit: type=1804 audit(1567160231.783:148): pid=18785 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/407/file0" dev="sda1" ino=16805 res=1 [ 615.179074][T18785] ima: Unable to reopen file for reading. 10:17:11 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x60000000, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:17:11 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3001aa30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x800, 0x0) bind$pptp(r1, &(0x7f0000000140)={0x18, 0x2, {0x3, @multicast2}}, 0x1e) r2 = dup3(r0, 0xffffffffffffffff, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, &(0x7f0000000100)) fstat(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x800, 0x0) 10:17:11 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x400000000000000) 10:17:12 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x65580000, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) [ 615.493298][T18800] ima: Unable to reopen file for reading. [ 615.493666][ T26] audit: type=1804 audit(1567160232.123:149): pid=18800 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/408/file0" dev="sda1" ino=16812 res=1 10:17:12 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x500000000000000) 10:17:12 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x81000000, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) [ 615.751526][ T26] audit: type=1804 audit(1567160232.383:150): pid=18808 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/409/file0" dev="sda1" ino=16812 res=1 [ 615.782171][T18808] ima: Unable to reopen file for reading. [ 616.143101][T18788] device nr0 entered promiscuous mode 10:17:13 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x0, 0x8, 0x0, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:17:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x9, 0x4000) getpeername$netlink(r0, &(0x7f0000000200), &(0x7f0000000240)=0xc) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@assoc={0x18, 0x117, 0x4, 0xd4e5}, @op={0x18, 0x117, 0x3, 0x1}], 0x30}, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000000)={0x0, 0x0}) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000140)=r3) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x10}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x78a3}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) 10:17:13 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x88a8ffff, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:17:13 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x600000000000000) 10:17:13 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6}}, &(0x7f0000000400)=0xe8) sendmsg$nl_route_sched(r1, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2804}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)=@deltfilter={0x34, 0x2d, 0xe22, 0x70bd27, 0xfffffffffffffffe, {0x0, r2, {0xb, 0xffff}, {0xfff3, 0x6}, {0x0, 0xc}}, [@filter_kind_options=@f_rsvp6={{0xc, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0xc800}, 0x4000) getegid() r3 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r3, r0, 0x0) [ 616.483590][ T26] audit: type=1804 audit(1567160233.123:151): pid=18824 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/410/file0" dev="sda1" ino=16824 res=1 [ 616.511413][T18824] ima: Unable to reopen file for reading. 10:17:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) 10:17:13 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x700000000000000) 10:17:13 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x9effffff, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:17:13 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x8000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000040)={{0xff, 0x2}, 'port0\x00', 0x12, 0x1002, 0x5, 0x2, 0x80, 0x1000, 0x1, 0x0, 0x4, 0xaa58}) openat$cgroup_subtree(r0, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) 10:17:13 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x0, 0x8, 0x0, 0x80000000, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) [ 616.792063][ T26] audit: type=1804 audit(1567160233.413:152): pid=18839 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/411/file0" dev="sda1" ino=16818 res=1 [ 616.795810][T18839] ima: Unable to reopen file for reading. 10:17:13 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xbc040000, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:17:13 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) fstat(0xffffffffffffffff, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0xffad, &(0x7f0000000c40)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{0x8, 0x2}, {0x8, 0x3}, {0x8, 0x7, r2}, {0x8, 0x5, r2}, {0x8, 0x0, r2}], {0x10, 0x6}, {0x20, 0x4}}, 0x4c, 0x0) chdir(&(0x7f0000000340)='./file0\x00') pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000000040)={0x2002}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xb, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x8, 0x82, &(0x7f0000000400)=""/130, 0x41000, 0x6, [], 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0)={0x4, 0x3}, 0x10}, 0x70) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) openat$cgroup_ro(r3, &(0x7f0000000280)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$SIOCRSSCAUSE(r3, 0x89e1, &(0x7f00000000c0)=0x401) 10:17:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) 10:17:13 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x800000000000000) 10:17:13 executing program 5: r0 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x2, 0x82881) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x2}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000001c0)={0x4, 0x200, 0x0, 0x7fff, r3}, 0x10) write(r2, &(0x7f0000000340), 0x41395527) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0xff}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0xffffffffffffe6d, 0x0) 10:17:13 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf0ffffff, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) [ 617.368570][ T26] audit: type=1804 audit(1567160234.003:153): pid=18866 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/412/file0" dev="sda1" ino=16650 res=1 [ 617.393904][T18866] ima: Unable to reopen file for reading. 10:17:14 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') lsetxattr$trusted_overlay_opaque(0x0, 0x0, &(0x7f0000000280)='y\x00', 0x3ca, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x0, 0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) readlink(0x0, 0x0, 0xfffffffffffffdb4) socketpair(0x11, 0x1, 0x1, &(0x7f0000000440)={0xffffffffffffffff}) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r3, 0x0, 0x0) r4 = creat(0x0, 0xfe2b08bceb2fa9dd) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000100)={0x0, 0x4, 0x101, 0x40, 0x5, 0x800, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@empty, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) bind(r2, &(0x7f0000000c80)=@can={0x1d, r7}, 0x80) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r4, 0x4058534c, &(0x7f0000000500)={0x2, 0x840, 0x434e3cc3, 0x317256f5, 0x3}) ioctl$SG_SET_COMMAND_Q(r0, 0x2271, &(0x7f0000000000)) syz_mount_image$bfs(&(0x7f0000000140)='bfs\x00', &(0x7f0000000180)='./file0\x00', 0xf712, 0xa, &(0x7f0000000b80)=[{&(0x7f0000000680)="66c6df9245a0f3d46959ff883eaed13b6477b02ce8df2aa75d2526c52b8c3b93ddd7bf88ffe69e088ce558af2634f3e4d51e196baee183697e95dacb5b5e22c77d93c234fed26e9a6a037573702361f2e558106038013ca5b568e872e5b003d5f29fbe63728464a2cb057e5163e0032c8480a17fcfaa9f972609987e13193d8185ba759635c38b4e40115bb828c254f612e73aba8eca5fda089d91a34bacbc73fd93a64ed71e5831fd607ad9df9f9623961107d97307aebfbfd9d300bc9a807e28beaf400899b6ece0dbcf486567354edb04f4ca4be0e066e109b8f215217a54ffc74d3cb4fa1e57815e18a0abb0a5d7f67365cc5a40", 0xf6, 0x100000000}, {&(0x7f00000001c0)="239d00b92af38192af2a4e3bb718a166f5ad64d3a64ced3b9a5d06cdda940d16f839c88dbfb911b13492c407492680b27068af107c9725f5b7fb75ca9c4eef455aca1ba84c3668443d73c336cae7d96ad38590458391b1fd34451aab773b6ce28d2a9449abadd1e7a129bde4e8e2822760b80699bb884668b9cb0980d5c06a4ef11b51eba5f3c224f6c7d6058de37579be134256bc2b661a9d05a9e0f7d77056cb5413657eabc213dd", 0xa9, 0xffffffff}, {&(0x7f0000000380)="5ebf1e7b525a77050ae4dde1fa1c9f75bf8863f00bc1174bf5551e", 0x1b, 0x9}, {&(0x7f0000000580)="3d5f8e7536f9c6b6d1235f8a56e58c129489850fffe27b5d383645815de823cd875feb7649d951b763fcb818e0b08896b2e000c8b0d9e1e104f642ac23ac0c4420c7f0ea7efd963b5ff274d86a737051859b3a2c0d5c76aae6c02df3100cbc7055c665225a7661cca93f01a2e8649d04735e08b4bf979199cb5b6068a332a225db2c3314e6f507a8903119cfd09965228b248486668e44a3ea250ca74704dac1328bd87844c650831075", 0xaa}, {&(0x7f00000003c0), 0x0, 0xf20}, {&(0x7f0000000780)="4e241034bc9a87772ca38ba2a261eb053cf752d677548e990084a07b1c511a38633c2365749e7fe767c845623b581b8d3f4587d9c232a3dff5257d835c48bee426a020163f570e8fa2e720e4746837f79bac5945d2e000ebdcb547547ede9378569d3d1f46a05fe860179c731fa8e4f2b97ff08f72a5a6b71c73aa542a970392dcaef1b76109b98fc08789ace19e9f76c0d4e25c4d4cb97edcca5acddea1c628c3b36f683b9d667ba10d161469bf073a81f3d85a", 0xb4, 0x7}, {&(0x7f0000000840)="8f027759e4d8985bc9695eb42eaa8f601851a39a048305a4ebcc195dbfe23e3430bfc031970e7c356d0b6e78601ee46d5b1e38f73b04e010919a7a433c0c0b08ce9aa991278d7fb447f425bf98de4b6b69c007964e0e193fb980f302ccb49f66c26c893a56d8c287985a08068bcd469e4cf257bdfdc68dd06d11226f678990852a4a1ddb43edf84b21954b780c99c02ffd581db20cd641f20cbc321932866abd267157deb1b5aeefaf01fe461a88e25e274c564eea43abb1", 0xb8, 0x1ff}, {&(0x7f0000000400)="dfa91237dbd4deb0aeedf7002f227e", 0xf, 0xff}, {&(0x7f0000000480)="1a52157aa60b7cdfcb9cb8c71590108c99adda2fb4d691109f0101507ea84081fdc422767a8389734da00589986a17a5e15810c52e96f570f2fe3071c48920f27b4a5f7cde8371421d48e546273011e80c930a483ee0d4708fb135090282ed87f2a7a8a56d7b5a1842df65eb4c109d80e661df6597836dd577d9", 0x7a, 0x6}, {&(0x7f0000000ac0)="522e735776dc04341b68fef240bb6595ad2617b2a9a60e539ea209267127a9237f8d8cf25c8a413618646544ca68919f9cfae8ab4fe1093ac03bf148256fdaba3872c80137e4e8a462d10130e776afa643a946d6120c5f875d5c1aa8088566048f97479e285e7a79678fb226671125411dd9ca3a0a3c1c68fa36527c63aea0e251cded26aca5dbd7f0f1b8c05268add128e2b762c7f0f047039353746fd6e36c9998b7e4fc2b10ef337958eebbc886225cad828e17f6a91c3293be", 0xbb, 0x6}], 0x80, 0x0) 10:17:14 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffa888, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:17:14 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xa00000000000000) 10:17:14 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) [ 617.795547][ T26] audit: type=1804 audit(1567160234.433:154): pid=18887 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/413/file0" dev="sda1" ino=16827 res=1 [ 617.825561][T18887] ima: Unable to reopen file for reading. 10:17:14 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffff000, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) [ 618.024673][T18891] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=758e5f3d) [ 618.206108][T18902] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=758e5f3d) [ 619.223412][T18911] IPVS: ftp: loaded support on port[0] = 21 [ 619.485938][T18911] chnl_net:caif_netlink_parms(): no params data found [ 619.636851][T18911] bridge0: port 1(bridge_slave_0) entered blocking state [ 619.644342][T18911] bridge0: port 1(bridge_slave_0) entered disabled state [ 619.658382][T18911] device bridge_slave_0 entered promiscuous mode [ 619.764579][T18911] bridge0: port 2(bridge_slave_1) entered blocking state [ 619.771765][T18911] bridge0: port 2(bridge_slave_1) entered disabled state [ 619.780951][T18911] device bridge_slave_1 entered promiscuous mode [ 619.805735][T18911] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 619.933135][T18911] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 619.955234][T18911] team0: Port device team_slave_0 added [ 619.963178][T18911] team0: Port device team_slave_1 added [ 620.134996][T18911] device hsr_slave_0 entered promiscuous mode [ 620.172495][T18911] device hsr_slave_1 entered promiscuous mode [ 620.310962][T18911] bridge0: port 2(bridge_slave_1) entered blocking state [ 620.318612][T18911] bridge0: port 2(bridge_slave_1) entered forwarding state [ 620.326016][T18911] bridge0: port 1(bridge_slave_0) entered blocking state [ 620.333114][T18911] bridge0: port 1(bridge_slave_0) entered forwarding state [ 620.353894][ T7] device bridge_slave_1 left promiscuous mode [ 620.360210][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 620.403044][ T7] device bridge_slave_0 left promiscuous mode [ 620.409414][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 622.592782][ T7] device hsr_slave_0 left promiscuous mode [ 622.632359][ T7] device hsr_slave_1 left promiscuous mode [ 622.680447][ T7] team0 (unregistering): Port device team_slave_1 removed [ 622.695136][ T7] team0 (unregistering): Port device team_slave_0 removed [ 622.709389][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 622.769741][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 622.859516][ T7] bond0 (unregistering): Released all slaves [ 622.964272][ T8901] bridge0: port 1(bridge_slave_0) entered disabled state [ 622.972476][ T8901] bridge0: port 2(bridge_slave_1) entered disabled state [ 623.017822][T18911] 8021q: adding VLAN 0 to HW filter on device bond0 [ 623.030096][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 623.039099][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 623.050538][T18911] 8021q: adding VLAN 0 to HW filter on device team0 [ 623.066264][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 623.075765][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 623.085201][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 623.092347][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 623.143284][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 623.153170][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 623.162839][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 623.169930][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 623.179404][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 623.190098][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 623.216115][T12604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 623.234364][T12604] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 623.245120][T12604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 623.255489][T12604] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 623.265284][T12604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 623.274936][T12604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 623.287794][T18911] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 623.300975][T18911] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 623.323644][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 623.331725][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 623.342297][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 623.401843][T18911] 8021q: adding VLAN 0 to HW filter on device batadv0 10:17:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) 10:17:20 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x3f00000000000000) 10:17:20 executing program 5: prctl$PR_SET_SECUREBITS(0x1c, 0x5) setresuid(0x0, 0xee01, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$VIDIOC_G_PARM(r0, 0xc0cc5615, &(0x7f00000003c0)={0x8, @output={0x1000, 0x0, {0x3}, 0x100000000, 0x1ff}}) setgroups(0xfffffffffffffee6, 0x0) getgroups(0x400001f6, &(0x7f0000000100)=[0xee00]) setregid(0x0, r1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$VIDIOC_G_FBUF(r2, 0x8030560a, &(0x7f0000000000)={0x8, 0x0, &(0x7f0000000200)="8c32453015d96acfc7632fbbe834346057c45f2e0f564d9c6c3581964b203b1167b59b4b99d45d33abb87206d025fc0a1b84e75200fd8e5462d3904636a24f7ac6c65138e9a5ad5ad6ac655061d1dd805a75f2f16ad6455597", {0x6, 0x8001, 0x32314d56, 0x5, 0x9, 0x7f, 0x9, 0x6}}) setgroups(0x1, &(0x7f0000000080)=[0x0]) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f00000000c0)=0x6) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f00000001c0)={0x5, 0x7, 0x81, 0x3, 0x800000000000000, 0x401}) write$apparmor_exec(r2, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r2, 0x80045530, &(0x7f00000002c0)=""/200) 10:17:20 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff7f, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:17:20 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x0, 0x8, 0x8f8c, 0x0, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:17:20 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x171) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) r2 = perf_event_open(0x0, r1, 0x2, 0xffffffffffffffff, 0x8) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) close(r3) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x6) socket$kcm(0x2, 0x0, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 10:17:20 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff9e, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) [ 623.837298][ T26] audit: type=1804 audit(1567160240.473:155): pid=18926 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/414/file0" dev="sda1" ino=16737 res=1 [ 623.863656][T18926] ima: Unable to reopen file for reading. 10:17:20 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x4000000000000000) 10:17:20 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) capset(&(0x7f0000000100)={0x20071026}, &(0x7f0000000140)) sendmmsg(r0, &(0x7f0000008a40)=[{{0x0, 0x86039ba39be65653, 0x0, 0xfffffffffffffd1f}}, {{&(0x7f00000003c0)=@nl=@proc={0x10, 0x0, 0x25dfdbff}, 0x80, 0x0}}], 0x2, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000180)={'icmp\x00'}, &(0x7f00000001c0)=0x1e) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f0000000040)={0x8, 0x4, [{0x7, 0x0, 0x7ff}, {0x2, 0x0, 0x1}, {0x9, 0x0, 0x100000001}, {0xebea, 0x0, 0x20}, {0x7, 0x0, 0x5}, {0x0, 0x0, 0x2}, {0xffff, 0x0, 0x5}, {0x5, 0x0, 0x100000000}]}) 10:17:20 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffff0, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) [ 624.178340][ T26] audit: type=1804 audit(1567160240.803:156): pid=18945 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/415/file0" dev="sda1" ino=16673 res=1 [ 624.209366][T18945] ima: Unable to reopen file for reading. [ 624.237211][T18947] capability: warning: `syz-executor.5' uses deprecated v2 capabilities in a way that may be insecure [ 624.276731][T18947] QAT: Invalid ioctl 10:17:20 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x4800000000000000) 10:17:21 executing program 5: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x28000, 0x0) mknodat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1) [ 624.456236][ T26] audit: type=1804 audit(1567160241.093:157): pid=18956 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/416/file0" dev="sda1" ino=16705 res=1 [ 624.491151][T18956] ima: Unable to reopen file for reading. [ 624.505079][T18958] Error parsing options; rc = [-22] [ 624.532999][T18961] Error parsing options; rc = [-22] [ 624.804097][T18934] device nr0 entered promiscuous mode 10:17:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) 10:17:21 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x40030000000000, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:17:21 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x4c00000000000000) 10:17:21 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x3, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f00000001c0)=0x20a) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) ioctl$DRM_IOCTL_MARK_BUFS(r1, 0x40206417, &(0x7f0000000040)={0x8, 0x407, 0x0, 0x7f, 0x4, 0x1}) sendmsg$unix(r1, &(0x7f00000003c0)={&(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000180)=[{&(0x7f0000000100)="044435cccbe18d0042ac0645efaedd28da3be67571b49e8fc541b2031ae4804be507f0f824e29d9633a9b73b7dea7740a474ab1f51aa264aafc9809bf8c78f1ee7b09ae7e763214eadefd35c7703b0", 0x4f}, {&(0x7f0000000200)="5e6e79833606b9a9d4922c7c0c50387893bdf3892483003401803027c92a1bd37995123655683cd9d505a8af7b512840cd502ae0f0d0af884fb41bf65f9ced06d97b43a9c58664a101718c39aff15b610822674302bb0b4eb2c2713189e198666b3e8ee8a2e0961ca17c3b53125748af5a072e0021b174ca090a25ec75c9c4f0434fde2856136f0708aac75a5821a94ab0659eac22f3b2349b87f07061b218fb3dae75817f0275372e00acfcfbcf19e0622a462f91223fba", 0xb8}, {&(0x7f00000002c0)="3c6f562ebf864c06e41d943224d219351e4f3eec5f8fd0857caaa0a0f421c96b173a41a12c4261508c89f7f1dde708e67dc4bc6be34aade8607aaea289e0324742faad57a960f78e95a5d0c59e7caea95aa6491a4d634cbbd05ed20b62ee0dac27004263af4300689853f7f6e61a5c23a95d8731999d984873d7c3cf0b1bfbe91586b20153471430666e4b0bb5690e623e0f100987b010854800ad9a290c0ef0d6bb52d8a263058eea9f3bc2184f256e84a74d5fd3eaba366f2f3aae665753357b4d7bd15e31904637fa12b6ff84673426119a10f3c39ffe221323dc6454d1a26589b5d34e5b5f2b95262d33dd", 0xed}], 0x3, 0x0, 0x0, 0x4000}, 0x814) setxattr$trusted_overlay_opaque(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='trusted.overlay.opaque\x00', &(0x7f0000000500)='y\x00', 0x2, 0x1) perf_event_open(&(0x7f0000001000)={0xffffffffffffffff, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1000000000c, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000, 0xd0fc59a1362b9391, r1, 0x0) ioctl(r2, 0x9000008912, &(0x7f0000000400)="11dca50d5c0bcfe47bf070") ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, &(0x7f0000001000)) close(r0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000540)=0x0) clock_gettime(0x0, &(0x7f0000000640)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000580)={0x0, 0x7ff, 0x2, 0xffffffffffffff81, 0xa52, 0x21f, 0x2, 0x2dbc}, &(0x7f00000005c0)={0x0, 0x7, 0x4, 0x0, 0x0, 0x9, 0xff}, &(0x7f0000000600)={0x1, 0x3f, 0x0, 0x4, 0x2, 0x400, 0x6, 0x8}, &(0x7f0000000680)={r4, r5+30000000}, &(0x7f0000000700)={&(0x7f00000006c0)={0x9}, 0x8}) setpriority(0x1, r3, 0x9) 10:17:21 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x0, 0x8, 0x8f8c, 0x0, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:17:21 executing program 0: fsopen(&(0x7f0000000300)='aio\x00', 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x10000, 0x0) r1 = socket$key(0xf, 0x3, 0x2) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000080)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f0000000240)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f00000001c0)={0x3, @default, r2}) pipe(&(0x7f0000000200)) [ 625.273437][T18970] ima: Unable to reopen file for reading. [ 625.279468][ T26] audit: type=1804 audit(1567160241.913:158): pid=18970 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/417/file0" dev="sda1" ino=16689 res=1 10:17:22 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf0ffffffffffff, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:17:22 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x6800000000000000) 10:17:22 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x100000000000000, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) [ 625.657904][T18987] device nr0 entered promiscuous mode [ 625.669274][ T26] audit: type=1804 audit(1567160242.303:159): pid=18995 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/418/file0" dev="sda1" ino=16594 res=1 [ 625.669291][T18995] ima: Unable to reopen file for reading. 10:17:22 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x680342, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r1) 10:17:22 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x200000000000000, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:17:22 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x6c00000000000000) [ 626.087094][ T26] audit: type=1804 audit(1567160242.723:160): pid=19009 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/419/file0" dev="sda1" ino=16561 res=1 [ 626.087117][T19009] ima: Unable to reopen file for reading. 10:17:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) 10:17:23 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400000000000000, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:17:23 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x7400000000000000) 10:17:23 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000280)='./file0\x00', &(0x7f0000000240)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB=',lower\x00\x00r=.:file0']) r0 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x48, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0xc0189436, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}) [ 626.512916][ T26] audit: type=1804 audit(1567160243.153:161): pid=19016 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/420/file0" dev="sda1" ino=16650 res=1 [ 626.512933][T19016] ima: Unable to reopen file for reading. [ 626.621146][T19020] overlayfs: unrecognized mount option "lower" or missing value [ 626.728190][T19024] device nr0 entered promiscuous mode [ 626.740886][T19020] overlayfs: unrecognized mount option "lower" or missing value [ 628.018459][T19034] IPVS: ftp: loaded support on port[0] = 21 [ 628.306343][T19034] chnl_net:caif_netlink_parms(): no params data found [ 628.342730][T19034] bridge0: port 1(bridge_slave_0) entered blocking state [ 628.349955][T19034] bridge0: port 1(bridge_slave_0) entered disabled state [ 628.358213][T19034] device bridge_slave_0 entered promiscuous mode [ 628.469220][T19034] bridge0: port 2(bridge_slave_1) entered blocking state [ 628.476501][T19034] bridge0: port 2(bridge_slave_1) entered disabled state [ 628.484667][T19034] device bridge_slave_1 entered promiscuous mode [ 628.608741][T19034] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 628.620485][T19034] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 628.643781][T19034] team0: Port device team_slave_0 added [ 628.650867][T19034] team0: Port device team_slave_1 added [ 628.658655][ T7] device bridge_slave_1 left promiscuous mode [ 628.665159][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 628.694098][ T7] device bridge_slave_0 left promiscuous mode [ 628.701057][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 630.943116][ T7] device hsr_slave_0 left promiscuous mode [ 630.982355][ T7] device hsr_slave_1 left promiscuous mode [ 631.046200][ T7] team0 (unregistering): Port device team_slave_1 removed [ 631.059481][ T7] team0 (unregistering): Port device team_slave_0 removed [ 631.074446][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 631.110819][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 631.212028][ T7] bond0 (unregistering): Released all slaves [ 631.364736][T19034] device hsr_slave_0 entered promiscuous mode [ 631.412721][T19034] device hsr_slave_1 entered promiscuous mode [ 631.501548][T19034] 8021q: adding VLAN 0 to HW filter on device bond0 [ 631.539586][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 631.548840][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 631.561569][T19034] 8021q: adding VLAN 0 to HW filter on device team0 [ 631.576272][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 631.586914][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 631.596647][T15358] bridge0: port 1(bridge_slave_0) entered blocking state [ 631.603776][T15358] bridge0: port 1(bridge_slave_0) entered forwarding state [ 631.623103][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 631.631463][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 631.642004][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 631.651473][T15358] bridge0: port 2(bridge_slave_1) entered blocking state [ 631.658624][T15358] bridge0: port 2(bridge_slave_1) entered forwarding state [ 631.667830][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 631.677946][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 631.694995][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 631.705921][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 631.715287][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 631.725178][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 631.743698][T19034] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 631.754828][T19034] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 631.769840][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 631.779464][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 631.788955][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 631.800922][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 631.826165][T15358] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 631.851210][T19034] 8021q: adding VLAN 0 to HW filter on device batadv0 10:17:28 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x600000000000000, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:17:28 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x2, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) r2 = dup2(r0, r1) ioctl$TIOCGICOUNT(r2, 0x545d, 0x0) 10:17:28 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0x7a00000000000000) 10:17:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x3, 0x82) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000500)={{0x0, @empty, 0x0, 0x1, 'none\x00', 0x0, 0x10001}, {@rand_addr, 0x0, 0x2, 0x7a, 0x6, 0x7}}, 0x44) capset(0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x804}, 0x0) getpgrp(0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x40000, 0x0) readv(0xffffffffffffffff, &(0x7f0000000700)=[{&(0x7f0000000240)=""/14, 0xe}, {0x0}, {0x0}, {&(0x7f0000000600)=""/236, 0xec}, {0x0}], 0x5) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x400000, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000900)={"6cdd4237dd245c8405721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e38e06c5fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b53606000000000000007c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df1001000000000694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde317fad4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b22645cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f580968af6afbbc19db161c6df3e7c9c7ff0f00002fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28a774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a80045fe17dee6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fed2a33caf9dd8768ddbc02a48403000000f254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb010100000000000001a047526865c888c9ff36056cccad258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa7ff186719d819164300"}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:17:28 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x3, 0x0, 0x8, 0x8f8c, 0x0, 0x8}, 0x9, 0x2, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0600ffffffff0180c200000086dd6006f52600081100fe8000000000000000000000000000ffff0200000000000000000000000000010000000200089078"], 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x87, 0x1, 0x2, 0x0, 0x10000, 0x80, 0x4, 0xe069, 0x7ff, 0x7, 0x8, 0x8, 0x1, 0xffc0000, 0x4, 0x20, 0xffff, 0x2, 0x5, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x7, 0x0, 0xffffffff, 0x7ff, 0x81, 0x82, 0x2, 0x1, 0x100, 0x7, 0x1, 0x3, 0x43, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x61}, 0x200, 0x8, 0x81, 0x4, 0x6, 0x20, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 10:17:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) [ 632.196232][ T26] audit: type=1804 audit(1567160248.833:162): pid=19048 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/421/file0" dev="sda1" ino=16854 res=1 [ 632.196438][T19048] ima: Unable to reopen file for reading. 10:17:28 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xa00000000000000, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:17:29 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xf6ffffff00000000) [ 632.391578][T19057] device nr0 entered promiscuous mode 10:17:29 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x3, 0x400000) mmap$perf(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2, 0x10, r2, 0x0) sendmsg$alg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@assoc={0x18, 0x117, 0x4, 0xd4e5}, @op={0x18, 0x117, 0x3, 0x1}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x10}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x78a3}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) 10:17:29 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xc00000000000000, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) [ 632.638777][ T26] audit: type=1804 audit(1567160249.273:163): pid=19064 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/422/file0" dev="sda1" ino=16849 res=1 [ 632.674222][T19064] ima: Unable to reopen file for reading. 10:17:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) timer_create(0x3, &(0x7f0000000000)={0x0, 0x15, 0x2}, &(0x7f0000000080)=0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) timer_settime(r1, 0x0, &(0x7f0000000140)={{r2, r3+30000000}, {r4, r5+30000000}}, &(0x7f0000000180)) ioctl$KVM_S390_UCAS_MAP(r0, 0x4018ae50, &(0x7f0000000300)={0x0, 0xf3b0000000000000, 0x4}) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001540)={&(0x7f0000000340)=ANY=[@ANYBLOB="0202200313000000000000ffff00ff0005000600571866720a000068c3f2b5359ef68104200000005500000000000000000000000000000005000900ff0000002a00002000000000fe8000000000000007000000000000ff00000000000000000200010000ffff000000050d0000001005000500eb0000000a00000000000000ffffff0000a100000000000008f500010000000000000000"], 0x98}}, 0x0) r6 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x1, 0x44200) ioctl$DRM_IOCTL_GET_STATS(r6, 0x80f86406, &(0x7f0000000200)=""/244) 10:17:29 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xfeffffff00000000) 10:17:29 executing program 0: modify_ldt$read_default(0x2, &(0x7f0000000200)=""/182, 0xb6) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x80003, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e0000002c008151e00f80ec0400b904014865160b00014101410000000f00170000001f1500cd5edc00000000b4", 0x2e}], 0x1}, 0x0) 10:17:29 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xe00000000000000, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) [ 633.046337][ T26] audit: type=1804 audit(1567160249.683:164): pid=19083 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/423/file0" dev="sda1" ino=16849 res=1 [ 633.046355][T19083] ima: Unable to reopen file for reading. 10:17:29 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf00000000000000, &(0x7f00000015c0)=[{&(0x7f0000000100)="230000004e008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 10:17:29 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x42003, 0xff00000000000000) [ 633.458518][ T26] audit: type=1804 audit(1567160250.093:165): pid=19107 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir540064439/syzkaller.GIQLM5/424/file0" dev="sda1" ino=16863 res=1 [ 633.493935][T19107] ima: Unable to reopen file for reading. [ 633.572924][T19081] ------------[ cut here ]------------ [ 633.591577][T19081] WARNING: CPU: 0 PID: 19081 at kernel/time/posix-cpu-timers.c:401 posix_cpu_timer_del+0x2f0/0x3b0 [ 633.602254][T19081] Kernel panic - not syncing: panic_on_warn set ... [ 633.608850][T19081] CPU: 0 PID: 19081 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190827 #74 [ 633.617958][T19081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 633.628020][T19081] Call Trace: [ 633.631317][T19081] dump_stack+0x172/0x1f0 [ 633.635752][T19081] ? posix_cpu_timer_del+0x230/0x3b0 [ 633.641589][T19081] panic+0x2dc/0x755 [ 633.645491][T19081] ? add_taint.cold+0x16/0x16 [ 633.650172][T19081] ? printk+0xba/0xed [ 633.654518][T19081] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 633.660185][T19081] ? __warn.cold+0x14/0x3c [ 633.664637][T19081] ? __warn+0xd9/0x1d0 [ 633.668713][T19081] ? posix_cpu_timer_del+0x2f0/0x3b0 [ 633.674003][T19081] __warn.cold+0x2f/0x3c [ 633.678252][T19081] ? report_bug.cold+0x63/0xad [ 633.683153][T19081] ? posix_cpu_timer_del+0x2f0/0x3b0 [ 633.688450][T19081] report_bug+0x289/0x300 [ 633.692877][T19081] do_error_trap+0x11b/0x200 [ 633.697483][T19081] do_invalid_op+0x37/0x50 [ 633.701906][T19081] ? posix_cpu_timer_del+0x2f0/0x3b0 [ 633.707198][T19081] invalid_op+0x23/0x30 [ 633.711356][T19081] RIP: 0010:posix_cpu_timer_del+0x2f0/0x3b0 [ 633.717269][T19081] Code: 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 b5 00 00 00 48 83 bb c8 00 00 00 00 74 16 e8 10 58 0d 00 <0f> 0b e9 87 fe ff ff e8 b4 3e 48 00 e9 dd fd ff ff e8 fa 57 0d 00 [ 633.737143][T19081] RSP: 0018:ffff888099ee7c88 EFLAGS: 00010093 [ 633.743219][T19081] RAX: ffff88808cbc66c0 RBX: ffff88809ca9e170 RCX: 1ffff11011978dea [ 633.751193][T19081] RDX: 0000000000000000 RSI: ffffffff8164d5c0 RDI: ffff88809ca9e238 [ 633.759390][T19081] RBP: ffff888099ee7d18 R08: 0000000000000002 R09: ffff88808cbc6f58 [ 633.767367][T19081] R10: fffffbfff138b140 R11: ffffffff89c58a07 R12: ffff88808c7c0600 [ 633.775346][T19081] R13: 1ffff110133dcf92 R14: ffff888099ee7cf0 R15: ffff88809ca9e1c8 [ 633.783342][T19081] ? posix_cpu_timer_del+0x2f0/0x3b0 [ 633.788627][T19081] ? posix_cpu_timer_del+0x2f0/0x3b0 [ 633.793899][T19081] ? lock_acquire+0x190/0x410 [ 633.798682][T19081] ? thread_cpu_clock_getres+0x90/0x90 [ 633.804136][T19081] ? thread_cpu_clock_getres+0x90/0x90 [ 633.813889][T19081] exit_itimers+0xdb/0x2e0 [ 633.818303][T19081] do_exit+0x1980/0x2e60 [ 633.822553][T19081] ? __sched_text_start+0x8/0x8 [ 633.827476][T19081] ? do_group_exit+0x2e2/0x360 [ 633.832408][T19081] ? mm_update_next_owner+0x640/0x640 [ 633.837880][T19081] ? preempt_schedule_common+0x63/0xe0 [ 633.843326][T19081] ? preempt_schedule+0x4b/0x60 [ 633.848161][T19081] ? ___preempt_schedule+0x16/0x20 [ 633.853268][T19081] do_group_exit+0x135/0x360 [ 633.858130][T19081] __x64_sys_exit_group+0x44/0x50 [ 633.863229][T19081] do_syscall_64+0xfa/0x760 [ 633.867723][T19081] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 633.873596][T19081] RIP: 0033:0x459879 [ 633.877477][T19081] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 633.897253][T19081] RSP: 002b:00007ffe9b80a0f8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 633.905657][T19081] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 0000000000459879 [ 633.913640][T19081] RDX: 0000000000413561 RSI: fffffffffffffff7 RDI: 0000000000000000 [ 633.921593][T19081] RBP: 0000000000000000 R08: ffffffffffffffff R09: 00007ffe9b80a150 [ 633.929548][T19081] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 633.937503][T19081] R13: 00007ffe9b80a150 R14: 0000000000000000 R15: 00007ffe9b80a160 [ 633.947624][T19081] Kernel Offset: disabled [ 633.952207][T19081] Rebooting in 86400 seconds..