80f330a2c263c04a183a2d6a4e8f17b185620d2b86f1b4e5610de625fee1ae7871819969c2695f59f223cdded00829a815357893d60af64c2609a158dbd618b3ebb9898b9ef027c160784ffbe51c4134b7b0d21228893598add980ab1d277ae11aa38fc89adf2102ef6e536a7edcad5d766c2e6cceaa82c486c2e7b814eff84e20adaa9702b93416a4a1161c172ebc4afb321d19b521b41d6442066d927bcce99af3976b324460caae601955661037e95f5bfd976ff26478de487a5a58bcd1ccfdc278079e05d5a72435efbcd32bc538b2dd75fa864f1db9b71ff20095a33d91adcbf21d4adb14c1dfb5ca81d0c76ba952d68f2787d14feb5dfdc7f6dc3ead1c07059e0b9a9952c9cd37d009a128bc5d1cf1a25e7685b56d91f3e63fc4a5a2b3752254a8a97ba78dca820aa4689d572b2ecc2cf5edfc8b373c5aabb23fcb3c7a186ab5de78e7af017caad691b1fb8afb12edabcf5c91c67c423aecea787b60f3f4e4020d2e33f396b97e6147806c1e523ea0ce0b426d7d35c271d7e57a4c005736e0d5e8130d83ee011d63a5fd16b93587995318209bad2ce951be1bc6220b9a90414f8a688b60e2e69563b825e75a4326d28b81466439227aca91c5b8037a2f4a9c7aa5612d115ddc041160929b064474a2d42a027693f3c40e3b999fbe734bcf6744620493aafee4201741d00cd23ac7d18d04415d124a319769b32f0730b747725ad83986fd4b39c3cc3d2eb8eb4c715bf3b7dcba27c0b1da13f03b648beffa3b0cc3606e9c3bc50635aa969816101812550143da13b05865e62e838cc5046c6817ac55561cf0e7ff3f224223fc8d7e80cfc80998cd65f3edfde9f507510aee438f6e331ddcdfb770a43a7a8f2de555021088fee31955a39fa35f282ee490d4d7099174a2c670598f4fa7eda3f5158dae74acf30959a9f7a2753e7b15caa4ef1124f109475c0da4384da3380856c24a635477139d230ebc674081e09fc875e6b69a256167672991ce3510a16660f09c78094950e3f1971fc3bc264f8ae926f11e3ad7e4378d3794db2a53c75b086f7eed80f983b8b10f40eb"}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) setuid(r1) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 330.793612][T19180] XFS (loop1): invalid log iosize: 1 [not 12-30] [ 330.814013][T19182] ntfs: (device loop0): parse_options(): Unrecognized mount option errors5recover. [ 330.822475][T19184] IPVS: ftp: loaded support on port[0] = 21 08:03:22 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty=0x68000000}}, 0x1c) 08:03:22 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$netlink(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000002) [ 330.929073][T19190] XFS (loop1): invalid log iosize: 1 [not 12-30] [ 331.012835][T19182] ntfs: (device loop0): parse_options(): Unrecognized mount option errors5recover. 08:03:22 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xd, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:03:22 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x3, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:03:22 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty=0x6c000000}}, 0x1c) [ 331.185179][T19184] IPVS: ftp: loaded support on port[0] = 21 [ 331.252030][T19232] XFS (loop1): invalid log iosize: 1 [not 12-30] [ 331.272453][ T26] audit: type=1804 audit(1586505803.023:71): pid=19233 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/200/cgroup.controllers" dev="sda1" ino=16362 res=1 [ 331.305571][T19237] ntfs: (device loop0): parse_options(): Unrecognized mount option errors5recover. 08:03:23 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty=0x74000000}}, 0x1c) [ 331.419906][T19250] XFS (loop1): invalid log iosize: 1 [not 12-30] [ 331.485684][T19237] ntfs: (device loop0): parse_options(): Unrecognized mount option errors5recover. 08:03:23 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:03:23 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty=0x7a000000}}, 0x1c) 08:03:23 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:03:23 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xe, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:03:23 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty=0xe0000000}}, 0x1c) 08:03:23 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) prctl$PR_GET_DUMPABLE(0x3) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) fdatasync(r0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x100010, r2, 0x9749f000) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000080)=0xc) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) accept$nfc_llcp(r1, 0x0, &(0x7f00000000c0)) [ 331.901749][T19289] XFS (loop1): invalid log iosize: 1 [not 12-30] 08:03:23 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty=0xe0ffffff}}, 0x1c) 08:03:23 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x5, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) [ 332.042405][T19300] IPVS: ftp: loaded support on port[0] = 21 [ 332.053611][T19301] XFS (loop1): invalid log iosize: 1 [not 12-30] 08:03:23 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x10, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:03:24 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x6, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:03:24 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty=0xfc000000}}, 0x1c) [ 332.250691][T19332] XFS (loop1): invalid log iosize: 1 [not 12-30] [ 332.278515][T19308] IPVS: ftp: loaded support on port[0] = 21 08:03:24 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) [ 332.338754][T19357] XFS (loop1): invalid log iosize: 1 [not 12-30] 08:03:24 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x7, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:03:24 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x11, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:03:24 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty=0xfe80ffff}}, 0x1c) 08:03:24 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty=0xfec0ffff}}, 0x1c) [ 332.689498][T19387] XFS (loop1): invalid log iosize: 1 [not 12-30] 08:03:24 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setuid(r2) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:03:24 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x8, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) [ 332.792848][T19404] XFS (loop1): invalid log iosize: 1 [not 12-30] 08:03:24 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:03:24 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x12, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:03:24 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty=0xfeffffff}}, 0x1c) [ 332.930787][T19414] IPVS: ftp: loaded support on port[0] = 21 08:03:24 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x9, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) [ 333.037105][T19426] XFS (loop1): invalid log iosize: 1 [not 12-30] 08:03:24 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty=0xff000000}}, 0x1c) 08:03:24 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty=0xffff0000}}, 0x1c) [ 333.146810][T19457] XFS (loop1): invalid log iosize: 1 [not 12-30] 08:03:25 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:03:25 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xa, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:03:25 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(0xffffffffffffffff, r1, 0x0, 0x100000002) 08:03:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x800, 0x0) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f0000000040)={0xffffe60a, "25a10aa4b1e5717c5b0b7a8ce5a22b182516dd9c0019ec914f35367d93934493", 0x1, 0x7, 0x12, 0xc00000, 0x4}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) r5 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r5, 0x0) r6 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000640)=ANY=[@ANYBLOB="260000000900000000000000000000000a000000a41181cc52eb0a5660a99c068d4dda9a9e1cf50212a972afd2c8ea7cd58739425ff15300799d9a63a13fa580765b0d0000d7af4eb64a57d4d1dd10fe4a4e3af8f593e5cb2323bb29e1d3fe26cd6c2850b634cef4fb2c2cf029a29f740ecaffc5e1a2ab59a3d7396d919a4ac43c4662c2b3ba5f453f7351db4751214bd195ce5020dab924d75ab134b60bdc37723a1e7dd269a103f072f3a8930b5e3c0e03a124a63cfdf8eba82f46036d3f799d2a9018bb01a2748b0f4e7044685a1e5c1e7f46ca212423638d55", @ANYRES32=r8, @ANYBLOB="1400020000000300000000000000ffff0000000014000100ff0200100000000000000000000000015808e3f979a15b5826c4440cb897d14559f293a6d54789df8cc41f695df08410c3c7b0bf0a0d7a4a5d353dc5e6a5405f7db67054c85c4ffa713fe7aaf86ac64a4e1e71e9fbb2d8baf9fb1446c88f7fa02184297d1a0a09b28cd6fd49a0f95079e6eb85ae8409e0d66531"], 0x40}}, 0x0) sendmsg$TCPDIAG_GETSOCK(r1, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYBLOB="400100001200000028bd7000fcdbdf251a20ff014e224e23060000a000c0ffffff0800000006000000cf000000060000007f000000f10400004f70e20c987a17164a74b634af675e6958052cade9ecb1a0e73d83cb4c79c0dcc70348e1fcb616658cb69275ff47c18089ea9d86a65031af80c6f161385248c0b7562591919b05991da59a2326f1223d2147ca2020d8e16d71", @ANYRES32=r8, @ANYBLOB="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"], 0x140}, 0x1, 0x0, 0x0, 0x400c442}, 0x4000000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r6, 0x0) ioctl$TIOCMIWAIT(r6, 0x545c, 0x0) ioctl$SNDCTL_DSP_SETFMT(r5, 0xc0045005, &(0x7f00000000c0)) fcntl$getflags(r4, 0x3) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(r2, 0x0, 0x2, &(0x7f0000000100)) 08:03:25 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty=0xffff1f00}}, 0x1c) [ 333.489382][T19472] XFS (loop1): invalid log iosize: 1 [not 12-30] 08:03:25 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty=0xffff80fe}}, 0x1c) 08:03:25 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(0xffffffffffffffff, r1, 0x0, 0x100000002) [ 333.585241][T19483] IPVS: ftp: loaded support on port[0] = 21 08:03:25 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xb, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) [ 333.648668][T19493] XFS (loop1): invalid log iosize: 1 [not 12-30] [ 333.706129][T19491] IPVS: ftp: loaded support on port[0] = 21 08:03:25 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty=0xffffc0fe}}, 0x1c) 08:03:25 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x48, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:03:25 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:03:25 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(0xffffffffffffffff, r1, 0x0, 0x100000002) 08:03:25 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xc, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:03:25 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty=0xffffff7f}}, 0x1c) [ 333.982594][T19558] XFS (loop1): invalid log iosize: 1 [not 12-30] [ 334.036886][T19563] IPVS: ftp: loaded support on port[0] = 21 08:03:25 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty=0xffffffe0}}, 0x1c) 08:03:25 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) [ 334.125459][T19573] XFS (loop1): invalid log iosize: 1 [not 12-30] 08:03:26 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty=0xfffffffe}}, 0x1c) 08:03:26 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4c, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:03:26 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xd, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:03:26 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) [ 334.410409][T19614] IPVS: ftp: loaded support on port[0] = 21 08:03:26 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xe, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) [ 334.541778][T19622] XFS (loop1): invalid log iosize: 1 [not 12-30] 08:03:26 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x2}, 0x1c) [ 334.656402][T19657] XFS (loop1): invalid log iosize: 1 [not 12-30] 08:03:26 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x400343142, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) fcntl$notify(r1, 0x402, 0x80000019) openat$smackfs_relabel_self(0xffffffffffffff9c, &(0x7f0000002580)='/sys/fs/smackfs/relabel-self\x00', 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x1, &(0x7f0000000000)=0xffff, 0x4) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) r3 = getuid() r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x7, &(0x7f0000002380)=[{&(0x7f0000000140)="ff123bf72d800d6609f2cdf165ea6c4ed470f1ba82b2d18bfe583f76d84d5c0ef582a6d2cb59", 0x26, 0x4}, {&(0x7f0000000180)="7fb2a816879e71fceb98a78274148eaead675f5c3243418c81b81b57898a391cb7a88b63ae58c05849ee073eacbaafa6565bb4a869ac5328f63c94b089f8f1d8e91623f0e0d17bea9fd4ca8046760cf742c2f0a04e5b5c5c1c494ad16f17e579efa09bed48", 0x65, 0x9}, {&(0x7f0000000200)="3c3c3e90595ad2e408deb6b435a3f27331d6d2c009c444e8624f2be5210a95391b8813ca2639295c2395ff98ace4112868cebc88952fdb50185512c281ef7f01fd079000fe94d46c064d30586d932d9d294ea92aafb6d942e2ba0a968a27e905c98ca5783cc4a593b1a08732b093679dd8bc11b3b747a99992026ca9dd531e44c8d80d0060ebd4c4df473dd3e12aa87430e62136660f12ca8936c81c", 0x9c, 0xd7}, {&(0x7f00000002c0)="23e362c7adef1cdebef1e1e91a36c3f8138c98103e9aef748917679f8d5ffacb434f2a45476e16ded2107f19bd6009cb10c0f21fc627579fb6ebb4fefaecbecbf729616c4ffc439ed2fb3b94aaf7406b", 0x50, 0x3f}, {&(0x7f0000000340)="3bdfb4e3378f6226ce8da84025ba02f77d04fd2b8c8569c2d4529de71b9b657352cf7c", 0x23, 0x641}, {&(0x7f0000000380)="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", 0x1000, 0x5}, {&(0x7f0000001380)="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", 0x1000, 0x9}], 0x40000, &(0x7f0000002440)={[{@biosize={'biosize', 0x3d, 0x380000000}}, {@nogrpid='nogrpid'}, {@logbufs={'logbufs', 0x3d, 0x8}}, {@logbsize={'logbsize', 0x3d, [0x38, 0x38, 0x65, 0x0, 0x32, 0x30]}}, {@logbsize={'logbsize', 0x3d, [0x6b, 0x0, 0x6b]}}], [{@fowner_eq={'fowner', 0x3d, r2}}, {@obj_type={'obj_type', 0x3d, '-systemeth0-}nodev.lo'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<', r3}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@obj_role={'obj_role', 0x3d, ':proc'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<', r5}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:03:26 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x5c, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:03:26 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x10, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:03:26 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x3}, 0x1c) [ 334.825746][T19673] IPVS: ftp: loaded support on port[0] = 21 08:03:26 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) [ 334.935804][T19684] XFS (loop1): invalid log iosize: 1 [not 12-30] 08:03:26 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x4}, 0x1c) [ 334.993002][T19673] IPVS: ftp: loaded support on port[0] = 21 [ 335.108226][T19707] XFS (loop1): invalid log iosize: 1 [not 12-30] 08:03:27 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x60, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:03:27 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x5}, 0x1c) [ 335.177160][T19691] __ntfs_error: 28 callbacks suppressed [ 335.177170][T19691] ntfs: (device loop0): parse_options(): Unrecognized mount option errors5recover. [ 335.199331][ T26] audit: type=1804 audit(1586505806.943:79): pid=19737 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/208/cgroup.controllers" dev="sda1" ino=16383 res=1 08:03:27 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x11, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:03:27 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:03:27 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x6}, 0x1c) [ 335.468468][T19751] ntfs: (device loop0): parse_options(): Unrecognized mount option errors5recover. [ 335.478304][T19750] XFS (loop1): invalid log iosize: 1 [not 12-30] 08:03:27 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x7}, 0x1c) [ 335.550178][ T26] audit: type=1804 audit(1586505807.303:80): pid=19758 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/209/cgroup.controllers" dev="sda1" ino=16383 res=1 08:03:27 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = socket(0x10, 0x800000000080002, 0x10) r2 = syz_genetlink_get_family_id$smc(&(0x7f0000000100)='SMC_PNETID\x00') sendmsg$SMC_PNETID_ADD(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="01000000000000000000020000001400020076657468315f746f5f626174616476900900030073797a3000000000090001006703000000000000"], 0x40}}, 0x0) sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='hon\x00', @ANYRES16=r2, @ANYBLOB="02002dbd7000fddbdf25020000000900010073797a30000000000900010073797a320000000005000400010000001400020076657468315f766972745f77696669000900030073797a320000000005000400020000000900030073797a3100000000"], 0x68}}, 0xab82ff571d9be74d) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 335.618182][T19764] XFS (loop1): invalid log iosize: 1 [not 12-30] [ 335.622024][T19751] ntfs: (device loop0): parse_options(): Unrecognized mount option errors5recover. [ 335.666277][T19772] IPVS: ftp: loaded support on port[0] = 21 08:03:27 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x8}, 0x1c) 08:03:27 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x12, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:03:27 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x68, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) [ 335.769799][T19798] IPVS: ftp: loaded support on port[0] = 21 [ 335.873586][T19808] ntfs: (device loop0): parse_options(): Unrecognized mount option errors5recover. 08:03:27 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x9}, 0x1c) 08:03:27 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000002) [ 335.986293][T19822] XFS (loop1): invalid log iosize: 1 [not 12-30] [ 335.994876][ T0] NOHZ: local_softirq_pending 08 [ 335.995872][T19808] ntfs: (device loop0): parse_options(): Unrecognized mount option errors5recover. 08:03:27 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0xa}, 0x1c) 08:03:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000280)=0xc) setuid(r1) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000001c0)=@buf={0xfc, &(0x7f00000000c0)="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"}) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000080)) [ 336.125944][T19845] IPVS: ftp: loaded support on port[0] = 21 08:03:27 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x25, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:03:28 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0xb}, 0x1c) 08:03:28 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000002) [ 336.259457][T19848] XFS (loop1): invalid log iosize: 1 [not 12-30] 08:03:28 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x6c, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) [ 336.339259][T19871] ntfs: (device loop0): parse_options(): Unrecognized mount option errors5recover. 08:03:28 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0xc}, 0x1c) [ 336.404283][T19849] IPVS: ftp: loaded support on port[0] = 21 08:03:28 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000002) [ 336.461458][T19871] ntfs: (device loop0): parse_options(): Unrecognized mount option errors5recover. 08:03:28 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x440080, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) setuid(r1) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) ioctl$VIDIOC_S_CROP(r2, 0x4014563c, &(0x7f0000000000)={0xa, {0x6, 0x2, 0x80000000, 0x4}}) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x8e922ff03185248, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x2) [ 336.592989][T19914] XFS (loop1): invalid log iosize: 1 [not 12-30] 08:03:28 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:03:28 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x48, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:03:28 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0xd}, 0x1c) 08:03:28 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x74, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) [ 336.794719][T19929] IPVS: ftp: loaded support on port[0] = 21 [ 336.842662][T19936] ntfs: (device loop0): parse_options(): Unrecognized mount option errors5recover. 08:03:28 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0xe}, 0x1c) 08:03:28 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4c, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) [ 337.104534][T19960] XFS (loop1): invalid log iosize: 1 [not 12-30] 08:03:28 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x10}, 0x1c) [ 337.309373][T19960] XFS (loop1): invalid log iosize: 1 [not 12-30] [ 337.327999][T19986] IPVS: ftp: loaded support on port[0] = 21 08:03:29 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x5c, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:03:29 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x11}, 0x1c) 08:03:29 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7a, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:03:29 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x12}, 0x1c) [ 337.615315][T20012] XFS (loop1): invalid log iosize: 1 [not 12-30] [ 337.758515][T20012] XFS (loop1): invalid log iosize: 1 [not 12-30] 08:03:33 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x60, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:03:33 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:03:33 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x18}, 0x1c) 08:03:33 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x300, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:03:33 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r1, 0xc05064a7, &(0x7f0000000280)={&(0x7f0000000040)=[0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], 0x5, 0x1, 0x4, 0x0, 0x3b7}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x4, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:03:33 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) ioctl$TCSETX(r0, 0x5433, &(0x7f0000000040)={0xffff, 0x5, [0x3, 0xffff, 0x7ff, 0x5, 0x69f5], 0x3f}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="38deffff0514000425bd7000fcdbdf25080001000200ff7f0000000000000000080001000200000100000000000000000000000000000000c042e474eb362ae5426397776065"], 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x884) setuid(r2) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:03:33 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x25}, 0x1c) [ 342.206623][T20039] IPVS: ftp: loaded support on port[0] = 21 [ 342.220614][T20041] __ntfs_error: 5 callbacks suppressed [ 342.220625][T20041] ntfs: (device loop0): parse_options(): Unrecognized mount option errors5recover. 08:03:34 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141243, 0x190) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x80000000, {{0xa, 0x0, 0x7, @rand_addr="01f0dafc6618c04826be37c91330e20d", 0xfffffffd}}, {{0xa, 0x0, 0x1, @remote}}}, 0x108) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x40, 0x2, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0xa}, [@IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e20}, @IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x7}]}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x7}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}]}, 0x40}}, 0x890) 08:03:34 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x48}, 0x1c) [ 342.319124][T20036] XFS (loop1): invalid log iosize: 1 [not 12-30] 08:03:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x498a00, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f00000001c0)={0x0, r0, 0x401, 0x877, 0x6, 0x1}) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r2, 0xc0585605, &(0x7f0000000140)={0x1, 0x0, {0x1000, 0x4, 0x2015, 0x6, 0x3, 0x6, 0x1, 0x4}}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) write$P9_RUNLINKAT(r3, &(0x7f0000000080)={0x7, 0x4d, 0x2}, 0x7) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r2, 0xc4c85513, &(0x7f00000002c0)={{0x4, 0x2, 0xffffffff, 0x3, '\x00', 0x7}, 0x1, [0xe2, 0x9, 0x2, 0x100, 0xfff, 0x1, 0x1ff, 0x0, 0x80000000, 0x3, 0x20, 0x101, 0x3f, 0x2, 0xffffffffffff7952, 0xdec8, 0x7ff, 0xf34, 0x401, 0x2, 0x1000, 0x917, 0x4, 0x9, 0x0, 0x7, 0x8, 0x20, 0x800, 0x9, 0x8, 0x5, 0xb8, 0x40, 0x2, 0x6, 0x7, 0xffffffffffff7fff, 0x100, 0x80000000000, 0xbe, 0x8, 0x6, 0xfffffffffffffffa, 0x1, 0xffffffffffffffff, 0x3, 0x1, 0x9, 0x9, 0x3, 0x7, 0x7, 0x9, 0x7c25, 0x1, 0x80000001, 0xfffffffffffffffb, 0x9, 0x9, 0xfffffffffffffffe, 0x8, 0x5, 0xffffffff, 0x8000, 0x100000000, 0x4, 0xfff, 0x6, 0x7, 0xffffffffffff0001, 0x28eec00c, 0x1, 0x9, 0x8000, 0xb2, 0x8000, 0x7f, 0x1, 0x7, 0x7, 0x8, 0x10001, 0x800, 0x20, 0x4, 0x81, 0x6, 0x100000001, 0xfffffffffffffffc, 0x0, 0x8, 0x6, 0x0, 0x9, 0x6, 0x2, 0x0, 0x1000, 0x7, 0x7ff, 0x4, 0x1, 0x4, 0x0, 0x200, 0x0, 0x9, 0x6, 0x100000000, 0x2, 0x2, 0x3, 0x78, 0x1, 0x9c35, 0x10000, 0x7, 0x5, 0x6, 0x7fff, 0x63, 0x7, 0x5, 0x0, 0x5fb0, 0x0, 0x100000001]}) setsockopt$PNPIPE_HANDLE(r2, 0x113, 0x3, &(0x7f0000000040)=0x8, 0x4) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r4, 0x800442d2, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @remote}]}) setuid(r1) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 342.469819][T20041] ntfs: (device loop0): parse_options(): Unrecognized mount option errors5recover. 08:03:34 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x4c}, 0x1c) 08:03:34 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x200, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @rand_addr="50ff4931eb9756a0fc9a94974c30fa07"}}, {{0xa, 0x0, 0x0, @mcast1, 0x4}}}, 0x108) 08:03:34 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x68, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) [ 342.715220][T20097] IPVS: ftp: loaded support on port[0] = 21 [ 342.791497][T20100] ntfs: (device loop0): parse_options(): Unrecognized mount option errors5recover. [ 342.910539][T20100] ntfs: (device loop0): parse_options(): Unrecognized mount option errors5recover. [ 342.925612][T20130] IPVS: ftp: loaded support on port[0] = 21 [ 342.959527][ T26] audit: type=1804 audit(1586505814.713:82): pid=20047 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/214/cgroup.controllers" dev="sda1" ino=16361 res=1 08:03:34 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:03:34 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x64}, 0x1c) 08:03:34 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x500, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:03:34 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2, 0x2001) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:03:34 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x6c, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:03:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000280)=0xc) setuid(r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x40000, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$bt_bnep(0x1f, 0x3, 0x4) 08:03:34 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000140)={0x0, {{0xa, 0x4, 0xfffffffc, @dev={0xfe, 0x80, [], 0x26}, 0x986}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) [ 343.157935][T20165] ntfs: (device loop0): parse_options(): Unrecognized mount option errors5recover. 08:03:34 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x68}, 0x1c) 08:03:35 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x6c}, 0x1c) [ 343.290380][T20165] ntfs: (device loop0): parse_options(): Unrecognized mount option errors5recover. 08:03:35 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) ioctl$TIOCGDEV(r2, 0x80045432, &(0x7f0000000040)) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18, 0x1, 0x0, {0x9}}, 0x18) [ 343.372045][T20171] IPVS: ftp: loaded support on port[0] = 21 08:03:35 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x74, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) [ 343.453827][T20158] XFS (loop1): invalid log iosize: 1 [not 12-30] 08:03:35 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x74}, 0x1c) [ 343.623272][T20174] IPVS: ftp: loaded support on port[0] = 21 [ 343.637373][T20220] ntfs: (device loop0): parse_options(): Unrecognized mount option errors5recover. [ 343.713462][T20220] ntfs: (device loop0): parse_options(): Unrecognized mount option errors5recover. [ 343.864182][ T26] audit: type=1804 audit(1586505815.613:83): pid=20179 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/215/cgroup.controllers" dev="sda1" ino=16359 res=1 08:03:35 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:03:35 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000280)={0x1, 0x5, 0x4, 0x20000, 0x3, {0x0, 0x2710}, {0x1, 0x0, 0x7f, 0x9, 0x4, 0x1, "f09f7675"}, 0xffffffff, 0x4, @fd=r2, 0x0, 0x0, r0}) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2c, &(0x7f0000000000)={0x9, {{0xa, 0x4e23, 0x7ff, @ipv4={[], [], @empty}, 0xfffffffe}}, {{0xa, 0x4e24, 0x739, @remote, 0x3ea5}}}, 0x108) 08:03:35 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x600, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:03:35 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x7a}, 0x1c) 08:03:35 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x7a, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:03:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x802) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) ioctl$VIDIOC_DQBUF(r3, 0xc0585611, &(0x7f0000000100)={0x1a, 0x5, 0x4, 0x180000, 0x8, {0x77359400}, {0x4, 0x0, 0x8, 0x1f, 0x20, 0x20, "e1c65d4c"}, 0xffff, 0x2, @fd, 0x4, 0x0, 0xffffffffffffffff}) ioctl$KVM_SET_TSC_KHZ(r4, 0xaea2, 0x348ebcb8) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x1a640, 0x0) ioctl$TUNSETSNDBUF(r5, 0x400454d4, &(0x7f00000000c0)=0x1000004) setuid(r1) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:03:35 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0xe0}, 0x1c) [ 344.066749][T20260] IPVS: ftp: loaded support on port[0] = 21 08:03:35 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x19a, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:03:36 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0xfc}, 0x1c) [ 344.283797][T20269] XFS (loop1): invalid log iosize: 1 [not 12-30] [ 344.360723][T20260] IPVS: ftp: loaded support on port[0] = 21 08:03:36 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @empty}}, {{0xa, 0x0, 0x0, @empty}}}, 0x8c) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) stat(&(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)) setuid(r3) getgroups(0x1, &(0x7f0000000000)=[0x0]) write$FUSE_ENTRY(r1, &(0x7f0000000040)={0x90, 0x0, 0x7, {0x1, 0x3, 0x1, 0x1, 0xfc4, 0xfffffffe, {0x5, 0x100000001, 0x6, 0x8, 0x3, 0x7fff, 0x6, 0x4e7, 0x8000, 0x10000, 0x101, r3, r4, 0x0, 0x7}}}, 0x90) 08:03:36 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x300}, 0x1c) 08:03:36 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x700, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:03:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:03:36 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x500}, 0x1c) 08:03:36 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x19b, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:03:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x22000, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='cpuacct.usage\x00', 0x2, 0x0) 08:03:36 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x8100, 0x0) fcntl$setpipe(r0, 0x407, 0x3ff) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000140)={0x0, {{0xa, 0x80, 0x0, @dev={0xfe, 0x80, [], 0x44}, 0x7fffffff}}, {{0xa, 0x0, 0x100000, @mcast2}}}, 0x108) 08:03:36 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x600}, 0x1c) 08:03:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) [ 344.780153][T20356] IPVS: ftp: loaded support on port[0] = 21 08:03:36 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000002c0)={0x0, 0x2, 0x7af, 0xffffffffffffffff, 0x0, &(0x7f0000000280)={0x990a69, 0xffffffff, [], @p_u16=&(0x7f0000000100)=0x2897}}) ioctl$VFIO_IOMMU_UNMAP_DMA(r1, 0x3b72, &(0x7f0000000300)={0x18, 0x3, 0x9f2e, 0x9}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x3, 0x0, @initdev={0xfe, 0x88, [], 0xfd, 0x0}}}}, 0x108) r3 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000000040)=0x10, 0x800) getsockopt$SO_TIMESTAMPING(r3, 0x1, 0x41, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 08:03:36 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x700}, 0x1c) [ 344.919791][T20356] IPVS: ftp: loaded support on port[0] = 21 [ 344.929308][T20349] XFS (loop1): invalid log iosize: 1 [not 12-30] 08:03:36 executing program 2: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r1, r0, 0x0, 0x100000002) 08:03:36 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x264, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:03:36 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x900, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:03:36 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x900}, 0x1c) 08:03:36 executing program 2: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r1, r0, 0x0, 0x100000002) 08:03:36 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) write$ppp(r0, &(0x7f0000000000)="69120e4f54e137801f5892479b6c3aac6ef375a29e24f457eb8eaef4fc9273a47f62ffaf9a453e280c91f0c8b930f848015441a336017e6638b5d1c665ade76c98dfb418a28ac862d5e0e940684094e47685991db031f789eb1610b8f4c0ab8abacae615d304786a0734d0aeb0e6a7a5b552a8599c350fec14ae304c5788ea988015bbd6ba5a120c4f319312921c1af23826e3295b59984ca3fabcfd193e69da9e0367240d71379eb925cf08a94f5b2f40", 0xb1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:03:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) setuid(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x4, 0x6, &(0x7f0000000440)=[{&(0x7f0000000080)="dbc8398420", 0x5, 0x2}, {&(0x7f00000000c0)="a8cf57b24a0664a76cd3fb569399805a4592107042a5d60ac53c2d2347194388756dc18f266c442833ec29fa514b3825cbb2b66d4e3051491a9c5b7171eb55bacad3fd19c9d19879ebef8bcee8be5a9c79c158c3176f5a2590dea30c28dac5f2338bc1766c54b74e5f83cf58c4b1690f24f0154087299df82be40d670d22b038f149fdb674f08cc2a625d0ae31080b2cc61eb25212864c983ea3213cf7b9d953c0f0298588ecbbc85a9241cf8522034816ae2b3063799a0301c0c04b456927f9bc5e07d99060a66b951dba76cd8d23", 0xcf, 0x3bca}, {&(0x7f00000001c0)="5b375948e4312277da7b1f9973c72a21d3586aa97ab45a82a210106f3f80349af883d081926bd8efe3b6d552d0aae7280633440a40039b17b7b8f9e07eb3a894e9eec24d6d09642867eb9c360e4f53c7b1f02ba0991699f87e9ed1d6a1635de1d0ad91ff807df65a63bf6bd5d928c0", 0x6f, 0x40}, {&(0x7f00000002c0)="8464462dedb060a7c7624f90c06ed0afbb31a019f4f5f9582088203e886b98554fc054952616ebebb42bd2ba26eff16384ffc7c08bcda68c3bfd1d1604", 0x3d, 0xb9e5}, {&(0x7f0000000300)="be21d7eb191aab618da14a084b18fced8fd1b397c7e69144f16e1854bf1f8c6d0549e25f0b18520807a85a47cdfac4f5b46006b00302725ca5c6d787b7c54cf74bdbe7d707c3c65d251fa411353c3cc9d019e1a3ab30636318170530e3055de5f7c0b0ffe7b8dce04d2dbd74c10951d740f693a224895187421b1bb19e730f53388fecb3cc6cce63cc2f9229af3b253a533c2539557332bfd4b4771a2e6e0430ad3d1d2305bf3ccb62a1045b8fde926817f7d216c112e1bf237db00b603e87a559f9b5509e777b76326947edf0cf6aaad559835cfe5bfbcfeb0501e120fed67723b931267b67a264", 0xe8, 0x7}, {&(0x7f0000000400)="98be590314e506760be0f2a1a8d0d32f180aa56902feace973d0cf4eaafaef996461aa1063b901d806fe0662", 0x2c, 0x101}], 0x995802, &(0x7f0000000700)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX=r2, @ANYBLOB="2c6469725f756d61736b3d30303030303030303030303030303030303030303030322c696f636861727365743d69736f383835392d342c7569643d8beca1f97128352757a6cfa180b872415134ae6588f9ae631f04690297f7ac4ae2678b731c6c78f2c8231acf4dad9c8a604e3b4861e6f5de591c10a14e71c8f5addca77d17233769cc12b02a50ef38d203129ad24858d12051cc3e7069dcf07909fbbc500fab656a2d06fcc88a127e3d40b0fbd5aa3f21ef86751c22c545e1f2446daaa4c6c280b5ed0d76d33055e97dd0b83e61f3c679e59b959998a65a0e35e886f82a57f03ab8c386ad092a57260d46f19e666848d94faf126604e8c5e93d0874c3e32b847fbef35eec645699ef77d32491950ae8627f84", @ANYRESHEX=r4, @ANYBLOB="2c63726561746f723d4e66b30c2c63726561746f723d37f7e8642c736d61636b66737472616e736d7574653d24796c6f73797374656d656d312c6d6561737572652c646f6e745f686173682c7375626a5f726f6c653d2c7375626a5f726f6c653d2c736d61636b66737472616e736d7574653d2e40252e2d27706f7369785f61636c5f6163636573732a47504c6370757365742d47504c5e23842e4028022c66736d616769633d3078303030303030303030303030303030322c00"]) r5 = socket$key(0xf, 0x3, 0x2) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_RD_TIME(r5, 0x80247009, &(0x7f0000000500)) 08:03:37 executing program 2: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r1, r0, 0x0, 0x100000002) 08:03:37 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0xa00}, 0x1c) 08:03:37 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) ioctl$SG_GET_COMMAND_Q(r1, 0x2270, &(0x7f0000000000)) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000040)) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 345.334749][T20441] IPVS: ftp: loaded support on port[0] = 21 08:03:37 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x265, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:03:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:03:37 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0xb00}, 0x1c) 08:03:37 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x4e23, 0x0, @loopback}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x8000, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}, @IFA_ADDRESS={0x14, 0x1, @mcast2}]}, 0x40}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x28, 0x15, 0x2, 0x70bd26, 0x25dfdbfb, {0x2, 0x18, 0x22, 0xc8, r4}, [@IFA_ADDRESS={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x1a}}, @IFA_ADDRESS={0x8, 0x1, @multicast1}]}, 0x28}, 0x1, 0x0, 0x0, 0x4044805}, 0x20008040) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000000280)={[], 0x1000, 0x8001, 0x9, 0x0, 0xfffd, 0x3000, 0x10000, [], 0x5}) setsockopt$inet6_group_source_req(r2, 0x29, 0x2c, &(0x7f0000000440)={0x6, {{0xa, 0x4e20, 0x9, @ipv4={[], [], @local}, 0x100}}, {{0xa, 0x4e21, 0xae57, @empty, 0x7fffffff}}}, 0x108) [ 345.583845][T20486] IPVS: ftp: loaded support on port[0] = 21 [ 345.745780][T20445] XFS (loop1): invalid log iosize: 1 [not 12-30] 08:03:37 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xa00, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:03:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:03:37 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0xc00}, 0x1c) 08:03:37 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) ioctl$CAPI_GET_PROFILE(r1, 0xc0404309, &(0x7f0000000000)) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 346.083159][T20538] XFS (loop1): invalid log iosize: 1 [not 12-30] [ 346.244478][T20547] XFS (loop1): invalid log iosize: 1 [not 12-30] 08:03:41 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:03:41 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x300, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:03:41 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:03:41 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) rt_sigreturn() setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x4, 0x7, @dev={0xfe, 0x80, [], 0x19}}}, {{0xa, 0x0, 0x0, @remote, 0x4}}}, 0x108) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000040)={0xc6b1, 0xb, 0x4, 0x400000, 0xff, {0x0, 0x7530}, {0x1, 0x2, 0x0, 0xf7, 0x1, 0x1, "7ce7ebba"}, 0x8, 0x2, @planes=&(0x7f0000000000)={0x10c, 0x5, @mem_offset=0x101, 0x1ff}, 0x0, 0x0, r2}) connect$ax25(r3, &(0x7f00000000c0)={{0x3, @default, 0x1}, [@default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @bcast]}, 0x48) 08:03:41 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0xd00}, 0x1c) 08:03:41 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xacf, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:03:41 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:03:41 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x2, 0x0) accept4$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:03:41 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0xe00}, 0x1c) [ 350.101294][T20581] IPVS: ftp: loaded support on port[0] = 21 [ 350.115314][T20577] __ntfs_error: 10 callbacks suppressed [ 350.115324][T20577] ntfs: (device loop0): parse_options(): Unrecognized mount option errors5recover. 08:03:42 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x1100}, 0x1c) [ 350.245475][T20579] XFS (loop1): invalid log iosize: 1 [not 12-30] 08:03:42 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x4e21, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = openat(r1, &(0x7f0000000000)='./file0\x00', 0x127000, 0x100) ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f0000000040)={0x3, [0x7, 0x1, 0x8]}) 08:03:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) [ 350.294377][T20577] ntfs: (device loop0): parse_options(): Unrecognized mount option errors5recover. [ 350.461693][T20628] IPVS: ftp: loaded support on port[0] = 21 08:03:42 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xad0, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:03:42 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x1200}, 0x1c) 08:03:42 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x500, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:03:42 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}}}, {{0xa, 0x0, 0x0, @remote, 0x453}}}, 0x108) 08:03:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000280)=0xc) setuid(r1) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:03:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) [ 350.688720][T20668] IPVS: ftp: loaded support on port[0] = 21 08:03:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:03:42 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x1800}, 0x1c) 08:03:42 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) io_uring_enter(r3, 0xf948, 0x100, 0x1, &(0x7f00000000c0)={[0x5]}, 0x8) r4 = socket(0x10, 0x803, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000600)=ANY=[@ANYBLOB="406fd2f61000b59500000000000000000a00000003efb868bb935ed822e98e3c3b39453deaa27bbc007ca5414b2e74d8c3e87103acd65fa28a5fa5ccf2c283e5e5e61d78880c17b9e1f2a369c6ae0c02b9074d5a729339ab7b705bb097f299dcaf53bc31271a4d62bbb2caf63ab4d0f524c42ebfd253c483d278b24d9d10b011cf697c7e9025b6c4f61bfc25ae12e8eb3a12712cf96e286477d69fb6348fde84610400c08822dd9a1bfff492df36064e", @ANYRES32=r6, @ANYBLOB="1400020000000000000000000000ffff0000000014000100ff020000000000000000000000000001"], 0x40}}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000400)={@local}, &(0x7f0000000440)=0x14) r7 = socket(0x10, 0x803, 0x0) r8 = socket(0x1, 0x803, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r9}, [@IFA_LOCAL={0x14, 0x2, @ipv4}, @IFA_ADDRESS={0x14, 0x1, @mcast2}]}, 0x40}}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f00000005c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x3f, r2, 0x4, 0x70bd2d, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 350.786335][T20662] ntfs: (device loop0): parse_options(): Unrecognized mount option errors5recover. 08:03:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:03:42 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x2500}, 0x1c) [ 350.918620][T20662] ntfs: (device loop0): parse_options(): Unrecognized mount option errors5recover. 08:03:42 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x600, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) [ 351.055621][T20666] XFS (loop1): invalid log iosize: 1 [not 12-30] [ 351.140979][T20714] ntfs: (device loop0): parse_options(): Unrecognized mount option errors5recover. 08:03:43 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xb00, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:03:43 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) sendmsg$can_j1939(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)="148c36423f7475192d065d9d0b71058a925a6c414e28bafbed477a860f569846a3cad5e818b43b8f1f4e336f76d249cc68e415e187884db48c7f4aed2ca6cb89455055fc2b5b5a0299c5d86b364d776d78f200566a2fb2fc307f04974742c513fe4ce9b920db52eb59ca41383a00998367a383ea3947a222ca353c34c955cfd888b3a9007f70b5e35c272fcdb2225b3e30dfaf2825789084466b3f19309b4432fdc5fe6a7d37c470227c8881ca3c06629a56de764c6fcbd4d2deb8ec3388141e9c34b36c8326c5b15255d563bb7aa1238ba1d88b9f", 0xd5}, 0x1, 0x0, 0x0, 0x1bac650b48a97bc3}, 0x20000000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:03:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) [ 351.221584][T20716] XFS (loop1): invalid log iosize: 1 [not 12-30] 08:03:43 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x3f00}, 0x1c) 08:03:43 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00') socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c150000aa5ff3cce66d6707e8afa2c58278574fe48c82fc4f96f8e947e64db429914b77", @ANYRES16=r3, @ANYBLOB="010000000000000000000f00000008000300", @ANYRES32=0x0, @ANYBLOB], 0x1c}}, 0x0) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r4, 0x84, 0xc, &(0x7f0000000280)=0x80000000, 0x4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r5, 0x0) sendmsg$AUDIT_GET(r5, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x10, 0x3e8, 0x300, 0x70bd2a, 0x25dfdbfe, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x240000c4}, 0x4008800) sendmsg$BATADV_CMD_GET_DAT_CACHE(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x5c, r3, 0x400, 0x70bd2b, 0x25dfdbbf, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3f}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8000}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40000}, 0x40011) 08:03:43 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x700, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:03:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) [ 351.388441][T20728] IPVS: ftp: loaded support on port[0] = 21 08:03:43 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x4800}, 0x1c) 08:03:43 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0xffffffff, @loopback}}, {{0xa, 0x0, 0x10000, @dev={0xfe, 0x80, [], 0x32}}}}, 0x108) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x4cee225, 0x2000) getsockopt$rose(r1, 0x104, 0x4, &(0x7f0000000100), &(0x7f0000000280)=0x4) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) fsetxattr(r2, &(0x7f0000000000)=@random={'osx.', '\x00'}, &(0x7f0000000040)='em1ppp0&\x00', 0x9, 0x3) 08:03:43 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x4c00}, 0x1c) 08:03:43 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x8, 0x4) 08:03:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) [ 351.693253][T20740] ntfs: (device loop0): parse_options(): Unrecognized mount option errors5recover. [ 351.733046][T20774] IPVS: ftp: loaded support on port[0] = 21 [ 351.745572][T20737] XFS (loop1): invalid log iosize: 1 [not 12-30] 08:03:43 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xc00, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:03:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x8000, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) getsockopt$inet6_dccp_int(r3, 0x21, 0x12, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$SIOCX25GFACILITIES(r2, 0x89e2, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f0000000140)=""/24, &(0x7f0000000180)=0x18) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$SNDRV_PCM_IOCTL_LINK(r2, 0x40044160, &(0x7f00000001c0)=0x5) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) ioctl$UI_GET_VERSION(r4, 0x8004552d, &(0x7f0000000200)) 08:03:43 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fstat(r0, &(0x7f0000000000)) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000140)={0x0, {{0xa, 0x4e22, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:03:43 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x6400}, 0x1c) 08:03:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:03:43 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x900, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:03:43 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x6800}, 0x1c) 08:03:44 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x30d000, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000080)={r4, 0x0, 0x10}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=r4, &(0x7f0000000080)=0x4) [ 352.214600][T20829] IPVS: ftp: loaded support on port[0] = 21 08:03:44 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:03:44 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x6c00}, 0x1c) 08:03:44 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f00000000c0)={0x58, 0xb, 0x6, 0x801, 0x0, 0x0, {0x7}, [@IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_PROTO={0x5}, @IPSET_ATTR_COMMENT={0x7, 0x1a, '-\\\x00'}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x8001}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x58}}, 0x8) connect$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x2711, @host}, 0x10) 08:03:44 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x7400}, 0x1c) [ 352.476148][T20831] IPVS: ftp: loaded support on port[0] = 21 [ 352.494854][T20824] ntfs: (device loop0): parse_options(): Unrecognized mount option errors5recover. [ 352.597564][T20816] XFS (loop1): invalid log iosize: 1 [not 12-30] 08:03:44 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x10000, 0x0) setsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f00000000c0), 0x4) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) ioctl$VT_GETMODE(r2, 0x5601, &(0x7f0000000000)) 08:03:44 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xa00, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:03:44 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x7a00}, 0x1c) 08:03:44 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xd00, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:03:44 executing program 3: r0 = syz_open_dev$vcsu(&(0x7f0000000140)='/dev/vcsu#\x00', 0xffffffffffffffff, 0x711a00) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) ioctl$KDFONTOP_COPY(r1, 0x4b72, &(0x7f0000000780)={0x3, 0x0, 0x13, 0x16, 0x5c, &(0x7f0000000380)}) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) fcntl$getown(r0, 0x9) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) ioctl$PPPIOCGIDLE(r3, 0x8010743f, &(0x7f0000000200)) write$FUSE_LK(r2, &(0x7f00000001c0)={0x28, 0x0, 0x6, {{0x4, 0xff, 0x1}}}, 0x28) r4 = geteuid() lsetxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f00000007c0)='security.capability\x00', &(0x7f0000000340)=@v3={0x3000000, [{0xff, 0xcc6d}, {0x4, 0x8}], r4}, 0x18, 0x0) accept$nfc_llcp(r1, &(0x7f00000000c0), &(0x7f0000000000)=0x100) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x10100, 0x0) setsockopt$SO_J1939_SEND_PRIO(r6, 0x6b, 0x3, &(0x7f0000000180)=0x5, 0x4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r7) clone(0xc75e43cfae26fd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:03:44 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0xe000}, 0x1c) 08:03:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x105000, 0x0) ioctl$BLKRAGET(r2, 0x1263, &(0x7f00000000c0)) setuid(r1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) ioctl$VIDIOC_S_OUTPUT(r3, 0xc004562f, &(0x7f0000000000)=0x4) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$rds(r2, &(0x7f0000000900)={&(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/225, 0xe1}], 0x1, &(0x7f0000000680)=[@cswp={0x58, 0x114, 0x7, {{0x800, 0x7}, &(0x7f0000000300)=0x400, &(0x7f0000000340)=0x3, 0x5b9, 0x1, 0x7, 0x8001, 0x0, 0x8}}, @rdma_dest={0x18, 0x114, 0x2, {0x800, 0x9}}, @mask_cswp={0x58, 0x114, 0x9, {{0x9, 0x9}, &(0x7f0000000380)=0x1, &(0x7f00000003c0)=0x4, 0x5, 0x80, 0x3, 0xb9b, 0x15, 0x3}}, @mask_cswp={0x58, 0x114, 0x9, {{0x200, 0x1}, &(0x7f0000000400)=0xffffffffffffffff, &(0x7f0000000440)=0x5, 0x7a49, 0x5, 0x1ff, 0x3, 0x8, 0x7f}}, @mask_fadd={0x58, 0x114, 0x8, {{0x4, 0x80}, &(0x7f0000000480), &(0x7f00000004c0)=0x8, 0x3, 0x1, 0x400, 0x5, 0x10, 0x1}}, @cswp={0x58, 0x114, 0x7, {{0x3, 0x4}, &(0x7f0000000500)=0x81, &(0x7f0000000540), 0x4, 0x7, 0x2, 0x6, 0x8, 0x1}}, @fadd={0x58, 0x114, 0x6, {{0x0, 0x8}, &(0x7f0000000580)=0x800, &(0x7f00000005c0)=0x1f, 0x13, 0x100000001, 0x2, 0x5, 0x70, 0x80}}, @mask_fadd={0x58, 0x114, 0x8, {{0x0, 0x2}, &(0x7f0000000600)=0x1000, &(0x7f0000000640)=0x187, 0x9, 0x4, 0x0, 0x31497cd0, 0x7}}], 0x280, 0xc0}, 0x90) 08:03:44 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0xfc00}, 0x1c) [ 353.170265][ T26] audit: type=1804 audit(1586505824.923:84): pid=20861 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/234/cgroup.controllers" dev="sda1" ino=16382 res=1 08:03:45 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:03:45 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0xff00}, 0x1c) [ 353.312883][T20927] IPVS: ftp: loaded support on port[0] = 21 [ 353.349916][T20914] XFS (loop1): invalid log iosize: 1 [not 12-30] [ 353.422519][T20915] ntfs: (device loop0): parse_options(): Unrecognized mount option errors5recover. 08:03:45 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xe00, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:03:45 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x1fffff}, 0x1c) 08:03:45 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xaf7, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) [ 353.720355][T20966] IPVS: ftp: loaded support on port[0] = 21 08:03:45 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x1000000}, 0x1c) 08:03:45 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x2000000}, 0x1c) 08:03:45 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket(0x10, 0x803, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair(0x11, 0x4, 0x4bc6bf28, &(0x7f00000005c0)={0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r5, @ANYBLOB="d57fc8d3b5a78ca942f112"], 0x3}}, 0x0) sendmsg$TIPC_NL_LINK_GET(r4, &(0x7f00000007c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000780)={&(0x7f0000000800)=ANY=[@ANYBLOB="1c010000", @ANYRES16=r5, @ANYBLOB="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"], 0x11c}, 0x1, 0x0, 0x0, 0x60}, 0x2884) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400b59500000000000000000a000000", @ANYRES32=r3, @ANYBLOB="1400020000000000000000000000ffff0000000014000100ff02000000000000000000000000000179a1b81fa0e18a35aa6903a15e83dbbaa10230fe79dfc833da92a5fbecb138472fd8aef94f7408322dd698067a1d2a909da9a9a0"], 0x3}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x12, 0x0, 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0, 0x0, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x10, &(0x7f00000004c0)={&(0x7f0000000000)=""/66, 0x42, r7}}, 0x10) r8 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r8, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xd, 0x1, &(0x7f0000000000)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0x4, 0xdd, &(0x7f0000000280)=""/221, 0x41100, 0x1, [], r3, 0x15, r6, 0x8, &(0x7f0000000080)={0x4, 0x2}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x8001, 0x5}, 0x10, r7, r8}, 0x78) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r9 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r9, 0x0) ioctl$TIOCSCTTY(r9, 0x540e, 0x1) 08:03:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) ioctl$VHOST_SET_OWNER(r3, 0xaf01, 0x0) ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000000)={0x0, 0x0, 0x10001, 0x401, 0xffff, 0x9}) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000040)={r2}) 08:03:45 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x3000000}, 0x1c) [ 354.183373][T20972] XFS (loop1): invalid log iosize: 1 [not 12-30] [ 354.244586][T20977] ntfs: (device loop0): parse_options(): Unrecognized mount option errors5recover. [ 354.288601][T21010] IPVS: ftp: loaded support on port[0] = 21 08:03:46 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1020, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:03:46 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x4000000}, 0x1c) 08:03:46 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:03:46 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xaf8, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:03:46 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x5000000}, 0x1c) [ 354.573687][T21010] IPVS: ftp: loaded support on port[0] = 21 08:03:46 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x6000000}, 0x1c) 08:03:46 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x7000000}, 0x1c) 08:03:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) clone(0xc75e43cba620dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:03:46 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x8000000}, 0x1c) [ 355.008423][T21036] XFS (loop1): invalid log iosize: 1 [not 12-30] 08:03:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, 0x4, 0xa, 0x101, 0x0, 0x0, {0x1, 0x0, 0x7}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffd}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_TYPE={0xb, 0x7, 'filter\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4008000}, 0x4000014) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) getsockopt$netrom_NETROM_T1(r4, 0x103, 0x1, &(0x7f00000001c0), &(0x7f0000000200)=0x4) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000100)=[@in={0x2, 0x4e20, @multicast1}, @in6={0xa, 0x4e24, 0xfffffff8, @remote, 0x1}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e23, @rand_addr=0x6}, @in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x4e21, 0x7fff, @dev={0xfe, 0x80, [], 0x41}, 0x3}], 0x98) 08:03:46 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x9000000}, 0x1c) 08:03:47 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1100, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) [ 355.241115][T21104] IPVS: ftp: loaded support on port[0] = 21 08:03:47 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xb00, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:03:47 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0xa000000}, 0x1c) [ 355.700564][T21123] __ntfs_error: 2 callbacks suppressed [ 355.700574][T21123] ntfs: (device loop0): parse_options(): Unrecognized mount option errors5recover. [ 355.724507][ T26] audit: type=1804 audit(1586505827.473:86): pid=21090 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/236/cgroup.controllers" dev="sda1" ino=16113 res=1 08:03:47 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:03:47 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0xb000000}, 0x1c) 08:03:47 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0xc000000}, 0x1c) [ 356.006712][T21107] IPVS: ftp: loaded support on port[0] = 21 08:03:47 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xc00, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) [ 356.055004][T21113] XFS (loop1): invalid log iosize: 1 [not 12-30] 08:03:47 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0xd000000}, 0x1c) 08:03:48 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1200, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:03:48 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0xe000000}, 0x1c) [ 356.525350][T21153] ntfs: (device loop0): parse_options(): Unrecognized mount option errors5recover. [ 356.884996][ T26] audit: type=1804 audit(1586505828.633:87): pid=21155 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/237/cgroup.controllers" dev="sda1" ino=15719 res=1 [ 357.075874][T21164] XFS (loop1): invalid log iosize: 1 [not 12-30] 08:03:52 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) setuid(r1) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:03:52 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xd00, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:03:52 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x10000000}, 0x1c) 08:03:52 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:03:52 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000200)={0x30, r5, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x4}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}]}, 0x30}, 0x1, 0x0, 0x0, 0x40040}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r4, &(0x7f0000007bc0)={0x0, 0x0, &(0x7f0000007b80)={&(0x7f0000007a00)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="300328bd7000fcdbdf250100000030010c8024000b8008000900ef30823908001a000e940000080009000300000008000a00373f00003c000b503a000a00801f000008000a"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) sendmsg$NLBL_CIPSOV4_C_REMOVE(r3, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0100002e", @ANYRES16=r5, @ANYBLOB="000125bd7000fbdbdf25020000000400088008000100010000003400048005000300020000000500030007000000050003000600000005000300000000000500030006000000050003000700000008000200020000000c0004800500030002000000"], 0x68}, 0x1, 0x0, 0x0, 0x20040001}, 0x8000001) sendmsg$NLBL_CIPSOV4_C_LISTALL(r1, &(0x7f0000000480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)={0x198, r5, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x30, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x82b3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xfcbeb3f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6cf32eb9}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4eda1d07}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3cc9}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0xc8, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8efe}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1cb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1eb}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xa9ca9c1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x82}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfda0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2b5f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc7a6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7c71fd04}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9e64}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x41bdc2a1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1345}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe272}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4ac213d1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x34ae}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x652f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x54c3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xaa45}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x79fc75a3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1189}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa0d3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3b8aa209}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc29e}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x6}, {0x5}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x54, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x80000000}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4e2deb57}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x76471763}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbbdd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7647b437}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1601}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6a66795a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x52b74447}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x684da20d}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}, {0x5}]}]}, 0x198}, 0x1, 0x0, 0x0, 0x18}, 0x80) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000000)=0x7, 0x4) r6 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r6, 0x0) ioctl$RTC_EPOCH_READ(r6, 0x8008700d, &(0x7f00000004c0)) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_ENTRIES(r7, 0x29, 0x41, &(0x7f0000000040)={'nat\x00', 0x5, "08867e5172"}, &(0x7f00000000c0)=0x29) setsockopt$inet6_group_source_req(r7, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:03:52 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:03:52 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x11000000}, 0x1c) [ 361.143097][T21204] IPVS: ftp: loaded support on port[0] = 21 08:03:53 executing program 5: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000000)=0x7, 0x4) 08:03:53 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x12000000}, 0x1c) 08:03:53 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000000)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000140)={0xffffffe0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 361.472238][T21199] ntfs: (device loop0): parse_options(): Unrecognized mount option errors5recover. [ 361.530446][T21241] IPVS: ftp: loaded support on port[0] = 21 08:03:53 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x18000000}, 0x1c) 08:03:53 executing program 5: r0 = open(&(0x7f00000003c0)='./bus\x00', 0x400240040, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x200000, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000300)=[@text32={0x20, &(0x7f00000002c0)="440f20c0350c000000440f22c0660f388051d20f0966b808010f00d0a8750f20e035000001000f22e0c4c13d575f0a2e0f60ff0f78ab1835ec6b660f79f2", 0x3e}], 0x1, 0x2, &(0x7f0000000340)=[@cstype3={0x5, 0x9}], 0x1) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x2010, r4, 0x4aa61000) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000000)=r3) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) getsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 361.859566][ T26] audit: type=1800 audit(1586505833.613:88): pid=21206 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="cgroup.controllers" dev="sda1" ino=16364 res=0 08:03:53 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = socket(0x1, 0x803, 0x0) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) setsockopt$inet6_group_source_req(r4, 0x29, 0x2c, &(0x7f00000002c0)={0x6, {{0xa, 0x4e24, 0x3, @mcast2, 0x800}}, {{0xa, 0x4e24, 0x5, @remote, 0x80}}}, 0x108) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @ipv4}, @IFA_ADDRESS={0x14, 0x1, @mcast2}]}, 0x40}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="b0000000250010002dbd7000f0dbdf2500000000", @ANYRES32=r5, @ANYBLOB="e0ff0c0003000300ffff0b0008000d0020000000840008801c00010080060010020000000000000003000000ffffffff030000000a00020007000400090000001c00010005157f00ffff00000100000000000e00c8000000050000000e000200fdfffeff01000004040000001c0001000402040000040000010000000800000005000000050000000e000200010401000800040008000000"], 0xb0}, 0x1, 0x0, 0x0, 0x40}, 0x800) 08:03:53 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2010, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:03:53 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xe00, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:03:53 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x25000000}, 0x1c) 08:03:53 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:03:53 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000280)=0xc) setuid(r1) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r3) lsetxattr$system_posix_acl(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000100)={{}, {0x1, 0x4}, [{0x2, 0x1, r1}], {0x4, 0x1}, [{0x8, 0xfdfc2930cf8d4250, r3}], {0x10, 0x1}, {0x20, 0x6}}, 0x34, 0x1) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 362.156972][T21288] IPVS: ftp: loaded support on port[0] = 21 08:03:53 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x3f000000}, 0x1c) 08:03:54 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x48000000}, 0x1c) 08:03:54 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x4c000000}, 0x1c) [ 362.487204][T21285] ntfs: (device loop0): parse_options(): Unrecognized mount option errors5recover. 08:03:54 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x64000000}, 0x1c) 08:03:54 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x1020, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:03:54 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x68000000}, 0x1c) 08:03:54 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) alarm(0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x10) [ 362.982589][T21337] IPVS: ftp: loaded support on port[0] = 21 [ 363.047885][ T26] audit: type=1800 audit(1586505834.793:89): pid=21299 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="cgroup.controllers" dev="sda1" ino=16384 res=0 08:03:54 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x6c000000}, 0x1c) 08:03:54 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x20002, 0x0) ioctl$SOUND_MIXER_WRITE_VOLUME(r0, 0xc0044d1b, &(0x7f0000000400)=0x1a) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) sendmsg$NFQNL_MSG_VERDICT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x74}, 0x1, 0x0, 0x0, 0x840}, 0x40000) 08:03:54 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2500, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:03:54 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) [ 363.350765][T21326] ntfs: (device loop0): parse_options(): Unrecognized mount option errors5recover. 08:03:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./bus\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U-', 0x3}, 0x16, 0x3) ioctl$TIOCGPKT(r2, 0x80045438, &(0x7f0000000140)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x8, 0xcd3, 0x7, 0x2, 0x408, 0xffffffffffffffff, 0xfff, [], 0x0, r2, 0x5, 0x4, 0x5}, 0x40) 08:03:55 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x74000000}, 0x1c) 08:03:55 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x13, r1, 0x2000) r2 = socket(0x10, 0x803, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}, @IFA_ADDRESS={0x14, 0x1, @mcast2}]}, 0x40}}, 0x0) sendmmsg(r1, &(0x7f0000000100)=[{{&(0x7f0000000000)=@can={0x1d, r4}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000080)="7cf3031154e510e1272612bc687d05741e6422fcfe5f082ec22bc1b7ef0f8aa7cb93fd556cd7", 0x26}, {&(0x7f0000000280)="487d0546e8fe150e19489db6c704013d93fb831fae1acc6db43916e26d9f42b106f09382d57be3a5e917df0ec5ef4ebad0b4246d5735da389e6a92f8b3663e263ca462eec819b6b1303af32f07d96591ac1322f30dabfc62cc9682509dffd70c2924c181f18561fbba88ca40498052a6b3fc7ad7de07a5e36cf179cdc639bae6fc28262db81e88d5273bf165b2a03cca1e53a2a963d0d83e62117caed13ba51b", 0xa0}], 0x2, &(0x7f0000000340)=[{0xc8, 0x0, 0x2, "ce6ede018f7ca36a6266f04bce6ced569639d6e3ed0b4ea279b344c50d6189f4f77781b978d991cbc928b6d04bb078b0fc14e4ba24c43894334bcd61efbec3fc8f6d2a0119467ff3d3e953f08c6d5cbcf6dd22a564f9a299d72cab96e49698572e9a555c17175182f3c2a650ad3b7b9cbf1fd142dbf972e4fabd800c09c3206fbedced7df407eab79710771ad1883fb361a44aef36231000de394db4b50e4a6ed2923f10e42fdde874c3f0e2cbab65037952"}, {0x1010, 0x110, 0x1, "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"}, {0xa0, 0x104, 0x200, "da8432bca6c038d5becef98eb1edd7b92d29ccc1e123f85d3b4d4ff1b7b7b20b4b1c9069420e6e6763f53a57bd50bd8c944aeb8892d30eba15c044f4c0426bfe3300f31a51e04dacfcb03388673e98b352241282608171f9f94c507d6b4f1459f423eed2dfa001c0abe9a2175a3d94cbc328b0f08377d5ce8a6e2d7c9e5adf32685a562de59514932a364d6681"}, {0x40, 0x119, 0x9, "b34011796fe018ababbd3fa884a157474096103803d3b063a71d1d4c4595423e450d78906e001ec10718a95e"}, {0xb0, 0x1, 0x101, "4aab0b1254e234ba8e4c699eca4b61602e717625fbd2f25dfd70d3e042e49007767c03234d6c54a98d4b0e4cb057a3927610fb9d3f6734afa111ee90997174dacd337361bcc50fd5cbfaaf2555793ce44bdb0c0bdd31e874249710c547f7d9c5fe1f33a6632798db736d7b090ace884d19924b90c9a48bf279a3e83fa1636f300be995d548ad2e2d9a50d03f6643a0e669e02dd185ac19480e9d09d4"}], 0x1268}}], 0x1, 0x4000) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:03:55 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:03:55 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x7a000000}, 0x1c) 08:03:55 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x1100, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:03:55 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) clone3(&(0x7f0000001c00)={0x40001000, &(0x7f0000000000)=0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080), {0x32}, &(0x7f00000000c0)=""/127, 0x7f, &(0x7f0000000bc0)=""/4096, &(0x7f0000001bc0)=[0x0], 0x1}, 0x50) write$binfmt_aout(r1, &(0x7f0000000280)={{0x108, 0x1, 0x3, 0xb6, 0x381, 0x0, 0xab, 0x1}, "eef40e39904246030413c3ec06d239761c6504a8d4edfb68c53691c0e6e862a42b1946e27f7d18464547aeb59db7fa69754e0025a92c02e45cfd37ce69e757e8c875e17000fb0776ef933e734a6f4057354f6d051ff7c0f9660b2a89ce93213c8373952ee24b3cd35d5b39532a9d685224e66782217374353dce71fb089c33621a9dca81b1ec584a45202eb6c4e217f72a5c1d40463a1db89c4f93a76bdef337de70395cbf4671b0fd0b8f1b527c08e503ec684a5ef0541a591393acefb3a8a477835bedfa8c1e5bf89f67efec8d52ac292fcb8ab188d0a4fd35a82a0b989392a5", [[], [], [], [], [], [], [], []]}, 0x901) [ 363.614664][T21396] IPVS: ftp: loaded support on port[0] = 21 08:03:55 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0xe0000000}, 0x1c) [ 363.769653][T21408] IPVS: ftp: loaded support on port[0] = 21 08:03:55 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:03:55 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0xe0ffffff}, 0x1c) [ 363.962975][T21399] IPVS: ftp: loaded support on port[0] = 21 08:03:55 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3f00, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:03:55 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) [ 364.164670][T21416] IPVS: ftp: loaded support on port[0] = 21 [ 364.225520][T21405] ntfs: (device loop0): parse_options(): Unrecognized mount option errors5recover. [ 364.296399][ T26] audit: type=1804 audit(1586505836.043:90): pid=21469 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/243/cgroup.controllers" dev="sda1" ino=16361 res=1 08:03:59 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) setuid(r1) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:03:59 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0xfc000000}, 0x1c) 08:03:59 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x1200, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:03:59 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:03:59 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:03:59 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0xfe80ffff}, 0x1c) [ 367.862996][T21492] IPVS: ftp: loaded support on port[0] = 21 [ 367.883624][ T26] audit: type=1804 audit(1586505839.633:91): pid=21491 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/244/cgroup.controllers" dev="sda1" ino=16360 res=1 08:04:00 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x7, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:00 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0xfec0ffff}, 0x1c) 08:04:00 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:04:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x1, 0x0) dup2(r4, r5) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) r6 = ioctl$NS_GET_PARENT(r2, 0xb702, 0x0) ioctl$int_out(r6, 0x5462, &(0x7f0000000140)) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, &(0x7f00000002c0)=""/4096, &(0x7f0000000100)=0x1000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) sendto$l2tp(r2, &(0x7f0000000000)="f9c66bbbac4eb73ed21e97a79e4251b8899d89f35cf1c31c551748435279bff96f0b170d5ee5c055a10c26e72d0eb757ac7da1aa2ac7b43875aed57e1c1d38c40de5086985b54b0c216c6479ae1e6e159a3061fa9d76c262a0b0594a8ef14ebe837a6dd693663535ab5f2424205c2fce945c4b06289f0c6e6c86b31944bfa14592a42a85223de47521da534f4e2d9a456050b3c72f0e20a0bc24a7a142fa1f0d1842a031c14b3c9680debc8f5a347a176e", 0xb1, 0x80c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1, 0x2}, 0x10) setuid(r1) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 368.353181][T21490] ntfs: (device loop0): parse_options(): Unrecognized mount option errors5recover. 08:04:00 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0xfeffffff}, 0x1c) [ 368.445937][ T26] audit: type=1804 audit(1586505840.193:92): pid=21533 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/245/cgroup.controllers" dev="sda1" ino=16360 res=1 [ 368.482999][T21528] IPVS: ftp: loaded support on port[0] = 21 08:04:00 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x14, 0x2, @ipv4}, @IFA_ADDRESS={0x14, 0x1, @mcast2}]}, 0x40}}, 0x0) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) statx(r4, &(0x7f0000000000)='./bus\x00', 0x1400, 0x100, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in=@multicast2, @in6=@mcast1, 0x4e20, 0x3, 0x4e21, 0x8, 0x2, 0x80, 0x80, 0x6c, r3, r5}, {0x755, 0x6, 0x7, 0x8000, 0x800, 0x9, 0x2, 0x4}, {0x3, 0x6, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2}, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4d2, 0x2b}, 0xa, @in6=@empty, 0x0, 0x0, 0x2280e4125372d52c, 0x1, 0xfffffe3f, 0x7, 0x7fff}}, 0xe8) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r6, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x43}}}}, 0x108) r7 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r7, 0x0) syz_open_pts(r7, 0x48040) 08:04:00 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0xff000000}, 0x1c) 08:04:00 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x1f00, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:00 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4800, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:00 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0xffff0000}, 0x1c) 08:04:00 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0xffff1f00}, 0x1c) 08:04:00 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0xffff80fe}, 0x1c) 08:04:00 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000140)={0x3ff, {{0xa, 0x0, 0x0, @mcast2, 0x289}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:00 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:04:01 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0xffffc0fe}, 0x1c) 08:04:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) ioctl$SNDRV_PCM_IOCTL_DRAIN(r2, 0x4144, 0x0) setuid(r1) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x401800, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000003000/0xd000)=nil, 0xd000, 0x0, 0x11, r3, 0x0) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r3, 0xc0205648, &(0x7f0000000080)={0xa10000, 0x7, 0xfb19, r4, 0x0, &(0x7f0000000040)={0x980923, 0xfe, [], @p_u16=&(0x7f0000000000)=0x441}}) r6 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r6, 0x0) getsockname$tipc(r5, &(0x7f0000000180)=@id, &(0x7f00000000c0)=0x10) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:01 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000000)={'security\x00', 0x2, [{}, {}]}, 0x48) [ 369.313070][ T26] audit: type=1804 audit(1586505841.063:93): pid=21594 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/246/cgroup.controllers" dev="sda1" ino=16357 res=1 08:04:01 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0xffffff7f}, 0x1c) [ 369.395812][T21596] IPVS: ftp: loaded support on port[0] = 21 08:04:01 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$smackfs_revoke_subject(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/revoke-subject\x00', 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x108) 08:04:01 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0xffffffe0}, 0x1c) 08:04:01 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4c00, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:01 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:04:01 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x5, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000000)) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000040)=0xc) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000000c0)=r2) umount2(&(0x7f0000000100)='./bus\x00', 0x6) setuid(r3) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:01 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:01 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0xfffffffe}, 0x1c) 08:04:01 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) pipe2(&(0x7f0000002e40)={0xffffffffffffffff}, 0x4000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000002ec0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000003080)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000003040)={&(0x7f0000002f00)={0x104, r2, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x21}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x33}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}]}, @IPVS_CMD_ATTR_DEST={0x58, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2c02}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e24}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e20}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@loopback}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e21}]}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x3, 0x21}}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x2}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e23}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5c}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x32}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}]}, 0x104}}, 0xc800) [ 369.883221][T21642] IPVS: ftp: loaded support on port[0] = 21 [ 369.900544][ T26] audit: type=1804 audit(1586505841.653:94): pid=21641 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/247/cgroup.controllers" dev="sda1" ino=16370 res=1 08:04:01 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x2) 08:04:01 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:01 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x18) 08:04:02 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:04:02 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote, 0x1}}}, 0x108) [ 370.274546][T21685] IPVS: ftp: loaded support on port[0] = 21 [ 370.445266][ T26] audit: type=1804 audit(1586505842.193:95): pid=21691 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/248/cgroup.controllers" dev="sda1" ino=16370 res=1 08:04:02 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x5c00, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:02 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x2000015c) 08:04:02 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000000)={&(0x7f0000ffb000/0x3000)=nil, 0x1, 0x5, 0x22, &(0x7f0000ffc000/0x4000)=nil, 0x5}) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:02 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = accept4$x25(r0, &(0x7f0000000040)={0x9, @remote}, &(0x7f0000000080)=0x12, 0x800) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000280)=0xc) setuid(r2) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:02 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:04:02 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2010, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:02 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000000)=0x4, &(0x7f0000000040)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioprio_get$uid(0x0, r2) [ 371.033179][T21732] IPVS: ftp: loaded support on port[0] = 21 [ 371.052459][ T26] audit: type=1804 audit(1586505842.783:96): pid=21733 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/249/cgroup.controllers" dev="sda1" ino=16363 res=1 08:04:02 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f00000001c0)={0x20, r3, 0x1, 0x0, 0x0, {0x18}, [@ETHTOOL_A_STRSET_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x3}]}]}, 0x20}}, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0xf0, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0xd0, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xf0}, 0x1, 0x0, 0x0, 0x4000000}, 0xc0) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f000000a000/0x4000)=nil, 0x4000, 0x0, 0x11, r4, 0x0) getsockname$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, &(0x7f0000000040)=0x40) 08:04:03 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 371.243633][T21743] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 08:04:03 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:04:03 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @ipv4={[], [], @remote}, 0xfffffffc}, 0x1c) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000040)=0x30) [ 371.417385][T21770] IPVS: ftp: loaded support on port[0] = 21 08:04:03 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) fallocate(r0, 0x10, 0x1, 0x100) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) r4 = pidfd_getfd(r2, r3, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r7 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r7, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000080)={r6, 0x3, 0x10, 0x1, 0x4}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000000)={r6, @in={{0x2, 0x4e21, @rand_addr=0x3f}}, 0x400, 0x7}, &(0x7f00000000c0)=0x90) modify_ldt$read(0x0, &(0x7f0000000280)=""/4096, 0x1000) r8 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x2) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r8, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x0, 0x40, &(0x7f0000001300)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000001b00000005000000780300006001000038020000ffffffff0000000060010000e0020000e0020000ffffffffe0020000e002000005000000", @ANYPTR=&(0x7f0000001280)=ANY=[@ANYBLOB='\x00'/80], @ANYBLOB="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"/888], 0x3d8) [ 371.519999][ T26] audit: type=1804 audit(1586505843.273:97): pid=21776 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/250/cgroup.controllers" dev="sda1" ino=16358 res=1 08:04:03 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x6000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:03 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:04:03 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYRESOCT=r3], 0x3}}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x150, r2, 0x300, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x98, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3d2c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd4a6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xaa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_BEARER={0x7c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x80000000, @rand_addr="2600bbb51eb9aadaedbb4aa8bba676a6", 0x80}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x0, @rand_addr="af2cd7236f3aff933b59cd950620c418", 0x8}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9c6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}]}, @TIPC_NLA_BEARER={0x28, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}]}]}, 0x150}, 0x1, 0x0, 0x0, 0x41}, 0x4008804) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) 08:04:03 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="0e00008017010005002e2f627573"], 0xe) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000140)={0x0, {{0xa, 0x4e22, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote, 0x38}}}, 0x108) 08:04:03 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2500, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:03 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141402, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f0000000240)={&(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0], 0x6, 0x2, 0x6, 0x3}) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000000)=@null) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000040)=0xc) setuid(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) write$smack_current(r4, &(0x7f00000000c0), 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r5, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x24, &(0x7f0000000100)=0x1d58, 0x4) 08:04:03 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x7, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) [ 372.051802][ T26] audit: type=1804 audit(1586505843.803:98): pid=21814 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/251/cgroup.controllers" dev="sda1" ino=16378 res=1 08:04:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000000)=@generic={0x2, 0x8, 0x7}) setuid(r1) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x2, &(0x7f0000000100)=[{&(0x7f00000000c0)="874039cd37d5998c6f2b102f1215d30ab5571d81a8ade3784099ef35d77454cd6b237c4474299f9d2522b405e44a3d1dd45d975c78d9ccd7eeb548eac9", 0x3d, 0x7}, {&(0x7f00000002c0)="c91a0277dd4557b69c9728dd7e7a34905ae9b84ef75aeae1882921940c9697316f08512d83189e9693fb85aa898356bc12a110535563430513c09ea48ddc48d41d93c1325c8eb2452aaa090d7f7d567ce7404e1e6e16fecdd309671ea1b814d1b3ec4fb2218d303423a858fc28f71d8fcc7c4e1de012eace6772ab3ef2301b091914a55bf1f07b14e6a57b2fb75137911635dcfd94caa2ee9a1941b9ff7b234f1e275ad5cdb1b43f20edd1970c4ac7e910ceee3b4a1202cd22676cac125dc5471d6a44494bb39099bdd1167d8cc99ed91e16e32a31b5f6fc440c65e8c036a7a6a2bcd1d87003e609973f780454d374c4894d916f52554e2c3eeec9fa0e9ede0bb3fb791e9439e2ed227b1a49ed75186f4b16f51e6771c33984d9bc050ec3c2c3146b0b320fd7954b8a3768c5e129dee31142694262bc015cf52ed2587f5062924ed2bdc2375b6dc869fd66defa59adb04d36d5c16a1422351b88612283b9a5bff170d73475160e2ef9139b91152540f66536dcec10cdc143e9a91861e2e6fc84d2579930a7e55983e8493ebc5e73de10afced1cc9d789d726fd081df94a3fd1bc283803d5dcc1c884b7cace0f6e98f33a2faa1a58885c1a0b27d991bcc94e86513415ac08e914a0e77b18fd82f0ad173901f3ddb188e4d74c1a8f680be77f1cbb226a5ebc9e1203f87eddd6674129de9dd22997e62845c6659994ff0b6772f458c7add0244f121a0b33025fac59c050bd19ceafd56ae2d2614a3b8a18926425045e5a3644978a0d64e58e3725d2b446b71f8e34cccff0d6dbfdf05d3e85d6e520db1df8f6416c2e5a6324ca6b617addb6c1aa9ac787f46362bbc338dbe3fe376ca50adb307c1cbbfcd4465e09cb84a00a9a9bece8e5ff797571ba7a727ad57b0ffb6635f05ae63543e6e53a2e438a20f26e2abee94ebea6d4487eecb98a747fba471002d5b50bdc71d78dd015ceb20e55b11a1ef545b99ef91b29a4e980aba4320f1adc233b8bae5480a7ac212ea23b4e1615f3ad3785fb28023ef81084b14ea88367a2fcc93a2341a3cd7add2f60908018f2339b56ccfbb59c8a7dce29762bb1037f8663017c47c542b305b3a7d613f137bb6271447bf43081fdc38578ae3237615e535b0e647eaf72b21446b270061662910d51a4074e5e2b440a3a804d2e72742d05450b209a5ac38e359a65d21f89f9e2132e4b24200d4702d5a45942360d6e5393ee55a6d69b145052103d7af2e8dc06e1424cafa5098894a73a45f7b5f6cb5dccea524ab81cfbfe088d1069169f269f8c51b060a598311c6d2f247caf0e2e3a5e24a01b4536aaa65e8254657943179336b427d85d94f7e9b61ba02ab115532451705628993032d44b074d9012079fcdebd8ff4fca38e616c5ca80f6ff60c7b9207202cfc48fcbedf4ef5e65cc4b8590217a7690612049c1b6c51cf11cc8b82cc8106d1f41b3705a99dc672cb04b6b2dd81ecf2b777faee47fdf023e374816e3b44b95f5537f597f80b4329fe7342b3f0fec3fe5b0893eeabe0bc5cf2b2870c14dab63b7ffbd3c01ab5b645eeaf0ac1c133d9ac19623efb289ad0d6a2ae737da165230653f630fa6af2f64aa0f4fcc0e28fec1281810d69e78f484527f4143124b88cc5a149a87cfca79fe9caed574f01a9cdb3916b60d493c9e640589e1ad2f85ddcddecb18bcfb87de99f23360b8b8f1e619137df109e38242808bc22e4de2d3a2c0e3d521eb55f371a050355bb1400d477fcfae1afaad56c5dcb8901d6dc5be46bf3493b11e10350944a1e95d9b76a26f30b9940d0ea8a77f53ce20036b9875d686530238ae29d785772b46cdd2d7120dda0c186cdd25442a880b5ecf663741039a7d7ff8274b059e714d8c5d6e1a90fbd1912d65ae5190057581387a9bce3bc91663275456a9c7ed6c564f441ab46c94686f6d8c47a9dfd4d1901ffe70328f24b9d296e8e6f5763183115b62929a5b6ade3495b160d32c27dd96d1609e2f6927633fd78ac2eae52b648a68e1e25063ff800ab83fee91fa5ac71d1f22f28a4515bd6593ea3442e39270739f83d3c04dd0f1fdec122b92afd120dfffa1c44ca7479cffbe82516bf3bfbd7374ae252f35204275ed5dc6829039796646f0a98e2a6f8227ec9a09033a672ee347b6acfa177ea764ccc4cd8b4f5985f3b00797f9ab528a75f04ea35d3b0bd4dd0147a6925c9dbed3e7fa12644577b03830a9f234476836734c4b31282c81baaa12ee8d4210404364a6561eed05869560ae44068e8c93bb9620e9439330ee7b31ccce1acd48b269778361161d7ee4de791f0760e2c4c9b3ba22ede6e18636f191eb7b1c58414e40215235cd56c4887fba69725656e5e15021a3ef30f1976eb7c4dafcaf9e0ba91d13c9067580e6aaea9fa2e9a32ffbd7a77fc7e43189ed5eb9a21dcb3f05c7dfd75399839cbdeff10c9b6ac75dea228e363160fbb8cab2047b201fcbafed4b687fa5008520ca5078022cc4c7c070a7f18a5710751d90fc8ec6283bcbf0b41b05a8a8ddf9e335a1ae7ca8d4f4d622c7e55d728d89b05559e95bb96478c089dfc465f866fa22259fbb97a6fb4f3a7a351d718405c35005e5e5d7f583f1ea0f7bc737e48e46f887edf93a4ab770a44b88df74e725c47643f64a388ece49cab8fdbd5d5f932f81fb0294bcab35386680a3cf056ba0319aeda2e6002546f1de72f0aed5cc16f0032b0c0e42405141a25d5bebbbc0297970c2f545c5fc17c78ce742b7827d874240d0f70ceff03f66caeb67121c34682fb03d7e430139d3cdae0fb46447150c1f8e116ebefec9909dfdce2a71a27e3c807912ff6312580dfd61a944f0b2dbf2c1dee4f29fab5c90adeb1914bea8573fd36015e5c4f27b1ea7182460280c3296ff0717ebb3abd54b2e5635d9c87b3c83024cd6d812120c3ca8b52403c9d34984a91c50268ab95b5b28b567d16cb4148ab85615d55d3f1c55207e6f9a87936ee1dc45e04f5f5c1ee62d70147f0def248e874a32ff0cec8201547acbba303441abe35fc59d7c3df8965633660b88234d9e367cbcf6e771bde2dbcab32e62a2fd65c295d065631e40df392625db2712221758182fbcb6a8552ede93b29daf506226385686598ab674402e56097afe4da366dae571bf724ebcce5a34039dc0999fa58e3d2f125cbc203134b072d9781e69f2e2f104485040da34ace64f1c7aa304a409e74d9b6f2d7bca5444479aa52256cb23b36643aa548659404be6b221c2716da56446c0d064a564b1d7140c17a7c416d888e476a555c9a08a341e05b12c14b02fc02cc7d4bd7cd38a82d7a23a0b44453d73de64a1aac9170b1600d05101c4a9bb72b69de78a03d41591165114eea3d3ff7d426f158787dae6e18b1a17a6cd1e71ccebd17bb5b176e78742a117a2c1cb6c38b9aef935926156e0032a71809a37c05c1c789e8e7d0d1d560fd0afe6a8b0b5d87bc63d589232c948a1ed131b90691fdff628e7015fd5d31a1c82128676369c7c4cc0921984be0ad753c6c84dd0c2e8d5e8166c1d73e534dae7d2933c49d1306be015128203120fb7a111af44255a061dfd128aa0921be6fa423ad84adc7e24dcec93616b3543473b86ff1d22b9a90bf4ba7323aa93ed142bb308ce663a911dd2d299c20a386302b19b78432ca3d394e9e7a3656ee6579e586e9fb82f68953942cf9fda3cbb7a3523d7d85505fe161422666e1ffe4b76f2143abf88a8419809c1587b806298bafc39f14e5d478592db1758f61aead2b6211cbb53955439cf5b48a4fdf387e25a3c0b8b0c8451376ae7cc6f34684490cb26ceb17fde961b429de63169b7aad39d7b7ce087640ed885069617db224c4ecfb2ddb7afdc379a27b342df03056912b440aed45cc6543269866219c90e9aafdae160e2ebfa15ec174fa5dcdf882a005fbfe7f94a7580920c7710c1433353513c482592d823d16b8d7225cab3badfdf70bfa997e18b3a6114c4ab366759d5ab53a950b6754cb089848e7db43cb1e068ee2127c973a26e0bb8de4ce52f55f24b7d23759b0386ad2f96c4a93247f43f93934ded64d942bcc3728c76de2ebd46071fbe8cce7cfabbc111c98a6610c296479bb2e8d66c81fa05e70c508228d025c74a82003608f6215e5e2bcf8e0e5bd48b5cea4f226c8faa04599f880089ab705b6ced13bdb517c89674eec62100ef216b9bd127af0281933fc6c5447428f3bb8ef92e91de056617d2d7f249052d52aa2725a13df7df4699460be49f244ab8c6effa3b835fec0f882f9ea2300112fea10c06baf49b546c845dac735c2e6b6e05271da5bfc8a9312e4157e4f2e6feabd5961a84ea12a5e3b43a7b6d784eb1b51aa5a29acc3bba7801610d91117bd880de83b63afd178ec32d83626a7694205a35d59dc908fa6cbfec4f3c14ce5207a159045b34c4874a47bc0725a4c1bbbcf8965b8a9d80183d141f3af84f690a3f89f2995e4b358bdbafa454cd16840d99bb56836bc775f194c2bc9b23c9eefa54331898da0c1d788935aa04f3480372e36d423c29b558eeea9be84f3d9c5f17dac666ea9090c4ec02cb05deba975524410f2aa86db01be727bac33b49882dcff48b8c767b232fe03b4cebbaadef5b4f1018256058426c918d237068a154999d27d2ab211c05c69fd44d36f3175b016469578f6c22c57c6469ea77d6eb82a4c5d6164192a29a96373ca809a357fe0cce094aea9548f84c89eedd8ddbedce3c8b541ac7def6416f28f20eaa6af76faada7a6320a975171de90194bf34c31837462c4a5a958585c2437fed41f8b65ce601856b02954c70c79cbb1ba339794b6f75669cc8070b242571a3778523ff9375d05415354632af01bac89c2938d34acac0cf7a2444a48380f99402ce757970bf1e40467e95bc4f97210f265530d99c7a5b672300d57a171a2221a76f5acbb47a8dd520cd76a91d5f41d6be8c27a8350d75e6d746c66b4686786921c0aa37aa1a56a02a52c6f87b6928d65cab49d67d6d599af4a3824aa774d9113737d9f829552348a82e181e2fb37ba7ace3bbe1dd8c02439ab32b4d5a748ee5fd2a3e9c3006ddb991953ab134689bad447ad195a1032a20b372004686f01bd0782399c08ce287442b0ac20a89a15b288a3e390d2770cdc91b7f276469a2624595e25ba82f4692a42171683b355e6b84ae3ea9ddb933e4bd6b012d1a36936d806f562e96f19a113a81427a91d75feff9a4e882b5110f5e513298eb813fc6808de61f9b9349defb1af54fc20dbd8deda970420a9a37d2b6cf995ac9ca80d6d178bb2d7ae59b483743fd8e8b630a2f474630d257aa24ceba17d7ca1bc1dea93ae18b13593e3c3297314d5ab28dd1482b3b25bcf47426946e89b8c32cd315f3e26e80519e91d9e050b6dd20dd3793865f64f976757657413fe9bf92bea8d31bc646bd8b9e433701cd117e4310db5941ac39a93863c6ca0ffb694608006de124a3e898ff28c0e0e023425613ca52a3188d4f50d0d4ee6a2a1a59ef4c26d7c11975a86f8d55840e9bea15588791fcd0ce1c5ccd6cddee5ce51cb8e5c41402d17c8b038e419697da873d3f97f05a1556c0724b0e4b43ecd37cfe3bf25038cc00f041ee941fdff26feb79b171dc1e029f18d8253d2ad2a3ca900b45658ad547c0010ddafb79085770495821c22ea74a822d81fd2bf4a6c65500bec40c0489af988bd2bedb64d1eb2ff512cf4d2dfccac39971c70ab3f6a4090cf21155920f361ecadc2df99b26652334d4b4f85e8f7c7a36f318b3c13b3b0c255783c7b2aae451c5a806c4543229e0d52660b7263bdc0", 0x1000, 0x5}], 0x800000, &(0x7f0000000140)={[{@nonumtail='nnonumtail=1'}, {@uni_xlateno='uni_xlate=0'}, {@nonumtail='nnonumtail=1'}, {@numtail='nonumtail=0'}, {@shortname_winnt='shortname=winnt'}, {@shortname_lower='shortname=lower'}, {@uni_xlateno='uni_xlate=0'}], [{@defcontext={'defcontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@euid_eq={'euid'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@audit='audit'}, {@euid_lt={'euid<', r1}}, {@smackfsroot={'smackfsroot', 0x3d, 'keyring@GPL\xb6vmnet1(\x16'}}]}) 08:04:03 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x1000002, 0x31, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x404000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x81450008, 0x0, {}, {0x2, 0x8, 0x6, 0x7, 0x9, 0x8, "7233965d"}, 0xbb, 0x0, @offset=0x1, 0x6, 0x0, r2}) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000140)={0x8, {{0xa, 0xfffc, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1, 0x800000}}}, 0x108) sendmsg$RDMA_NLDEV_CMD_RES_GET(r5, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x50, 0x1409, 0x1, 0x70bd29, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000}, 0x0) [ 372.284258][T21827] IPVS: ftp: loaded support on port[0] = 21 [ 372.314968][T21831] FAT-fs (loop3): Unrecognized mount option "nnonumtail=1" or missing value 08:04:04 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) ioctl$TIOCSCTTY(r1, 0x540e, 0x5) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) 08:04:04 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) [ 372.504854][ T26] audit: type=1804 audit(1586505844.253:99): pid=21843 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/252/cgroup.controllers" dev="sda1" ino=16378 res=1 08:04:04 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x3, 0x4) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x17c, r2, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x18, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8b0}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0xcc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1f}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5dc36426}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x551}, @TIPC_NLA_SOCK_CON={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xfffffe01}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x400}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7fff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_NODE={0x8}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_NODE={0x20, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}]}, @TIPC_NLA_MEDIA={0x64, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x57648000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3df}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}]}, 0x17c}}, 0x48004) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000), 0x10) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x400141042, 0x130) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f0000000540)=ANY=[@ANYBLOB="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"]) [ 372.753826][T21831] IPVS: ftp: loaded support on port[0] = 21 08:04:04 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x6800, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:04 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x80, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote, 0x3}}}, 0x108) 08:04:04 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x3f00, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:04 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x12200, 0x0) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f0000000180)=0x5) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) close(r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r6, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x401, @loopback, 0xc9d}, {0xa, 0x4e21, 0xff, @empty, 0x100}, r6, 0x86c}}, 0x48) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x7ff, 0x40000) 08:04:04 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:04:04 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0xa6080, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000040)=0xc) setuid(r2) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:04 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = openat(r1, &(0x7f0000000000)='./file0\x00', 0x800, 0xc4) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000040)={0x9, 0x80, 0x4, 0xd7, 0x9, "d969c64879bc5ed1ff3d3282a802e69af62210", 0x9f, 0x5}) 08:04:05 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x4e20, 0x2, @mcast2, 0x5}, @in6={0xa, 0x4e23, 0x7, @dev={0xfe, 0x80, [], 0x26}, 0x80}, @in={0x2, 0x4e21, @empty}], 0x48) [ 373.262485][T21912] IPVS: ftp: loaded support on port[0] = 21 [ 373.311488][ T26] audit: type=1804 audit(1586505845.063:100): pid=21913 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/253/cgroup.controllers" dev="sda1" ino=16357 res=1 08:04:05 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000000)={0x2, 0xf, 0x7, 0x5, 0x7, 0x8, 0x4, 0x59, 0x1}) 08:04:05 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000080)={r5, 0x0, 0x10}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000000)={r5, 0x3}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000180)={r6, @in6={{0xa, 0x4e24, 0x200, @empty, 0x6}}}, 0x84) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) 08:04:05 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'os2.', '(*mime_type+cpusetem0\x00'}, &(0x7f0000000080)='posix_acl_access\'!eselfppp0&self+\x00', 0x22, 0x1) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:05 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) [ 373.677434][T21946] IPVS: ftp: loaded support on port[0] = 21 [ 373.911433][ T26] audit: type=1804 audit(1586505845.663:101): pid=21970 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/254/cgroup.controllers" dev="sda1" ino=16376 res=1 08:04:05 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000240)='gtp\x00') r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, r1, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@GTPA_LINK={0x8}, @GTPA_VERSION={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20008000}, 0x4000) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) r4 = socket(0x10, 0x803, 0x0) r5 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r5, 0x0) ioctl$sock_netrom_SIOCDELRT(r5, 0x890c, &(0x7f00000002c0)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00', 0x0, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x5, 0x4, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast]}) r6 = socket(0x23, 0x1, 0x3ff) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@ipmr_newroute={0x24, 0x18, 0x4, 0x70bd2a, 0x25dfdbfc, {0x80, 0x0, 0x0, 0x6, 0xff, 0x3, 0xfd, 0x3, 0x2800}, [@RTA_DST={0x8, 0x1, @multicast1}]}, 0x24}}, 0x4001) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000040)={@loopback, r7}, 0x14) 08:04:05 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x6c00, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) [ 373.984342][T21970] Page cache invalidation failure on direct I/O. Possible data corruption due to collision with buffered I/O! 08:04:05 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:05 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = add_key$user(&(0x7f0000000640)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f00000000c0), 0xc6, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r1, r1}, &(0x7f0000000040)=""/29, 0x1d, &(0x7f0000000240)={&(0x7f00000001c0)={'rmd128\x00'}}) keyctl$KEYCTL_PKEY_QUERY(0x18, r1, 0x0, &(0x7f0000000000)='cpuset/em1\xf4user\x00', &(0x7f0000000040)) [ 374.028579][T21970] File: /root/syzkaller-testdir851837972/syzkaller.0wFbMh/254/cgroup.controllers PID: 21970 Comm: syz-executor.2 08:04:09 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:04:09 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) setsockopt$sock_void(r1, 0x1, 0x24, 0x0, 0x0) 08:04:09 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) ioctl$NS_GET_OWNER_UID(r4, 0xb704, &(0x7f0000001780)=0x0) syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./bus/file0\x00', 0x31, 0xa, &(0x7f0000001680)=[{&(0x7f0000000180)="11fce8ac4d3118d029ebfbbf8c6fda865848fb5671cad711910f0aede2c66b21da46fba62e19d832e3f11bf1a67c3afe6b44039f236e69f3c96aedecb394bf0f54dc786ef15f34735c9bf21605ddb8cda92c9ee6907be75504c67316555113cd8f69b3d9039712c69bbc551f9eeb5dfc27533eeab45ee7a1cd7b09f3b33e20cd4db327930a016a47c34c", 0x8a, 0x2}, {&(0x7f0000000240)="92e7ae1b161bbbf5b385c8e9963fdd7c4ed0c810726a4462cd84a8b4f1e287d48454021c7f958cc95224e6a5a69c48da18bdd7e88b7c0bda7c41e7e6c20ad649d06fad0ed6459de18d0deb1e76090ec2", 0x50, 0x80000001}, {&(0x7f00000002c0)="1229038e27b6a75378e3e335a93a5410f00cf5afdb834a4b9dd785989f8e646b9b634fab29b0849c375a3b7e23215dfaaf8d1fb99cdf4b33cbf5344926f3c79fce56452c54100600cbad", 0x4a, 0x7}, {&(0x7f0000000340)="35cd932d8f6f80a77769e2e1e2819dca627ebf8f30cecce18fd3d358aea23484d531bb2a99a4acc001491dfa4975a0518d7fb90538f9d9482c017b7063c988783454e2fc9dbf124783046f02950fd2a084fb7285ee83647108d4b722c65dce2a80ad25033c4c63879f1a4d14c2af558b88c6291b397eac30e5", 0x79, 0x6}, {&(0x7f00000003c0)="a93e67ae67dfa19e6651f3c3f138792f8e75c2668defec4104d7a01ced35f00a098aad59feb366ee3fa1a79b011a3d6189880f3d1beb207dc19f2b01141f00c1c5bdd62d130f819863eaf5461ce448de73359a8e6e403e24522b526d000147b69f3a59e4b7fa5ff62a018034cc4dd9f4717da1d5b1b084066384b03faedfd8caab4e362ceb3201b0d3ea68c19679ca0b0d56ccce2a87e3b0dfe0b71a24c30f4f3651fb49a02db7792fc1eba3819a9ef410450b4282", 0xb5, 0x4}, {&(0x7f0000000480)="8c587f8d3454ebdadf7ff57f7745d9ae5354e4791fb18fe068e1c2b26bf26d62cb00fcbf5418bb82d9cbfbd3636809", 0x2f, 0x4}, {&(0x7f00000004c0)="66f2ac69eb49171a02a21989236ce0dad9f7aba33285347c31111ea1adf353949c63d6bb1e8b53c53994906d416ce2cc958fb441177f4b0541e8df3933a3916130f0aa919a150a55bd6290b49f054b20c7ecba69bbe98d33096f64e1a4a8", 0x5e}, {&(0x7f0000000540)="84b4e28081106e082f8319d1e26987fe160cdda75d487c422f9c62442f2d876a0c0501471e155a5bc412e786af979472548cece61813f9f102ce3975ecd43faae4940994a315a66ad600bd3250197525ba367780467e8f5f729fe17aacce3c6411b4aee4", 0x64, 0x9}, {&(0x7f00000005c0)="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", 0x1000, 0x9}, {&(0x7f00000015c0)="9abc4556de745953d3a95edbfda86b5deb3b6eb513ec4f769edf839b9328e0a2eff8d60f5a470c0eef0dc4edebcfdb61a41c4677a44f81a33e9e73b7fae38726123ee007b54d3886732dbbee2e0812a60b63c17655b79507048fc7c04ea5ac5afa3983e2e8568c100603f08bb46b561c95dcf333ea08f40fa36e81e7480ca04c207a9b8fa0ad335b911bad", 0x8b, 0x9}], 0x1001020, &(0x7f00000017c0)={[{@gid={'gid', 0x3d, r3}}, {@dmask={'dmask', 0x3d, 0x8}}], [{@obj_role={'obj_role', 0x3d, 'vmnet0'}}, {@uid_gt={'uid>', r5}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'em0em1/'}}, {@subj_user={'subj_user', 0x3d, '#'}}]}) setsockopt$inet_tcp_int(r1, 0x6, 0x9, &(0x7f0000000000)=0x5, 0x4) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x8000}, 0x1c) r6 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r6, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r6, 0x111, 0x2, 0x1, 0x4) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect={0x7}) 08:04:09 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4800, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:09 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7400, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r2 = accept$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @multicast1}, &(0x7f0000000300)=0x10) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000340)=@gcm_256={{0x304}, 'a~}P-20\r', "eb240e38a69b6a637676fd19651666a9dfec8a2a94b4b3309c4c9a1b1ef87c38", "dd384fe8", "c1056c88aa6e43d6"}, 0x41) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x118) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) clock_gettime(0x0, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000380)) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000040)={0x1fa2, 0xb, 0x4, 0x2, 0xfd, {0x77359400}, {0x2, 0x1, 0xfb, 0x5, 0xcd, 0xfb, "00e4f200"}, 0x3, 0x3, @offset=0xfe, 0x1, 0x0, r4}) ioctl$KDMKTONE(r5, 0x4b30, 0x101) setuid(r1) r6 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r6, 0x0) ioctl$VIDIOC_CREATE_BUFS(r6, 0xc100565c, &(0x7f0000000140)={0x80000001, 0x9, 0x2, {0x9, @pix={0xa9e, 0x80000001, 0x32314247, 0x1, 0x4, 0x6, 0x2, 0x8, 0x0, 0x0, 0x1, 0x4}}, 0x400}) r7 = open(&(0x7f0000000080)='./bus\x00', 0x4001c1842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r7, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r7, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 378.012075][ T26] audit: type=1804 audit(1586505849.763:102): pid=22025 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/255/cgroup.controllers" dev="sda1" ino=15905 res=1 08:04:09 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) sendto$unix(r1, &(0x7f0000000180)="d6d71229d85e9a49be21fa65a362151fc443a70da8dd5c20d57a27c47c30724c02d65252dd23809c5496433dda81c2df839c17846389093a16bf42d861e5c1f90aa01e4478149e6d0c4bb84c257b22f5a98af5cd525a8a85342ea269409a49c601ffe4b5c7ba78c56c59e2592fc79843d949035c6518fd9c98f345be876befef2b0f82130e553b880d3a93f094383d2b1bf07635c73028cd71c67282253c42b53e18", 0xa2, 0x40, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) 08:04:09 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f0000000000)) [ 378.157053][T22040] IPVS: ftp: loaded support on port[0] = 21 08:04:10 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x9, 0x340800) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, &(0x7f0000000040)={@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:10 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) getpid() ptrace$setregs(0xd, 0x0, 0xfffffffffffffffd, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0xfff, 0x10) tkill(r2, 0x33) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r3, &(0x7f0000000000)={r4, r0, 0x1}) mlock(&(0x7f0000002000/0x1000)=nil, 0x1000) 08:04:10 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000140)={0x2, {{0xa, 0x4, 0x10000, @ipv4={[], [], @rand_addr=0x2}, 0xfffffff8}}, {{0xa, 0x4e22, 0x0, @mcast2}}}, 0x108) 08:04:10 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) shutdown(r1, 0x0) 08:04:10 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:04:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000000)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:10 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) r3 = dup2(r2, r1) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000000)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$KVM_ASSIGN_SET_MSIX_NR(r3, 0x4008ae73, &(0x7f0000000040)={0x7361, 0x7b75}) [ 378.690730][ T26] audit: type=1804 audit(1586505850.443:103): pid=22087 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/256/cgroup.controllers" dev="sda1" ino=16001 res=1 [ 378.743262][T22085] IPVS: ftp: loaded support on port[0] = 21 08:04:10 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4c00, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:10 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000080)={r5, 0x0, 0x10}, &(0x7f00000000c0)=0x18) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x73, &(0x7f0000000080)={r8, 0x0, 0x10}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000400)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000440)=0x14) sendmmsg$inet_sctp(r2, &(0x7f0000000540)=[{&(0x7f0000000040)=@in6={0xa, 0x4e23, 0x516, @loopback, 0x6}, 0x1c, &(0x7f0000000280)=[{&(0x7f00000000c0)="f7a8b22e0c3c0cf08549068c1183a6ab22419d866c33524a43ec3dd2049b1a2cfecc7789f886d327ba0155e90d5ccafa0596c70bfc9e66722de08ab1acd34ef44576657075e9a90490325bc3b6911e8cb4be8bce4414c00cdc8871c39341c3065691cee9708d48802dc876fde016", 0x6e}], 0x1, &(0x7f00000002c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x0, 0x7fff, 0x80000000, r5}}, @sndrcv={0x30, 0x84, 0x1, {0x0, 0x8, 0x8000, 0xd5, 0x1ff, 0x9, 0x6, 0x7, r8}}, @init={0x18, 0x84, 0x0, {0x4, 0x2253, 0x2, 0x7fff}}], 0x68, 0x20800}, {&(0x7f0000000340)=@in6={0xa, 0x4e23, 0x3, @mcast1, 0x51}, 0x1c, &(0x7f00000003c0)=[{&(0x7f0000000380)="c3a731df6ccd9adecf22ebd4159c469c4151a0e60caa524bab78921a24db6ac2836d", 0x22}], 0x1, &(0x7f0000000480)=[@init={0x18, 0x84, 0x0, {0x7ff, 0x2, 0x6, 0x5}}, @authinfo={0x18, 0x84, 0x6, {0xb28}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast1}, @prinfo={0x18, 0x84, 0x5, {0x0, 0xfffffffd}}, @init={0x18, 0x84, 0x0, {0x8000, 0x3, 0x5, 0x5}}, @sndrcv={0x30, 0x84, 0x1, {0x48, 0x7f, 0x8, 0x2, 0x8, 0x359, 0x0, 0xffffff80, r9}}], 0xa8, 0x40}], 0x2, 0x20004050) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x180000c, 0x810, r1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:10 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7486, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:10 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000001180)={0x7, 0x8, 0xfa00, {r1, 0xfffffff8}}, 0x10) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x33) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) sched_rr_get_interval(r3, &(0x7f00000000c0)) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) read$smackfs_access(r2, &(0x7f0000000000), 0x14) r4 = socket$inet6(0xa, 0x0, 0x0) r5 = request_key(&(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0xfffffffffffffff8) keyctl$invalidate(0x15, r5) keyctl$get_persistent(0x16, 0xee01, r5) setsockopt$sock_int(r4, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) statfs(&(0x7f0000000040)='./bus\x00', &(0x7f0000000180)=""/4096) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) 08:04:10 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) [ 378.963435][T22116] IPVS: ftp: loaded support on port[0] = 21 08:04:10 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r3 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_LIST(r2, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x98, r3, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @ipv4={[], [], @empty}}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @mcast1}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'wg1\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x22}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'gre0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @dev={0xfe, 0x80, [], 0x14}}]}, 0x98}, 0x1, 0x0, 0x0, 0x4004005}, 0x1000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f0000000080)={r6, 0x0, 0x10}, &(0x7f00000000c0)=0x18) setsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000000)={r6, 0x4}, 0x8) ioctl$KDMKTONE(r1, 0x4b30, 0x8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) 08:04:10 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) write$P9_RFSYNC(r1, &(0x7f0000000000)={0x7, 0x33, 0x2}, 0x7) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 379.145990][ T26] audit: type=1804 audit(1586505850.893:104): pid=22139 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/257/cgroup.controllers" dev="sda1" ino=16049 res=1 08:04:11 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x20, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x20}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:04:11 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) r3 = pidfd_getfd(r1, r2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000000)={{0x1, 0x3}, {0x0, 0x40}, 0x1, 0x8, 0x12}) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:11 executing program 4: ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f00000000c0)={0x5, &(0x7f0000000000)=[{}, {@fixed}, {@fixed}, {@none}, {@none}]}) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = semget$private(0x0, 0x1, 0x0) semctl$SEM_STAT(r1, 0x0, 0x12, &(0x7f0000000000)=""/17) semctl$IPC_RMID(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) recvfrom$l2tp(r2, &(0x7f0000000180)=""/153, 0x99, 0x40000001, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) [ 379.494391][ T26] audit: type=1804 audit(1586505851.243:105): pid=22164 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/258/cgroup.controllers" dev="sda1" ino=15793 res=1 08:04:11 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x20, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x20}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:04:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="d57fc8d3b5a78ca942f1120df8eb18575cbb65f86b2228d879294254d2af4805000000fdffffffa0a1bc1e44031588483ffa"], 0x3}}, 0x0) sendmsg$TIPC_NL_MON_SET(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x50, r3, 0x20, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_PUBL={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x7}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7fff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1ff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xfffffffe}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x81}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x20000001}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xe6}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x4040}, 0x40000) ioctl$SNDRV_PCM_IOCTL_FORWARD(r2, 0x40084149, &(0x7f0000000100)=0x401) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) dup(r4) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) accept4$x25(r4, &(0x7f00000001c0)={0x9, @remote}, &(0x7f0000000200)=0x12, 0x800) open(&(0x7f0000000300)='./bus\x00', 0x880, 0x108) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) [ 379.715397][T22173] IPVS: ftp: loaded support on port[0] = 21 [ 379.793228][ T26] audit: type=1804 audit(1586505851.543:106): pid=22174 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/259/cgroup.controllers" dev="sda1" ino=15905 res=1 08:04:11 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4c7b, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:11 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) quotactl(0x7f, &(0x7f0000000000)='./file0\x00', r2, &(0x7f0000000040)="efecf0aa68df56d53b58acfc4087629961615497cb9467960a380d83c3e975cc59ce3a93774de75168acaadd4dcd12fd24507ab97ed03775026adc01101d0faac1343c0e627f3497a9c40e470642a36acfcdfc962a97569303ecc054aaa91f016ea931c6838bb076ed47d76a5260e0ea82d7f0bb5a4a") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x2000, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) [ 379.899768][ T26] audit: type=1804 audit(1586505851.543:107): pid=22175 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir665562765/syzkaller.jYpSty/283/bus" dev="sda1" ino=15953 res=1 08:04:11 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:11 executing program 4: r0 = socket$inet6(0xa, 0x80000, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) 08:04:11 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x20, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x20}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) [ 379.996460][T22175] IPVS: ftp: loaded support on port[0] = 21 [ 380.019352][ T26] audit: type=1804 audit(1586505851.753:108): pid=22205 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir665562765/syzkaller.jYpSty/283/bus" dev="sda1" ino=15953 res=1 [ 380.159963][ T26] audit: type=1804 audit(1586505851.913:109): pid=22215 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/260/cgroup.controllers" dev="sda1" ino=16001 res=1 08:04:12 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000000)=0x80000001) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) 08:04:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r6, 0x0) fstat(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r3, r5, r7) setuid(r1) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:12 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x8, @ipv4={[], [], @empty}}, 0x1c) 08:04:12 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$netlink(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) [ 380.526754][T22250] IPVS: ftp: loaded support on port[0] = 21 08:04:12 executing program 4: r0 = socket$inet6(0xa, 0x800, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) 08:04:12 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x80, 0x0) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f0000000280)={0x0, "fc7c10dc2c7c9757d462af4f6fcbbb3b98c19338e1781026ce4675fd0ba24448", 0x200, 0xffffffff, 0x1, 0x4, 0x2}) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote, 0xfffffffa}}}, 0x108) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) r4 = socket(0x10, 0x803, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r6}, [@IFA_LOCAL={0x14, 0x2, @ipv4}, @IFA_ADDRESS={0x14, 0x1, @mcast2}]}, 0x40}}, 0x0) sendmsg$NL80211_CMD_NEW_MPATH(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0x14, 0x0, 0x800, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x24004894}, 0x8000000) write$binfmt_script(r3, &(0x7f00000012c0)=ANY=[@ANYBLOB="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"], 0x1022) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) r8 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r7, 0x84, 0x73, &(0x7f0000000080)={r9, 0x0, 0x10}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000000)={r9, 0x6d0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000080)=@sack_info={r10, 0x38, 0x80}, &(0x7f00000000c0)=0xc) [ 380.704309][ T26] audit: type=1804 audit(1586505852.453:110): pid=22257 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/261/cgroup.controllers" dev="sda1" ino=15715 res=1 08:04:12 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) sendmsg$NFNL_MSG_ACCT_GET(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x78, 0x1, 0x7, 0x101, 0x0, 0x0, {0xa, 0x0, 0x2}, [@NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x10001}, @NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x1}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x100}]}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x7}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0xa2}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1}]}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x3}]}, 0x78}, 0x1, 0x0, 0x0, 0x5}, 0x0) 08:04:12 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x5c00, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:12 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$netlink(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) [ 381.174175][ T26] audit: type=1804 audit(1586505852.923:111): pid=22285 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/262/cgroup.controllers" dev="sda1" ino=16113 res=1 08:04:13 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8674, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:13 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) ioctl$TIOCSTI(r1, 0x5412, 0x400) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) 08:04:13 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'security\x00'}, &(0x7f0000000080)=0x54) 08:04:13 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x2, @remote, 0xe787}, 0x1c) 08:04:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) ioctl$KVM_CHECK_EXTENSION(r2, 0xae03, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0xffffd000) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000080)={r5, 0x0, 0x10}, &(0x7f00000000c0)=0x18) r6 = open(&(0x7f0000000080)='./bus\x00', 0x10943, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r6, 0x0) write(r6, &(0x7f0000000140)="ea4a9a04b9af5df6bcd4a56af8640f20c572a8e784dd5385ba12e5bc7ef668aaa87608f21071939390cf5644e97915a2fc9a7bc07d3b3d6bf7fff53a93ed4919abd452ad3567a9a82cab8bf82e464cfdc12a9e62e89273a514a1b22c9c21c64cbf0e8d8ea6ae66ecece829a1408010e0aa39", 0x72) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000000)={r5, @in6={{0xa, 0x4e24, 0x7fffffff, @mcast2, 0x2}}}, 0x84) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000100)) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x0, './bus\x00'}, 0x6e) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r7) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:13 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x400151942, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0xb0bc99bcff3d7b25, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f0000000040)={0x1c793686, 0x0, 0x80000001, 0x4, 0x4}) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x80, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r3, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="180000000714000227bd7000fcdbdf2508004400", @ANYRES32=r4, @ANYBLOB="e4890cab7ffbfbad96b8295515f29d99faca5300"/30], 0x18}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000000)={'netdevsim0\x00', 0x1}) 08:04:13 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$netlink(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:04:13 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) read$smackfs_cipsonum(r1, &(0x7f0000000000), 0x14) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) [ 381.670497][T22324] IPVS: ftp: loaded support on port[0] = 21 08:04:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x28, 0x4) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x8, 0x7, 0x9, 0xd, 0x0, 0x7, 0xc4000, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x7fff}, 0x100, 0x9, 0xff, 0x6, 0x9, 0x0, 0x40}, 0xffffffffffffffff, 0x5, r2, 0x2) 08:04:13 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) socket$inet6(0xa, 0x9ce734cb446d1fd3, 0x8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) [ 381.764356][ T26] audit: type=1804 audit(1586505853.513:112): pid=22333 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/263/cgroup.controllers" dev="sda1" ino=16209 res=1 08:04:13 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x6000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:13 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000040)) write$vhci(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="03465e1fe0d65c81329bfc74da476ddf5f416574aa966982c1b66217f21e64b00d812ef54cefac59a1f9dd126475bd19d574746b97fb68c322a152ba5d5658818dc8059fd881f5488b7c6b3afdd446e986f66d3746a8b44a42d75f59a21bff3c91cc9df202767ec9a9919455d96f1f8b240f2ba5355113ae97e1666190f99f1ef26ee2066e1bc8c0734add78f83e02ed91d0262e635db33a2879dea9bbc2840fa5a7066356bb52d577f46c16367b4531e7e0940a9c4fa754e401602fe214338d26c387dd08220e1febb5db3f4fe1"], 0xcd) 08:04:14 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xcf0a, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:14 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x0, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:04:14 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x220002, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f00000075c0)={@none, 0x1}) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x101, @dev={0xfe, 0x80, [], 0x2f}}}, {{0xa, 0x80, 0x0, @remote}}}, 0x108) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) ioperm(0x1, 0x40, 0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000080)={r5, 0x0, 0x10}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000280)={r5, 0xf9, "e4b145cd7108d2e6a4f7c2ff20bbbbcbadecdbec7b4185cdf386771ef01d5f1c3607bb637b34c658c0ce1d80cfaf1f73c2ff3f5c0b6724192936a1a1a3b9c05fbef654726681a1e39171d905d9c0ff1ccf763ada670d34f6cdc40b8eea58aa0db1e865e4764f019346963b125d8e4ddefd1ba80b481e964b41995e143dbe13adc13baa946579f11bfb269847b5141544cc9f3d6148baffebf1f9d3cf361a3fca660a3e485133671d5c1046a176b171e1a80dc42c274adae8a33155184dae84d1a9613cbfb5f3d9f56ebc1a14410be51c3a9b646522646cb167e40b7dc7daa5acb33132a93f4fedcd522ea4ec2110c90506d53caeb836929c37"}, &(0x7f0000000040)=0x101) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000080)={r6, 0xdf}, 0x8) r7 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r7, 0x0) r8 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r8, 0x0) ioctl$VIDIOC_QUERYBUF(r7, 0xc0585609, &(0x7f00000003c0)={0x4, 0x1, 0x4, 0x20000, 0x7, {}, {0x5, 0x0, 0x3, 0x9, 0x20, 0x4, "fc23f9cb"}, 0x7, 0x2, @fd=r8, 0x3, 0x0, 0xffffffffffffffff}) ioctl$SNDRV_PCM_IOCTL_RESUME(r9, 0x4147, 0x0) 08:04:14 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000040)=0xc) setuid(r1) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:14 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsu\x00', 0x600, 0x0) accept4$alg(r2, 0x0, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000040), &(0x7f00000000c0)=0xc) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) [ 382.377612][T22380] IPVS: ftp: loaded support on port[0] = 21 08:04:14 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000180)=""/154) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) 08:04:14 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000040)=0x14) 08:04:14 executing program 4: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) ioctl$CAPI_GET_FLAGS(r0, 0x80044323, &(0x7f0000000000)) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) 08:04:14 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) prctl$PR_GET_ENDIAN(0x13, &(0x7f00000000c0)) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x4e21, 0x2, @mcast2, 0x6}}, {{0xa, 0xce20, 0x8, @remote, 0x7}}}, 0x75) 08:04:14 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x0, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) [ 382.757715][T22420] IPVS: ftp: loaded support on port[0] = 21 08:04:14 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x6402, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:14 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000000)={0x1, 0x9}) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) 08:04:15 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xd00a, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:15 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x300000d, 0x10, r0, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r2, 0x6) 08:04:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0xffffffffffffffff) setuid(r1) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=@known='trusted.overlay.origin\x00', &(0x7f0000000200)='ip_vti0\x00', 0x8, 0x2) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x22180, 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f00000000c0)) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) r5 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@empty, @in6}}, {{@in=@remote}}}, &(0x7f0000000040)=0x56) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000140)={'ip_vti0\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) 08:04:15 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) clock_gettime(0x0, &(0x7f0000002b40)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000002a80)=[{{&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000001480)=[{&(0x7f00000000c0)=""/78, 0x4e}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/23, 0x17}, {&(0x7f0000001280)=""/44, 0x2c}, {&(0x7f00000012c0)=""/2, 0x2}, {&(0x7f0000001300)=""/45, 0x2d}, {&(0x7f0000001340)=""/241, 0xf1}, {&(0x7f0000001440)=""/52, 0x34}], 0x8, &(0x7f0000001500)=""/173, 0xad}, 0x1ff}, {{&(0x7f00000015c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000002780)=[{&(0x7f0000001640)=""/112, 0x70}, {&(0x7f00000016c0)=""/156, 0x9c}, {&(0x7f0000001780)=""/4096, 0x1000}], 0x3, &(0x7f00000027c0)=""/125, 0x7d}, 0x2}, {{&(0x7f0000002840)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000002a40)=[{&(0x7f00000028c0)=""/143, 0x8f}, {&(0x7f0000002980)=""/182, 0xb6}], 0x2}, 0x8}], 0x3, 0x40000040, &(0x7f0000002b80)={r2, r3+10000000}) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) r4 = socket$inet6(0xa, 0x800, 0x8) setsockopt$inet6_MCAST_JOIN_GROUP(r4, 0x29, 0x2a, &(0x7f0000000180)={0xfffff000, {{0xa, 0x4e22, 0x8, @local, 0x9}}}, 0x88) 08:04:15 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x0, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) [ 383.414148][T22471] IPVS: ftp: loaded support on port[0] = 21 08:04:15 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x80c00, 0x0) ioctl$SG_GET_LOW_DMA(r1, 0x227a, &(0x7f0000000040)) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r2, &(0x7f0000000140)={0xa, 0xfffd, 0x0, @mcast1}, 0x4b) 08:04:15 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x6, {{0xa, 0x1, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) r3 = getuid() r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r7) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r9) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000040)={{}, {0x1, 0xa}, [{0x2, 0x0, r2}, {0x2, 0x5, r3}, {0x2, 0x2, r5}, {0x2, 0x1, 0xee00}], {0x4, 0x4}, [{0x8, 0x4, r7}, {0x8, 0x6, r9}], {0x10, 0x4}, {0x20, 0x1}}, 0x54, 0x2) 08:04:15 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, 0x0) sendfile(r2, r1, 0x0, 0x100000002) [ 383.776624][T22471] IPVS: ftp: loaded support on port[0] = 21 08:04:15 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r2) setgid(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) accept$unix(r3, 0x0, &(0x7f0000000000)) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) ioctl$int_out(r1, 0x2, &(0x7f0000000040)) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) 08:04:15 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f0000000000)={0x6, 0x80, 0x1, 0x0, 0xffffff81, 0x1}) [ 383.919425][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 383.919435][ T26] audit: type=1804 audit(1586505855.673:116): pid=22517 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/267/cgroup.controllers" dev="sda1" ino=16337 res=1 08:04:15 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x6502, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:15 executing program 4: arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x6, 0x1}) 08:04:16 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xedc0, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:16 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x4e20, 0x0, @remote}}}, 0x108) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f00000000c0)={{0x2, 0x5}, {0x81}, 0x10000, 0x7, 0x5}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000000)={0x2}) 08:04:16 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) listen(r1, 0xffff) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f0000000000)={0x3, 0xe0, 0x1}) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) 08:04:16 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x4e24, 0x3, @local}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xb}, 0x8}}}, 0x108) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r2 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x0, 0x0) read(r2, &(0x7f00000001c0)=""/4096, 0x1000) ioctl$IMADDTIMER(r2, 0x80044940, &(0x7f0000000180)) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000011c0)={&(0x7f0000004000/0x1000)=nil, 0x1000}, &(0x7f0000001200)=0x10) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00') sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x40, r4, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) ioctl$SIOCX25SCUDMATCHLEN(r1, 0x89e7, &(0x7f0000000000)={0x55}) 08:04:16 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local}, 0x1c) 08:04:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) clone(0x4200000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmctl$IPC_RMID(0x0, 0x0) shmctl$SHM_STAT_ANY(0x0, 0xf, &(0x7f0000003080)=""/104) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r6) r7 = socket(0x10, 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000000c0)={@in={{0x2, 0x4e20, @multicast1}}, 0x0, 0x0, 0x0, 0x0, "c5e348deebe5f70330440ffff66330cf749cf2af2c32c5d630403b0aabcc8f9042f7e9d4676679841e768a7b6edeb667d0611a2126164795cab204acfd5bfcdaf61c7e3430854022d1f36e76ea0bcf73"}, 0xd8) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r9 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000008, 0x40010, r9, 0x0) ioctl$sock_FIOGETOWN(r9, 0x8903, &(0x7f00000001c0)=0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000040)={{0x2, r4, r6, r2, r8, 0x0, 0x400}, 0x80000000, 0x3, 0xeec1, 0x1, r10, r1, 0x9}) 08:04:16 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 08:04:16 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) [ 384.857995][ T26] audit: type=1804 audit(1586505856.603:117): pid=22578 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/268/cgroup.controllers" dev="sda1" ino=16362 res=1 08:04:16 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_smc(0x2b, 0x1, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000100)={0xa30000, 0x401, 0x4, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9f0902, 0x1, [], @value=0x304f675d}}) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000140)=0x8, &(0x7f0000000180)=0x2) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000000)=0xc) setuid(r3) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:16 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x100000, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000040)=0x20, 0x4) 08:04:16 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x6800, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:16 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0xff, 0x3f, 0x80, 0x1}, {0x10, 0x1, 0x6, 0x6}, {0x7ff, 0x0, 0x9, 0x80}]}) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000180)={0x3f, {{0xa, 0x4e22, 0x9120, @mcast1, 0x9}}, 0x0, 0x2, [{{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, [], 0x20}, 0x2}}, {{0xa, 0x4e20, 0x12e73c6, @rand_addr="50842cbd7b5bb713e5d2e1d5cca0be29", 0x5}}]}, 0x190) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) write$P9_RSYMLINK(r2, &(0x7f00000000c0)={0x14, 0x11, 0x1, {0x0, 0x2, 0x6}}, 0x14) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) [ 385.123705][T22586] IPVS: ftp: loaded support on port[0] = 21 08:04:17 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000040), 0x4) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0x4, &(0x7f0000000000)=0x10001, 0x4) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r1, 0xc2604110, &(0x7f0000000280)={0x10001, [[0x0, 0x1, 0x9, 0x4, 0x0, 0x8, 0xaa, 0x8000], [0x8, 0x62, 0x7, 0x0, 0x5, 0x0, 0x9, 0x474], [0x9, 0x3f, 0x1f, 0xffffffff, 0x4, 0x0, 0x0, 0x1]], [], [{0x9, 0xfffffffb, 0x0, 0x1, 0x1}, {0x9, 0x6, 0x1, 0x0, 0x1}, {0x80, 0x6, 0x1, 0x0, 0x1}, {0x200, 0x2, 0x1, 0x0, 0x0, 0x1}, {0x3d, 0x6}, {0xfffffe00, 0x4, 0x0, 0x0, 0x1, 0x1}, {0xfffffffd, 0x1ff, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x0, 0x1}, {0xffffffc0, 0x0, 0x0, 0x0, 0x0, 0x1}, {0x2b, 0xad0, 0x0, 0x0, 0x1}, {0x10001, 0x9, 0x0, 0x0, 0x0, 0x1}, {0x4, 0x1, 0x0, 0x0, 0x1, 0x1}], [], 0x8}) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:17 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3798c, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:17 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 08:04:17 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000000)={'bridge_slave_0\x00', {0x2, 0x4e22, @multicast2}}) [ 385.502521][T22627] IPVS: ftp: loaded support on port[0] = 21 08:04:17 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001280)=@mangle={'mangle\x00', 0x1f, 0x6, 0x648, 0x120, 0x340, 0x0, 0x0, 0x120, 0x578, 0x578, 0x578, 0x578, 0x578, 0x6, &(0x7f0000000000), {[{{@ipv6={@remote, @mcast1, [0x0, 0xff000101, 0x0, 0xff], [0x0, 0x0, 0xff, 0xffffffff], 'netpci0\x00', 'veth0_to_batadv\x00', {0xff}, {0xff}, 0x2b, 0xa8, 0x0, 0x30}, 0x0, 0xd8, 0x120, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}, {0x16, 0x6, 0x6, 0x0, 0x6, 0x10, 0x2431}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@multicast1, @ipv6=@ipv4={[], [], @broadcast}, 0x3a, 0x15, 0x9}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0x17}, @mcast2, [0xff000000, 0xffffffff, 0xffffff00, 0xfc1f1cb10d35ce14], [0xff, 0x0, 0xffffffff, 0xffffff00], 'batadv_slave_0\x00', 'veth1_to_batadv\x00', {0xff}, {}, 0xff, 0x7f, 0x4, 0x10}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x4}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x1}}]}, @HL={0x28, 'HL\x00', 0x0, {0x0, 0x17}}}, {{@uncond, 0x0, 0xd0, 0x100, 0x0, {}, [@common=@eui64={{0x28, 'eui64\x00'}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x3, 0x0, 0x2}, {0x3, 0x1, 0x6}, 0x100, 0x638f}}}, {{@ipv6={@remote, @mcast2, [0x0, 0xff000000, 0xff000000, 0xffffffff], [0xff000000, 0xff, 0xffffffff, 0xffffffff], 'rose0\x00', 'veth0_to_batadv\x00', {}, {}, 0x8, 0x81, 0x7, 0x11}, 0x0, 0xd0, 0x118, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"a2c6"}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@mcast2, @ipv4=@broadcast, 0x35, 0x24, 0x7}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [0xffffff00, 0xffffffff, 0xffffff00, 0xffffff00], [0xffffff00, 0xff000000, 0xff, 0xffffff00], 'veth0_to_bridge\x00', 'macvtap0\x00', {}, {}, 0x88, 0xfe, 0x1, 0x10}, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {'6l', 0x1}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6a8) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x4, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote, 0xfffffffd}}}, 0x108) r1 = msgget$private(0x0, 0x22e) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000080)=""/175) msgctl$IPC_INFO(r1, 0x3, &(0x7f0000000280)=""/4096) [ 385.546671][ T26] audit: type=1804 audit(1586505857.293:118): pid=22632 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/269/cgroup.controllers" dev="sda1" ino=16381 res=1 08:04:17 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x6, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) [ 385.713898][T22653] x_tables: duplicate underflow at hook 1 [ 385.740496][T22653] x_tables: duplicate underflow at hook 1 08:04:17 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) 08:04:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) read$dsp(r2, &(0x7f0000000000)=""/186, 0xba) setuid(r1) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$key(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x5, 0x63, 0x6, 0x11, 0x0, 0x70bd2a, 0x25dfdbff, [@sadb_x_policy={0x8, 0x12, 0x1, 0x1, 0x0, 0x6e6bbc, 0x1, {0x6, 0x3c, 0x2c, 0x81, 0x0, 0x401, 0x0, @in6=@mcast2, @in6=@remote}}, @sadb_x_nat_t_port={0x1, 0x16, 0x4e20}, @sadb_x_sa2={0x2, 0x13, 0x0, 0x0, 0x0, 0x70bd29, 0x3507}, @sadb_spirange={0x2, 0x10, 0x4d5, 0x4d3}, @sadb_spirange={0x2, 0x10, 0x4d6, 0x4d2}]}, 0x88}}, 0x60040000) 08:04:17 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)) sendfile(r2, r1, 0x0, 0x100000002) 08:04:17 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) r1 = semget$private(0x0, 0x3, 0xc) semctl$GETALL(r1, 0x0, 0xd, &(0x7f0000000180)=""/142) [ 385.966440][T22670] IPVS: ftp: loaded support on port[0] = 21 [ 386.046628][ T26] audit: type=1804 audit(1586505857.793:119): pid=22677 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/270/cgroup.controllers" dev="sda1" ino=16384 res=1 08:04:18 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x6c00, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:18 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x100010, r0, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x1, @broadcast, 0x4e20, 0x4, 'none\x00', 0x28, 0x8, 0xf}, 0x2c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$cgroup_ro(r0, &(0x7f0000000140)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$RTC_PLL_SET(r0, 0x40207012, &(0x7f0000000100)={0x45, 0x7, 0x0, 0x7ff, 0xfffffff9, 0x8, 0x3}) rt_sigtimedwait(&(0x7f0000000040)={[0x8001]}, 0x0, &(0x7f00000000c0)={0x77359400}, 0x8) 08:04:18 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) socketpair(0x25, 0x800, 0x7, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000080)={r4, 0x0, 0x10}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000180)={r4, 0xd9, "262bdf1b2c684572510800ec8093d602cc87612f76ac1a9f20203c74690a0d2b327e56412129c70e4b408ca03cc77e632ef38274ccbcd8a7c3d66d400a8fb3707009c54a157b24958acadf60bb69cd9f6d348dffb0565206e86986522efe7c01d924621766910bb0f06c60e75d265daed753a2b6e4ee562937d8ed2db434c8e8ff3779add4172ce4bf78e078a57e40911375820e205dd590c846e0848d7811f451bb9da2d9f7c073e00cf4589c9826ea604c2ca8126b3d977f08fe0e803be623afca00cc7ddee0d2e644e0efac23319da7fd192355aa051ac4"}, &(0x7f0000000040)=0xe1) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000340)={r4, @in={{0x2, 0x4e20, @local}}, 0x9, 0x3}, 0x90) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) [ 386.275784][T22675] IPVS: ftp: loaded support on port[0] = 21 08:04:18 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x40000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:18 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)) sendfile(r2, r1, 0x0, 0x100000002) 08:04:18 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) lookup_dcookie(0x1, &(0x7f0000000000)=""/96, 0x60) getsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) 08:04:18 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x2, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2}, 0x1c) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040)=@gcm_128={{0x303}, "8517e1d59cd37d2a", "5a07bf31c40cb2143775e42a96d18717", "67abd85e", "208848ccfb8bee86"}, 0x28) [ 386.566032][ T26] audit: type=1804 audit(1586505858.313:120): pid=22726 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/271/cgroup.controllers" dev="sda1" ino=16361 res=1 08:04:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r2, 0xc01c64ae, &(0x7f0000000000)={0x9, 0xd53, 0x80000000, 0x7, 0x7, 0x4042, 0xffff}) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:18 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) r1 = semget$private(0x0, 0x1, 0x0) semctl$SEM_STAT(r1, 0x0, 0x12, &(0x7f0000000000)=""/17) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) ioctl$KVM_GET_SREGS(r3, 0x8138ae83, &(0x7f0000000180)) semctl$GETNCNT(r1, 0x0, 0xe, &(0x7f00000000c0)=""/14) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x10800, 0x0) r5 = eventfd(0x1) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000000040)={0xa0000005}) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) [ 386.812516][T22746] IPVS: ftp: loaded support on port[0] = 21 08:04:18 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)) sendfile(r2, r1, 0x0, 0x100000002) 08:04:18 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080)=0x5, 0x4) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000040)={0x80, &(0x7f00000000c0)=""/128}) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) [ 387.155477][ T26] audit: type=1804 audit(1586505858.903:121): pid=22770 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/272/cgroup.controllers" dev="sda1" ino=16321 res=1 08:04:19 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x7400, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:19 executing program 4: r0 = socket$inet6(0xa, 0x80000, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000000)=0x1) 08:04:19 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x80, 0x2) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) vmsplice(r2, &(0x7f0000000100)=[{&(0x7f0000000080)="1323c3509803039fb3c997a05291c359874df377c13399", 0x17}, {&(0x7f00000000c0)}, {&(0x7f0000000280)="2f41b9c24723b5c4a3b2f1090db341d1f7e10c0b0000508d7c1ed2c12c557f5aac453471caed82573685156ab9f12b3760452f8c17b536a06b0632052ac59de45a085439b101ddf09b96b0ff0c404e7e96384245ff9796d26cc39ac618c9a8deccae", 0x62}], 0x3, 0x0) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000040)={0x8, @multicast1, 0x4e24, 0x2, 'dh\x00', 0x5, 0x200, 0x5e}, 0x2c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 387.321926][T22798] IPVS: ftp: loaded support on port[0] = 21 08:04:19 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0b") sendfile(r2, r1, 0x0, 0x100000002) 08:04:19 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) [ 387.585807][ T26] audit: type=1804 audit(1586505859.333:122): pid=22818 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/273/cgroup.controllers" dev="sda1" ino=16361 res=1 08:04:19 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x2, 0x3, 0x3, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40015}, 0x87b446e10ae7093c) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) 08:04:19 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1, 0x4000) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) close(r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r4, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000080), r4}}, 0x18) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000040)={0x2c, @rand_addr=0x142, 0x4e24, 0x3, 'dh\x00', 0x10, 0x1, 0x3b}, 0x2c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000100)={0x3, 0x0, 0x2, {0x7f, 0xe1, 0x2, 0x5e6}}) 08:04:19 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x6, 0x8000) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}, @IFA_ADDRESS={0x14, 0x1, @mcast2}]}, 0x40}}, 0x0) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={r4, @local, @multicast1}, 0xc) 08:04:21 executing program 4: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x5, 0x10, 0x8b2, 0xfffffffffffffff7}, &(0x7f0000000040)=0x18) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) 08:04:21 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0b") sendfile(r2, r1, 0x0, 0x100000002) 08:04:21 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) fchmodat(r1, &(0x7f0000000340)='./file0\x00', 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r3 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0xedba, 0x40002) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r3, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x38, 0x1407, 0x200, 0x70bd25, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r4}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000001}, 0x1000) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f0000000000)={0x862, 0x1}) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x8000, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) ioctl$VFIO_IOMMU_GET_INFO(r2, 0x3b70, &(0x7f0000000040)={0x18, 0x0, 0x0, 0x4}) 08:04:21 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x7a00, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:21 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) ioctl$TCSETXW(r2, 0x5435, &(0x7f0000000040)={0x9, 0xfff7, [0x2a38, 0x4, 0x9, 0x0, 0x101], 0x7}) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:22 executing program 4: r0 = socket$inet6(0xa, 0xa, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socketpair(0x23, 0x6, 0x403, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_int(r1, 0x1, 0x4, &(0x7f0000000080)=0x6, 0x6) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @ipv4={[], [], @empty}}, 0x1c) 08:04:22 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x21}}}, {{0xa, 0x4e22, 0x0, @remote}}}, 0x108) [ 390.285585][T22865] IPVS: ftp: loaded support on port[0] = 21 [ 390.321200][ T26] audit: type=1804 audit(1586505862.073:123): pid=22861 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/274/cgroup.controllers" dev="sda1" ino=16357 res=1 08:04:22 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = socket(0x27, 0x2, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000040)=0x40) 08:04:22 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0b") sendfile(r2, r1, 0x0, 0x100000002) 08:04:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) clone(0xc75e43cfae205d4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:22 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mount$9p_tcp(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)='9p\x00', 0x1402, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532342c76657273696f6e3d3970323030302e4c2c61707072616973655f747970653d696d61736967f8ff65726d69745f646972656374696f2c736d61636b66736861743d6d643573756d2e707070312c6d61736b3d5e4d41595f415050454e442c646f6e745f686173682c61707072616973652c736d61636b66737472616e736d7574653d21656d31766d6e6574305e295d766d6e6574302c00"]) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000000)) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f00000000c0)=""/113, &(0x7f0000000040)=0x71) 08:04:22 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4010011, r1, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x2) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 390.866807][T22914] IPVS: ftp: loaded support on port[0] = 21 [ 390.883164][ T26] audit: type=1804 audit(1586505862.633:124): pid=22911 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/275/cgroup.controllers" dev="sda1" ino=16370 res=1 08:04:22 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000000)=0x2) 08:04:22 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000080)={r3, 0x0, 0x10}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x401, 0x2, 0x4, 0x2, r3}, &(0x7f0000000100)=0x10) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x6, 0x7, 0x5}, {0x3, 0xae, 0x20, 0x40}, {0x4, 0xfe, 0x6, 0x41e800a9}, {0xfffd, 0x0, 0x2, 0x8}, {0x8, 0xfc, 0x80, 0x2}]}, 0x10) 08:04:22 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x7b4c, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:23 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:23 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1001}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="20000000150a010300000011000000000a0000080c0006400000000000000001"], 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x8040) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x401, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x3d}}}, 0xd) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000100)=0x4, 0x4) 08:04:23 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847") sendfile(r2, r1, 0x0, 0x100000002) 08:04:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r1, 0x111, 0x2, 0x0, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:23 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) sendmsg$IPSET_CMD_HEADER(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x50, 0xc, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x5}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x50}, 0x1, 0x0, 0x0, 0x41}, 0x20004000) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:23 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) [ 391.375968][T22964] IPVS: ftp: loaded support on port[0] = 21 [ 391.398420][ T26] audit: type=1804 audit(1586505863.153:125): pid=22963 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/276/cgroup.controllers" dev="sda1" ino=16380 res=1 08:04:23 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0xcd, {{0xa, 0x0, 0x0, @local, 0x81}}, {{0xa, 0x0, 0x0, @loopback, 0xfffffffe}}}, 0x109) 08:04:23 executing program 4: r0 = socket$inet6(0xa, 0x4, 0x80000000) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) 08:04:23 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847") sendfile(r2, r1, 0x0, 0x100000002) 08:04:23 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r1) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000000)={'veth0_macvtap\x00', 0x1000}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x61b6, @rand_addr="ebdf8f538927b61a00"}}}, 0x108) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2000009, 0x12, r3, 0x4000) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r3, 0x40a85323, &(0x7f0000000380)={{0x1f, 0x81}, 'port1\x00', 0x2, 0x0, 0x40, 0x6, 0x5, 0x6, 0x4, 0x0, 0x6}) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x44, r6, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ipvlan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x5}]}]}, 0x44}}, 0x0) 08:04:23 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e1e, 0x0, @ipv4={[], [], @empty}, 0x7fffffff}, 0x1c) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) dup3(r3, r3, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) flock(r1, 0x9) [ 391.920189][ T26] audit: type=1804 audit(1586505863.673:126): pid=23005 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/277/cgroup.controllers" dev="sda1" ino=16370 res=1 [ 392.044698][ T26] audit: type=1800 audit(1586505863.773:127): pid=23009 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed comm="syz-executor.5" name="SYSV00000000" dev="hugetlbfs" ino=4 res=0 08:04:24 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x9a01, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:24 executing program 4: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000000)={0x592a, 0x2, 0x4, 0x20000000, 0x21, {0x77359400}, {0x5, 0x1, 0xb8, 0x3, 0x8, 0xcf, "a0fb6dd5"}, 0x7fff, 0x2, @userptr=0x1ff, 0x9, 0x0, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee1, &(0x7f0000000100)={0x0, 0x3, 0xffffffffffff8000, &(0x7f00000000c0)=0x9}) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) 08:04:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00') sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(0xffffffffffffffff, &(0x7f0000001300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8004}, 0xc, &(0x7f00000012c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="100026bd7000fddbdf250c0000000510300000000000050033000100000047e96ef465ff242aa2343e3d70757b3aa21d429901407c9dc7baba582c8287c8a4a95e3c3295928399d1fc8653f2b012dd28"], 0x24}, 0x1, 0x0, 0x0, 0x240448d0}, 0xc000) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) bind$netlink(r2, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfd, 0x8}, 0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r5 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r5, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000040)={0xac, 0x3, 0x4, 0x200000, 0x5, {}, {0x2, 0xc, 0x1f, 0x0, 0x7f, 0x5, "6bcde700"}, 0x2, 0x3, @fd=r5, 0xffff, 0x0, r3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r6, 0x40045730, &(0x7f0000000180)=0x6) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x80000) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x301182, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f0000001340)) setuid(r4) r7 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TCGETS2(r7, 0x802c542a, &(0x7f0000000000)) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:24 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:24 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847") sendfile(r2, r1, 0x0, 0x100000002) 08:04:24 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @rand_addr="093529cf18a6d299a73bc3bc58f62a76"}, 0x1c) 08:04:24 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x400080, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0xa296, @dev={0xfe, 0x80, [], 0x36}, 0xce2}, 0x1c) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r1, 0x8983, &(0x7f0000000080)) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000080)={r4, 0x0, 0x10}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f00000000c0)={r4, 0x17, "7c1fb60045bf0ae870926d002fa7bc4180cc2b7bf67e0f"}, &(0x7f0000000100)=0x1f) r6 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r6, 0x0) bind$bt_rfcomm(r6, &(0x7f0000000400)={0x1f, @any, 0xff}, 0xa) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000380)={r5, 0xd0, &(0x7f0000000280)=[@in6={0xa, 0x4e22, 0x2fed, @loopback, 0xbae8}, @in={0x2, 0x4e21, @empty}, @in={0x2, 0x4e24, @loopback}, @in={0x2, 0x4e22, @rand_addr=0x1f}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0x1, @rand_addr="0707ba6c203ea89e67d74795f7b7e00b", 0x7fffffff}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e24, 0x3, @mcast1, 0x100}, @in6={0xa, 0x4e24, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}]}, &(0x7f00000003c0)=0x10) [ 392.496744][T23027] IPVS: ftp: loaded support on port[0] = 21 [ 392.610033][ T26] audit: type=1804 audit(1586505864.363:128): pid=23035 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/278/cgroup.controllers" dev="sda1" ino=16357 res=1 08:04:24 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) prctl$PR_SET_PDEATHSIG(0x1, 0x2c) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) 08:04:24 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x200, @remote}}}, 0x108) 08:04:24 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x40010, r0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000000)=0xc) setuid(r1) clone(0xc75e43cb36626d4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:24 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a0") sendfile(r2, r1, 0x0, 0x100000002) 08:04:24 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x1, 0x0, @empty, 0xffff}, 0x1c) [ 393.191636][ T26] audit: type=1804 audit(1586505864.943:129): pid=23079 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/279/cgroup.controllers" dev="sda1" ino=16381 res=1 08:04:25 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x9b01, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:25 executing program 5: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x14fc1, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = socket$pppl2tp(0x18, 0x1, 0x1) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvme-fabrics\x00', 0x8001, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000080), &(0x7f0000000000)=0x68) 08:04:25 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x400141042, 0x80) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000080)={r4, 0x0, 0x10}, &(0x7f00000000c0)=0x18) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x5, 0x7ff, 0x5, 0x80, 0x6, 0x6, 0x9, 0x9, r4}, 0x20) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) 08:04:25 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x5000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:25 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a0") sendfile(r2, r1, 0x0, 0x100000002) [ 393.624797][ T26] audit: type=1804 audit(1586505865.373:130): pid=23097 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/280/cgroup.controllers" dev="sda1" ino=16370 res=1 08:04:25 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f0000000080)={0x1, 0xa7}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = open(&(0x7f0000000040)='./bus\x00', 0x400101042, 0x2) mmap(&(0x7f0000007000/0x1000)=nil, 0x1000, 0x1000004, 0x10, r2, 0x800000) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r2, 0x800442d4, &(0x7f0000000000)=0x7f) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000280)) setgid(r3) lsetxattr$trusted_overlay_redirect(&(0x7f0000000380)='./bus/file0\x00', &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000340)='./bus/file0\x00', 0xc, 0x2) 08:04:25 executing program 4: r0 = socket$inet6(0xa, 0xec6db088855fe01, 0x1000000) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000180)={{{@in=@dev, @in=@loopback}}, {{@in6=@mcast2}}}, &(0x7f0000000000)=0xe8) socket$nl_netfilter(0x10, 0x3, 0xc) 08:04:25 executing program 4: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2, &(0x7f0000000080)=0x1, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) 08:04:25 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a0") sendfile(r2, r1, 0x0, 0x100000002) 08:04:25 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) setsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000000)=0x1, 0x4) 08:04:25 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x20500) socket$alg(0x26, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040), &(0x7f00000000c0)=0xe) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) 08:04:25 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x4e21, 0x0, @rand_addr="4427948176064c57003925e0a9ba90dd"}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x20, 0x7fffffff, 0xfd7, 0x2, 0x20}) [ 394.172386][ T26] audit: type=1804 audit(1586505865.923:131): pid=23116 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/281/cgroup.controllers" dev="sda1" ino=16379 res=1 08:04:26 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xedc0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:26 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x2, 0x5, [0x200, 0x3, 0x7ff, 0x878, 0x9]}, 0x12) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000000)={'raw\x00', 0x3, [{}, {}, {}]}, 0x58) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) 08:04:26 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x6000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:26 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000000)=0x5, 0x4) write$dsp(r1, &(0x7f0000000280)="01d66013b703ecc7a999df198370d3b8021ddc7849a1447a342f2fd0b4f67fab601dafa00dd9c607c813fd428e5141c96c64537446dc74d2c44fde2a54522177a40b9de7036b9f9094d9d8bee6365a639eef9c1dde16b4038c031dd9d4fa1e04e36bfc6523a79fca0f99a05db8635469172b52f9835b370f4552286498f7cebc2e32d9adec2a02374dc8b82a4e3e0ce2097267956ac70cc63720c9572ab1046afb054e96ba88eabe6213fe8bf9dffcf6feb9098573", 0xb5) 08:04:26 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(0xffffffffffffffff, r1, 0x0, 0x100000002) 08:04:26 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r1) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000000)={'veth0_macvtap\x00', 0x1000}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x61b6, @rand_addr="ebdf8f538927b61a00"}}}, 0x108) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2000009, 0x12, r3, 0x4000) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r3, 0x40a85323, &(0x7f0000000380)={{0x1f, 0x81}, 'port1\x00', 0x2, 0x0, 0x40, 0x6, 0x5, 0x6, 0x4, 0x0, 0x6}) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x44, r6, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ipvlan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x5}]}]}, 0x44}}, 0x0) [ 394.674067][ T26] audit: type=1804 audit(1586505866.423:132): pid=23137 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/282/cgroup.controllers" dev="sda1" ino=16363 res=1 08:04:26 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(0xffffffffffffffff, r1, 0x0, 0x100000002) 08:04:26 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x1, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8075}, 0x8010) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_GET_STATION(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r3, 0x2, 0x70bd29, 0x25dfdbfc, {}, [@NL80211_ATTR_STA_SUPPORT_P2P_PS={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24044040}, 0x4000400) 08:04:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) clone(0xc75e43cfae205d4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:26 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(0xffffffffffffffff, r1, 0x0, 0x100000002) [ 395.205525][T23155] IPVS: ftp: loaded support on port[0] = 21 08:04:27 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000002) 08:04:27 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xf70a, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:27 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:27 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)) sendfile(r2, r1, 0x0, 0x100000002) [ 395.572975][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 395.572986][ T26] audit: type=1804 audit(1586505867.323:136): pid=23183 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/285/cgroup.controllers" dev="sda1" ino=16377 res=1 08:04:27 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000002) [ 395.844582][ T26] audit: type=1804 audit(1586505867.593:137): pid=23194 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir939260476/syzkaller.GOp9ws/458/cgroup.controllers" dev="sda1" ino=16377 res=1 08:04:27 executing program 4: r0 = socket$inet6(0xa, 0xa, 0x7) setsockopt$sock_int(r0, 0x1, 0xb, &(0x7f0000000000)=0x5, 0x4) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x80001, 0x84) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f00000002c0)) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000006, 0x11, r3, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000080)={r4, 0x0, 0x10}, &(0x7f00000000c0)=0x18) socket(0x10, 0x803, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x56, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[]}}, 0x1) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000100)={@remote, r6}, 0x14) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000040)={0x5, 0x20b, 0xfd, 0xfffffffe, r4}, 0x10) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xfffd, 0x0, @empty}, 0x1c) 08:04:27 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000002) [ 395.969345][ T26] audit: type=1804 audit(1586505867.633:138): pid=23198 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/286/cgroup.controllers" dev="sda1" ino=16384 res=1 08:04:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) r3 = socket(0x10, 0x800000000080002, 0x10) r4 = syz_genetlink_get_family_id$smc(&(0x7f0000000100)='SMC_PNETID\x00') setsockopt$ARPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x61, &(0x7f00000002c0)={'filter\x00', 0x4}, 0x68) sendmsg$SMC_PNETID_ADD(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="01000000000000000000020000001400020076657468315f746f5f626174616476000900030073797a3000000000090001006703000000000000"], 0x40}}, 0x0) sendmsg$SMC_PNETID_ADD(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x7c, r4, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'bond_slave_0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'bond0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x80}, 0x40) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:28 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_smc(0x2b, 0x1, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000100)={0xa30000, 0x401, 0x4, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9f0902, 0x1, [], @value=0x304f675d}}) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000140)=0x8, &(0x7f0000000180)=0x2) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000000)=0xc) setuid(r3) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 396.200143][ T26] audit: type=1804 audit(1586505867.953:139): pid=23209 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/287/cgroup.controllers" dev="sda1" ino=16360 res=1 [ 396.273842][T23208] IPVS: ftp: loaded support on port[0] = 21 08:04:28 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x0) 08:04:28 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x20000000) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) [ 396.431224][T23215] IPVS: ftp: loaded support on port[0] = 21 [ 396.551552][ T26] audit: type=1804 audit(1586505868.303:140): pid=23234 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/288/cgroup.controllers" dev="sda1" ino=16382 res=1 08:04:28 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:28 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x0) 08:04:28 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xf80a, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) [ 396.795334][T23263] IPVS: ftp: loaded support on port[0] = 21 08:04:28 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0xfff, @ipv4={[], [], @empty}}, 0x1c) r1 = add_key$user(&(0x7f0000000640)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f00000000c0), 0xc6, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r1, r1}, &(0x7f0000000040)=""/29, 0x1d, &(0x7f0000000240)={&(0x7f00000001c0)={'rmd128\x00'}}) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f0000001500)=0xffffffff) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r2, &(0x7f0000001580)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000001540)={&(0x7f0000001640)=ANY=[@ANYBLOB="3000004d55fe1439f4223fe6345f00020801030000000000000000010000060201000100e04ab12100000000048001080004dedc45c725960001400000eaeefef43a4d1350d98157176320c011224294087c5ec27f00"/97], 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x45) r4 = add_key$user(&(0x7f0000000640)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f00000000c0), 0xc6, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r4, r4, r4}, &(0x7f0000000040)=""/29, 0x1d, &(0x7f0000000240)={&(0x7f00000001c0)={'rmd128\x00'}}) keyctl$instantiate_iov(0x14, r1, &(0x7f0000001480)=[{&(0x7f0000000000)="85d08a0f7c45f3ae501f5439ef1f29edd50995bd6907c0d3d198a37ac0b910c6fbe2f8244fef32008463ccfd73ddb12bd85426a50b6cc1af4dcb9175f97fa7d0a4e9c88df6a71d7cabf3b576b5b83336a4fd84c650ec86afaafa3937f93e64919adbc05bde0bf93cec987e7914cd", 0x6e}, {&(0x7f0000000180)="8c98387b1b19da7c154903ebc504099953623940531408a38478ea49953071a54311f01dcb8f9d99c400d3f075ccd221841c5ae0e1e79f3f988e0eaabe23578d7d7cafb5b9d1a91ba7ed73c804d8f2c87b0ccbf201f66bd81c6b30ef774cee73c90f83c1b7888cd9e82ad3438f8718034200ac33ae4a9f9fcaada3088bc8fb422d99a2762b17e57cb7191e2dae", 0x8d}, {&(0x7f0000000240)="20f546ab30acdbe65b203e67ffff489133ad4088fe523cf3527a8d65a6ba10cb918072e9b14217d054280207bcfa5e35e87e2b69f6ab2b3342a244c12e861f67e3045dd047612be60a453ed0701fc6beb56fa7ad0b20c071b91da56d8ed6a23416230bb34e840cf1684ebc2f173a63305575ea8cbfde07d4af5de65de58a65821b1557c359474fc27ee8e5e9b8070af50e6adf43c5645a7bd6ed687658b2ad8a7ad353f9d646ffe722f4162c34f153edf937efb0b93a9110806b48917b2a81c2e27b005b743ba55f7ad8150558d3afeb315cec3ac8e330a403e4cfdfc133a82ef6c411da5b586d6dd6a1fe2d6ea2", 0xee}, {&(0x7f00000000c0)="303f4bce9cbe7bf57affa8012652fe86e0b440d7", 0x14}, {&(0x7f0000000340)="50a8df8319ec64d181d9749ce0e6b2b62425b0d908e7901db333d5f9f02972c8ba8ecaff6df08b502f8cb793b0e2a25caed91a640c0b1292c03dd480881fe6d8e282a0a601d8939e427732a0c677f7f1158d4dcba5dfa49749c5ebeca0ba71e0c5f20cc5967cababcad38c13742256a495e30f763fdd35452879c5dabfc0626ba0add1c40f1062b9a9c020c38409941a54f4e1659189abf3be9c618661420f4e314ca221a98e56ab0f", 0xa9}, {&(0x7f0000000400)="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", 0x1000}, {&(0x7f0000001400)="2c47e6e34563c4fd72655e918c60ea56282880eebd1bab796642be42e38fcc76d68c99def4a7a8634edb20d856e27cbc9cf643272c5a9769a1dab7521a61b34895c6dc0ba74997e63501c6dc8f51ccb638023bb242279be141653c0a63b4", 0x5e}], 0x7, r4) [ 396.838010][ T26] audit: type=1804 audit(1586505868.593:141): pid=23264 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/289/cgroup.controllers" dev="sda1" ino=16380 res=1 08:04:28 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x0) 08:04:28 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_smc(0x2b, 0x1, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000100)={0xa30000, 0x401, 0x4, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9f0902, 0x1, [], @value=0x304f675d}}) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000140)=0x8, &(0x7f0000000180)=0x2) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000000)=0xc) setuid(r3) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 397.190849][T23299] IPVS: ftp: loaded support on port[0] = 21 [ 397.210709][ T26] audit: type=1804 audit(1586505868.963:142): pid=23307 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/290/cgroup.controllers" dev="sda1" ino=16380 res=1 08:04:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000040)={0x9a0000, 0x5, 0x6, r0, 0x0, &(0x7f0000000000)={0x990a2e, 0x9, [], @value=0x3ff}}) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:29 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, 0x0) sendfile(r2, r1, 0x0, 0x100000002) [ 397.500216][T23319] IPVS: ftp: loaded support on port[0] = 21 08:04:29 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x9000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) [ 397.706997][ T26] audit: type=1804 audit(1586505869.453:143): pid=23335 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/291/cgroup.controllers" dev="sda1" ino=16380 res=1 08:04:29 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x224882) setsockopt$RXRPC_SECURITY_KEY(r1, 0x110, 0x1, &(0x7f00000004c0)='\x00', 0x1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) getsockopt$sock_int(r2, 0x1, 0x27, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) getpeername(r3, &(0x7f0000000180)=@nfc, &(0x7f0000000100)=0x80) 08:04:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) ioctl$KVM_CHECK_EXTENSION(r2, 0xae03, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0xffffd000) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000080)={r5, 0x0, 0x10}, &(0x7f00000000c0)=0x18) r6 = open(&(0x7f0000000080)='./bus\x00', 0x10943, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r6, 0x0) write(r6, &(0x7f0000000140)="ea4a9a04b9af5df6bcd4a56af8640f20c572a8e784dd5385ba12e5bc7ef668aaa87608f21071939390cf5644e97915a2fc9a7bc07d3b3d6bf7fff53a93ed4919abd452ad3567a9a82cab8bf82e464cfdc12a9e62e89273a514a1b22c9c21c64cbf0e8d8ea6ae66ecece829a1408010e0aa39", 0x72) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000000)={r5, @in6={{0xa, 0x4e24, 0x7fffffff, @mcast2, 0x2}}}, 0x84) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000100)) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x0, './bus\x00'}, 0x6e) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r7) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:29 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) [ 397.902508][T23367] IPVS: ftp: loaded support on port[0] = 21 [ 397.995372][T23370] IPVS: ftp: loaded support on port[0] = 21 08:04:29 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 08:04:29 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0x4) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0xfffffe01, @loopback, 0x2}, 0x1c) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) fcntl$dupfd(r2, 0x406, r3) r4 = open(&(0x7f0000000100)='./bus\x00', 0x400240042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) ioctl$PPPIOCGIDLE(r4, 0x8010743f, &(0x7f00000000c0)) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) ioctl$SIOCX25CALLACCPTAPPRV(r1, 0x89e8) 08:04:30 executing program 4: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x3000) modify_ldt$read_default(0x2, &(0x7f0000000180)=""/4096, 0x1000) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000000)={0xfffffffffffffffc, 0x1, 0x9, 0x3, 0x80}) fcntl$getown(r0, 0x9) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0xfffffffffffffeff, 0x406000) ioctl$TIOCSRS485(r2, 0x542f, &(0x7f0000001180)={0xffffffff, 0x81, 0x5}) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) prctl$PR_SET_SECUREBITS(0x1c, 0xe) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x2) ioctl$SNDRV_PCM_IOCTL_DELAY(r3, 0x80084121, &(0x7f00000000c0)) [ 398.322608][ T26] audit: type=1804 audit(1586505870.073:144): pid=23398 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/292/cgroup.controllers" dev="sda1" ino=16380 res=1 08:04:30 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0xa6080, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000040)=0xc) setuid(r2) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 398.654833][T23425] IPVS: ftp: loaded support on port[0] = 21 08:04:30 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 08:04:30 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xa000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) [ 398.978496][ T26] audit: type=1804 audit(1586505870.733:145): pid=23444 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/293/cgroup.controllers" dev="sda1" ino=16371 res=1 08:04:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) fstat(r0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xc1, 0x5, &(0x7f0000001400)=[{&(0x7f00000002c0)="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", 0x1000, 0x25f}, {&(0x7f0000000080)="0d4b9884897e17415506f7d2cba8e9b685bcf192409d611162e04678020a66aee0f81b3d52b51e04fabb98eb52cfefd3d58b7e8e91b751fb44a381ef031546b553578874d16a50a55dc6917ed52718b21356133c07d36fc6212d06defcb6b822e3ebac074e428238cedb3d379264799288031600261a172a518c30f2237f1e519dc1ad108f1d", 0x86, 0x100000001}, {&(0x7f0000000140)="0bb0e496fb3cfa63e49b27e8ac4d346edfa61808abbee66d18f4fee653574d9dca26acccbf88236b0a91d05b7d82ea0d7c466fa1c19c7cb43194a8c43892d9d9093417850cef52e5ae29456c88176a5ea20463c53f7a5a81b16852e495f709ea25bc304370b060b39eb442afaec2ef68d3c97666265a512ed05bd8dbc5b5fd30015f10bb", 0x84, 0x51}, {&(0x7f00000012c0)="eee2a2f20a4941b1728f808222b0b52591ac8eecaa9667d04bad82450c5b0e9709b58e7c41c06075e4f05ead29801a0734e72eda5f46da96154b6860682da64079ddfb4f11c3339ac78d5fe450f466dae7b698941cc5b10292970c7041884a51934ac4059db719d75069932ff579a408172b22ca7f313cdc70eaf73c8f1315ca2bd8db15406f84ec95203ceb2ae313236c6e7d", 0x93, 0xd4}, {&(0x7f0000001380)="c31992264fcfd06fde35dedffa395004e4736009f35bcbf1dbb3063db943f979bdbb2a8c5f13070f8c25a449b5121b948621bee02013af41a9d0839e004e7dffe4deeb60f12512cc4912ae5f", 0x4c, 0x1}], 0x2020000, &(0x7f0000001500)={[{@errors_ro_remount='errors=ro-remount'}, {@grpjquota='grpjquota'}, {@grpquota='grpquota'}], [{@smackfstransmute={'smackfstransmute'}}, {@appraise_type='appraise_type=imasig'}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, 'em0vmnet1'}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@hash='hash'}, {@obj_user={'obj_user', 0x3d, '(#ppp0'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}]}) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:33 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x384b4, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:33 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(r1, 0xc038563b, &(0x7f0000000040)={0x1, 0x0, {0xb9b5, 0x7, 0x1}}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f00000000c0)=0x93a, 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0xfe}, [@IFA_LOCAL={0x14, 0x2, @ipv4}, @IFA_ADDRESS={0x14, 0x1, @mcast2}]}, 0x40}, 0x1, 0x0, 0x0, 0x40}, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @ipv4}, @IFA_ADDRESS={0x14, 0x1, @mcast2}]}, 0x40}}, 0x0) r6 = socket(0x10, 0x803, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x70bd28, 0x0, {0xa, 0x0, 0xa2, 0x0, r8}, [@IFA_FLAGS={0x8, 0x8, 0x260}, @IFA_ADDRESS={0x14, 0x1, @mcast2}]}, 0x34}}, 0x0) sendmsg$NL80211_CMD_GET_MPATH(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042bbd7000fedbdf251500000008000300", @ANYRES32=0x0, @ANYBLOB="f291923166aca5de23b75d3a63000000000000000000", @ANYRES32=r5, @ANYBLOB="08000300", @ANYRES32=r8, @ANYBLOB], 0x2c}, 0x1, 0x0, 0x0, 0x20000001}, 0x80) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000000)=0x7, 0x4) 08:04:33 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$netlink(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 08:04:33 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000200)={0x30, r5, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x4}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}]}, 0x30}, 0x1, 0x0, 0x0, 0x40040}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r4, &(0x7f0000007bc0)={0x0, 0x0, &(0x7f0000007b80)={&(0x7f0000007a00)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="300328bd7000fcdbdf250100000030010c8024000b8008000900ef30823908001a000e940000080009000300000008000a00373f00003c000b503a000a00801f000008000a"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) sendmsg$NLBL_CIPSOV4_C_REMOVE(r3, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0100002e", @ANYRES16=r5, @ANYBLOB="000125bd7000fbdbdf25020000000400088008000100010000003400048005000300020000000500030007000000050003000600000005000300000000000500030006000000050003000700000008000200020000000c0004800500030002000000"], 0x68}, 0x1, 0x0, 0x0, 0x20040001}, 0x8000001) sendmsg$NLBL_CIPSOV4_C_LISTALL(r1, &(0x7f0000000480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)={0x198, r5, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x30, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x82b3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xfcbeb3f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6cf32eb9}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4eda1d07}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3cc9}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0xc8, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8efe}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1cb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1eb}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xa9ca9c1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x82}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfda0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2b5f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc7a6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7c71fd04}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9e64}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x41bdc2a1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1345}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe272}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4ac213d1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x34ae}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x652f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x54c3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xaa45}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x79fc75a3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1189}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa0d3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3b8aa209}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc29e}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x6}, {0x5}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x54, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x80000000}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4e2deb57}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x76471763}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbbdd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7647b437}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1601}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6a66795a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x52b74447}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x684da20d}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}, {0x5}]}]}, 0x198}, 0x1, 0x0, 0x0, 0x18}, 0x80) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000000)=0x7, 0x4) r6 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r6, 0x0) ioctl$RTC_EPOCH_READ(r6, 0x8008700d, &(0x7f00000004c0)) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_ENTRIES(r7, 0x29, 0x41, &(0x7f0000000040)={'nat\x00', 0x5, "08867e5172"}, &(0x7f00000000c0)=0x29) setsockopt$inet6_group_source_req(r7, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:33 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xb000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:33 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) renameat2(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x28a8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt(r1, 0x500000, 0xfa, &(0x7f0000000240)=""/109, &(0x7f0000000000)=0x6d) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) pipe(&(0x7f0000000100)) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) r4 = shmget$private(0x0, 0x2000, 0x8a, &(0x7f0000ffb000/0x2000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) ioctl$TCSETSF(r2, 0x5453, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x68, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {{}, {}, {0x4c, 0x18, {0x5, @media='udp\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8c4}, 0x4004000) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) [ 401.686994][ T26] audit: type=1804 audit(1586505873.433:146): pid=23481 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/294/cgroup.controllers" dev="sda1" ino=16372 res=1 08:04:33 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000200)={0x30, r5, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x4}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}]}, 0x30}, 0x1, 0x0, 0x0, 0x40040}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r4, &(0x7f0000007bc0)={0x0, 0x0, &(0x7f0000007b80)={&(0x7f0000007a00)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="300328bd7000fcdbdf250100000030010c8024000b8008000900ef30823908001a000e940000080009000300000008000a00373f00003c000b503a000a00801f000008000a"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) sendmsg$NLBL_CIPSOV4_C_REMOVE(r3, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0100002e", @ANYRES16=r5, @ANYBLOB="000125bd7000fbdbdf25020000000400088008000100010000003400048005000300020000000500030007000000050003000600000005000300000000000500030006000000050003000700000008000200020000000c0004800500030002000000"], 0x68}, 0x1, 0x0, 0x0, 0x20040001}, 0x8000001) sendmsg$NLBL_CIPSOV4_C_LISTALL(r1, &(0x7f0000000480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)={0x198, r5, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x30, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x82b3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xfcbeb3f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6cf32eb9}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4eda1d07}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3cc9}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0xc8, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8efe}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1cb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1eb}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xa9ca9c1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x82}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfda0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2b5f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc7a6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7c71fd04}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9e64}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x41bdc2a1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1345}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe272}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4ac213d1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x34ae}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x652f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x54c3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xaa45}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x79fc75a3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1189}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa0d3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3b8aa209}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc29e}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x6}, {0x5}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x54, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x80000000}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4e2deb57}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x76471763}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbbdd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7647b437}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1601}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6a66795a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x52b74447}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x684da20d}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}, {0x5}]}]}, 0x198}, 0x1, 0x0, 0x0, 0x18}, 0x80) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000000)=0x7, 0x4) r6 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r6, 0x0) ioctl$RTC_EPOCH_READ(r6, 0x8008700d, &(0x7f00000004c0)) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_ENTRIES(r7, 0x29, 0x41, &(0x7f0000000040)={'nat\x00', 0x5, "08867e5172"}, &(0x7f00000000c0)=0x29) setsockopt$inet6_group_source_req(r7, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 401.744435][T23488] IPVS: ftp: loaded support on port[0] = 21 08:04:33 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000200)={0x30, r5, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x4}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}]}, 0x30}, 0x1, 0x0, 0x0, 0x40040}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r4, &(0x7f0000007bc0)={0x0, 0x0, &(0x7f0000007b80)={&(0x7f0000007a00)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="300328bd7000fcdbdf250100000030010c8024000b8008000900ef30823908001a000e940000080009000300000008000a00373f00003c000b503a000a00801f000008000a"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) sendmsg$NLBL_CIPSOV4_C_REMOVE(r3, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0100002e", @ANYRES16=r5, @ANYBLOB="000125bd7000fbdbdf25020000000400088008000100010000003400048005000300020000000500030007000000050003000600000005000300000000000500030006000000050003000700000008000200020000000c0004800500030002000000"], 0x68}, 0x1, 0x0, 0x0, 0x20040001}, 0x8000001) sendmsg$NLBL_CIPSOV4_C_LISTALL(r1, &(0x7f0000000480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)={0x198, r5, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x30, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x82b3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xfcbeb3f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6cf32eb9}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4eda1d07}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3cc9}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0xc8, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8efe}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1cb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1eb}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xa9ca9c1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x82}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfda0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2b5f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc7a6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7c71fd04}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9e64}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x41bdc2a1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1345}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe272}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4ac213d1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x34ae}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x652f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x54c3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xaa45}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x79fc75a3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1189}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa0d3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3b8aa209}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc29e}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x6}, {0x5}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x54, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x80000000}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4e2deb57}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x76471763}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbbdd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7647b437}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1601}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6a66795a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x52b74447}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x684da20d}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}, {0x5}]}]}, 0x198}, 0x1, 0x0, 0x0, 0x18}, 0x80) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000000)=0x7, 0x4) r6 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r6, 0x0) ioctl$RTC_EPOCH_READ(r6, 0x8008700d, &(0x7f00000004c0)) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_ENTRIES(r7, 0x29, 0x41, &(0x7f0000000040)={'nat\x00', 0x5, "08867e5172"}, &(0x7f00000000c0)=0x29) setsockopt$inet6_group_source_req(r7, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:33 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x343100, 0x0) ioctl$KVM_SET_DEBUGREGS(r0, 0x4080aea2, &(0x7f00000000c0)={[0xf000, 0xf000, 0x100000, 0x2000], 0x1, 0x40, 0x6}) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000180)) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) 08:04:34 executing program 3: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f00000004c0)='1', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) capset(&(0x7f00000000c0)={0x0, 0xffffffffffffffff}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:34 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000200)={0x30, r5, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x4}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}]}, 0x30}, 0x1, 0x0, 0x0, 0x40040}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r4, &(0x7f0000007bc0)={0x0, 0x0, &(0x7f0000007b80)={&(0x7f0000007a00)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="300328bd7000fcdbdf250100000030010c8024000b8008000900ef30823908001a000e940000080009000300000008000a00373f00003c000b503a000a00801f000008000a"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) sendmsg$NLBL_CIPSOV4_C_REMOVE(r3, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0100002e", @ANYRES16=r5, @ANYBLOB="000125bd7000fbdbdf25020000000400088008000100010000003400048005000300020000000500030007000000050003000600000005000300000000000500030006000000050003000700000008000200020000000c0004800500030002000000"], 0x68}, 0x1, 0x0, 0x0, 0x20040001}, 0x8000001) sendmsg$NLBL_CIPSOV4_C_LISTALL(r1, &(0x7f0000000480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)={0x198, r5, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x30, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x82b3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xfcbeb3f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6cf32eb9}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4eda1d07}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3cc9}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0xc8, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8efe}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1cb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1eb}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xa9ca9c1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x82}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfda0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2b5f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc7a6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7c71fd04}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9e64}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x41bdc2a1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1345}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe272}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4ac213d1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x34ae}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x652f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x54c3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xaa45}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x79fc75a3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1189}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa0d3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3b8aa209}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc29e}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x6}, {0x5}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x54, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x80000000}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4e2deb57}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x76471763}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbbdd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7647b437}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1601}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6a66795a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x52b74447}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x684da20d}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}, {0x5}]}]}, 0x198}, 0x1, 0x0, 0x0, 0x18}, 0x80) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000000)=0x7, 0x4) r6 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r6, 0x0) ioctl$RTC_EPOCH_READ(r6, 0x8008700d, &(0x7f00000004c0)) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r7, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:34 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, 0x1c) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r2, 0x54a0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000000000)={0x1, 0x0, [0x4, 0x3, 0x1000, 0x5, 0xea, 0x8, 0xb44b, 0x9]}) [ 402.440440][T23530] IPVS: ftp: loaded support on port[0] = 21 08:04:34 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x80000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:34 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 08:04:34 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000200)={0x30, r5, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x4}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}]}, 0x30}, 0x1, 0x0, 0x0, 0x40040}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r4, &(0x7f0000007bc0)={0x0, 0x0, &(0x7f0000007b80)={&(0x7f0000007a00)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="300328bd7000fcdbdf250100000030010c8024000b8008000900ef30823908001a000e940000080009000300000008000a00373f00003c000b503a000a00801f000008000a"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) sendmsg$NLBL_CIPSOV4_C_REMOVE(r3, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0100002e", @ANYRES16=r5, @ANYBLOB="000125bd7000fbdbdf25020000000400088008000100010000003400048005000300020000000500030007000000050003000600000005000300000000000500030006000000050003000700000008000200020000000c0004800500030002000000"], 0x68}, 0x1, 0x0, 0x0, 0x20040001}, 0x8000001) sendmsg$NLBL_CIPSOV4_C_LISTALL(r1, &(0x7f0000000480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)={0x198, r5, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x30, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x82b3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xfcbeb3f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6cf32eb9}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4eda1d07}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3cc9}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0xc8, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8efe}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1cb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1eb}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xa9ca9c1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x82}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfda0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2b5f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc7a6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7c71fd04}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9e64}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x41bdc2a1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1345}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe272}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4ac213d1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x34ae}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x652f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x54c3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xaa45}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x79fc75a3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1189}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa0d3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3b8aa209}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc29e}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x6}, {0x5}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x54, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x80000000}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4e2deb57}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x76471763}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbbdd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7647b437}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1601}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6a66795a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x52b74447}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x684da20d}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}, {0x5}]}]}, 0x198}, 0x1, 0x0, 0x0, 0x18}, 0x80) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000000)=0x7, 0x4) r6 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r6, 0x0) ioctl$RTC_EPOCH_READ(r6, 0x8008700d, &(0x7f00000004c0)) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r7, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:34 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xc000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:34 executing program 4: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x27, &(0x7f0000000000)=0x5, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) 08:04:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000280)=0xc) setuid(r1) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x501000, 0x0) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x77a3c) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:34 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000200)={0x30, r5, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x4}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}]}, 0x30}, 0x1, 0x0, 0x0, 0x40040}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r4, &(0x7f0000007bc0)={0x0, 0x0, &(0x7f0000007b80)={&(0x7f0000007a00)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="300328bd7000fcdbdf250100000030010c8024000b8008000900ef30823908001a000e940000080009000300000008000a00373f00003c000b503a000a00801f000008000a"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) sendmsg$NLBL_CIPSOV4_C_REMOVE(r3, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0100002e", @ANYRES16=r5, @ANYBLOB="000125bd7000fbdbdf25020000000400088008000100010000003400048005000300020000000500030007000000050003000600000005000300000000000500030006000000050003000700000008000200020000000c0004800500030002000000"], 0x68}, 0x1, 0x0, 0x0, 0x20040001}, 0x8000001) sendmsg$NLBL_CIPSOV4_C_LISTALL(r1, &(0x7f0000000480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)={0x198, r5, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x30, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x82b3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xfcbeb3f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6cf32eb9}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4eda1d07}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3cc9}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0xc8, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8efe}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1cb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1eb}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xa9ca9c1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x82}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfda0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2b5f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc7a6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7c71fd04}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9e64}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x41bdc2a1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1345}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe272}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4ac213d1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x34ae}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x652f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x54c3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xaa45}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x79fc75a3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1189}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa0d3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3b8aa209}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc29e}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x6}, {0x5}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x54, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x80000000}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4e2deb57}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x76471763}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbbdd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7647b437}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1601}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6a66795a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x52b74447}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x684da20d}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}, {0x5}]}]}, 0x198}, 0x1, 0x0, 0x0, 0x18}, 0x80) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000000)=0x7, 0x4) r6 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r6, 0x0) ioctl$RTC_EPOCH_READ(r6, 0x8008700d, &(0x7f00000004c0)) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 402.746348][ T26] audit: type=1804 audit(1586505874.493:147): pid=23564 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/295/cgroup.controllers" dev="sda1" ino=16382 res=1 08:04:34 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000080)={r3, 0x0, 0x10}, &(0x7f00000000c0)=0x18) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={r3, @in={{0x2, 0x4e22, @empty}}, 0x4, 0x66f0, 0x4, 0xffffffd3, 0x0, 0x100, 0x40}, 0x9c) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) [ 402.973898][T23578] IPVS: ftp: loaded support on port[0] = 21 08:04:34 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcsa\x00', 0x680000, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x30, r2, 0x100, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x24048005}, 0x20000800) 08:04:34 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000200)={0x30, r5, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x4}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}]}, 0x30}, 0x1, 0x0, 0x0, 0x40040}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r4, &(0x7f0000007bc0)={0x0, 0x0, &(0x7f0000007b80)={&(0x7f0000007a00)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="300328bd7000fcdbdf250100000030010c8024000b8008000900ef30823908001a000e940000080009000300000008000a00373f00003c000b503a000a00801f000008000a"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) sendmsg$NLBL_CIPSOV4_C_REMOVE(r3, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0100002e", @ANYRES16=r5, @ANYBLOB="000125bd7000fbdbdf25020000000400088008000100010000003400048005000300020000000500030007000000050003000600000005000300000000000500030006000000050003000700000008000200020000000c0004800500030002000000"], 0x68}, 0x1, 0x0, 0x0, 0x20040001}, 0x8000001) sendmsg$NLBL_CIPSOV4_C_LISTALL(r1, &(0x7f0000000480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)={0x198, r5, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x30, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x82b3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xfcbeb3f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6cf32eb9}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4eda1d07}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3cc9}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0xc8, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8efe}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1cb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1eb}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xa9ca9c1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x82}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfda0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2b5f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc7a6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7c71fd04}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9e64}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x41bdc2a1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1345}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe272}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4ac213d1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x34ae}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x652f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x54c3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xaa45}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x79fc75a3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1189}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa0d3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3b8aa209}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc29e}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x6}, {0x5}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x54, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x80000000}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4e2deb57}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x76471763}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbbdd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7647b437}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1601}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6a66795a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x52b74447}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x684da20d}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}, {0x5}]}]}, 0x198}, 0x1, 0x0, 0x0, 0x18}, 0x80) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000000)=0x7, 0x4) r6 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r6, 0x0) ioctl$RTC_EPOCH_READ(r6, 0x8008700d, &(0x7f00000004c0)) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:34 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000002) 08:04:35 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000180)=""/176, &(0x7f0000000040)=0xb0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x10) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) [ 403.287232][ T26] audit: type=1804 audit(1586505875.033:148): pid=23608 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/296/cgroup.controllers" dev="sda1" ino=16384 res=1 08:04:35 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x1000000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:35 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000200)={0x30, r5, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x4}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}]}, 0x30}, 0x1, 0x0, 0x0, 0x40040}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r4, &(0x7f0000007bc0)={0x0, 0x0, &(0x7f0000007b80)={&(0x7f0000007a00)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="300328bd7000fcdbdf250100000030010c8024000b8008000900ef30823908001a000e940000080009000300000008000a00373f00003c000b503a000a00801f000008000a"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) sendmsg$NLBL_CIPSOV4_C_REMOVE(r3, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0100002e", @ANYRES16=r5, @ANYBLOB="000125bd7000fbdbdf25020000000400088008000100010000003400048005000300020000000500030007000000050003000600000005000300000000000500030006000000050003000700000008000200020000000c0004800500030002000000"], 0x68}, 0x1, 0x0, 0x0, 0x20040001}, 0x8000001) sendmsg$NLBL_CIPSOV4_C_LISTALL(r1, &(0x7f0000000480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)={0x198, r5, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x30, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x82b3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xfcbeb3f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6cf32eb9}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4eda1d07}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3cc9}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0xc8, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8efe}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1cb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1eb}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xa9ca9c1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x82}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfda0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2b5f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc7a6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7c71fd04}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9e64}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x41bdc2a1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1345}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe272}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4ac213d1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x34ae}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x652f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x54c3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xaa45}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x79fc75a3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1189}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa0d3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3b8aa209}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc29e}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x6}, {0x5}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x54, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x80000000}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4e2deb57}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x76471763}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbbdd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7647b437}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1601}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6a66795a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x52b74447}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x684da20d}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}, {0x5}]}]}, 0x198}, 0x1, 0x0, 0x0, 0x18}, 0x80) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000000)=0x7, 0x4) r6 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r6, 0x0) ioctl$RTC_EPOCH_READ(r6, 0x8008700d, &(0x7f00000004c0)) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:35 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000002) 08:04:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000000)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) geteuid() r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r7) setuid(r7) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:35 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) ioctl$USBDEVFS_SETINTERFACE(r3, 0x80085504, &(0x7f0000000040)={0x400, 0x4}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, &(0x7f0000000000)={0x1, 0x71269c17, 0x8, 0x200}) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}, 0x462}, 0x1c) 08:04:35 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xd000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) [ 403.745107][T23634] IPVS: ftp: loaded support on port[0] = 21 08:04:35 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000200)={0x30, r5, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x4}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}]}, 0x30}, 0x1, 0x0, 0x0, 0x40040}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r4, &(0x7f0000007bc0)={0x0, 0x0, &(0x7f0000007b80)={&(0x7f0000007a00)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="300328bd7000fcdbdf250100000030010c8024000b8008000900ef30823908001a000e940000080009000300000008000a00373f00003c000b503a000a00801f000008000a"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) sendmsg$NLBL_CIPSOV4_C_REMOVE(r3, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0100002e", @ANYRES16=r5, @ANYBLOB="000125bd7000fbdbdf25020000000400088008000100010000003400048005000300020000000500030007000000050003000600000005000300000000000500030006000000050003000700000008000200020000000c0004800500030002000000"], 0x68}, 0x1, 0x0, 0x0, 0x20040001}, 0x8000001) sendmsg$NLBL_CIPSOV4_C_LISTALL(r1, &(0x7f0000000480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)={0x198, r5, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x30, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x82b3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xfcbeb3f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6cf32eb9}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4eda1d07}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3cc9}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0xc8, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8efe}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1cb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1eb}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xa9ca9c1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x82}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfda0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2b5f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc7a6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7c71fd04}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9e64}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x41bdc2a1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1345}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe272}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4ac213d1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x34ae}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x652f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x54c3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xaa45}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x79fc75a3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1189}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa0d3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3b8aa209}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc29e}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x6}, {0x5}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x54, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x80000000}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4e2deb57}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x76471763}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbbdd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7647b437}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1601}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6a66795a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x52b74447}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x684da20d}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}, {0x5}]}]}, 0x198}, 0x1, 0x0, 0x0, 0x18}, 0x80) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000000)=0x7, 0x4) r6 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r6, 0x0) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r7, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 403.775923][ T26] audit: type=1804 audit(1586505875.523:149): pid=23635 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/297/cgroup.controllers" dev="sda1" ino=16355 res=1 08:04:35 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000002) 08:04:35 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x7, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) ioctl$MON_IOCG_STATS(r2, 0x80089203, &(0x7f0000000000)) 08:04:35 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000200)={0x30, r5, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x4}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}]}, 0x30}, 0x1, 0x0, 0x0, 0x40040}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r4, &(0x7f0000007bc0)={0x0, 0x0, &(0x7f0000007b80)={&(0x7f0000007a00)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="300328bd7000fcdbdf250100000030010c8024000b8008000900ef30823908001a000e940000080009000300000008000a00373f00003c000b503a000a00801f000008000a"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) sendmsg$NLBL_CIPSOV4_C_REMOVE(r3, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0100002e", @ANYRES16=r5, @ANYBLOB="000125bd7000fbdbdf25020000000400088008000100010000003400048005000300020000000500030007000000050003000600000005000300000000000500030006000000050003000700000008000200020000000c0004800500030002000000"], 0x68}, 0x1, 0x0, 0x0, 0x20040001}, 0x8000001) sendmsg$NLBL_CIPSOV4_C_LISTALL(r1, &(0x7f0000000480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)={0x198, r5, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x30, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x82b3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xfcbeb3f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6cf32eb9}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4eda1d07}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3cc9}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0xc8, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8efe}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1cb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1eb}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xa9ca9c1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x82}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfda0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2b5f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc7a6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7c71fd04}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9e64}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x41bdc2a1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1345}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe272}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4ac213d1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x34ae}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x652f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x54c3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xaa45}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x79fc75a3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1189}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa0d3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3b8aa209}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc29e}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x6}, {0x5}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x54, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x80000000}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4e2deb57}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x76471763}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbbdd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7647b437}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1601}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6a66795a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x52b74447}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x684da20d}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}, {0x5}]}]}, 0x198}, 0x1, 0x0, 0x0, 0x18}, 0x80) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000000)=0x7, 0x4) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r6, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:35 executing program 4: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x58, r1, 0x4, 0x9, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x44, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x100}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xd5}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}]}]}, 0x58}, 0x1, 0x0, 0x0, 0xc005}, 0x4040) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) [ 404.275292][T23681] IPVS: ftp: loaded support on port[0] = 21 08:04:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 08:04:36 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2000000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:36 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000200)={0x30, r5, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x4}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}]}, 0x30}, 0x1, 0x0, 0x0, 0x40040}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r4, &(0x7f0000007bc0)={0x0, 0x0, &(0x7f0000007b80)={&(0x7f0000007a00)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="300328bd7000fcdbdf250100000030010c8024000b8008000900ef30823908001a000e940000080009000300000008000a00373f00003c000b503a000a00801f000008000a"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) sendmsg$NLBL_CIPSOV4_C_REMOVE(r3, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0100002e", @ANYRES16=r5, @ANYBLOB="000125bd7000fbdbdf25020000000400088008000100010000003400048005000300020000000500030007000000050003000600000005000300000000000500030006000000050003000700000008000200020000000c0004800500030002000000"], 0x68}, 0x1, 0x0, 0x0, 0x20040001}, 0x8000001) sendmsg$NLBL_CIPSOV4_C_LISTALL(r1, &(0x7f0000000480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)={0x198, r5, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x30, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x82b3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xfcbeb3f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6cf32eb9}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4eda1d07}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3cc9}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0xc8, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8efe}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1cb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1eb}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xa9ca9c1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x82}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfda0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2b5f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc7a6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7c71fd04}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9e64}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x41bdc2a1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1345}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe272}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4ac213d1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x34ae}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x652f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x54c3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xaa45}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x79fc75a3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1189}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa0d3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3b8aa209}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc29e}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x6}, {0x5}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x54, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x80000000}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4e2deb57}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x76471763}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbbdd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7647b437}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1601}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6a66795a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x52b74447}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x684da20d}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}, {0x5}]}]}, 0x198}, 0x1, 0x0, 0x0, 0x18}, 0x80) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000000)=0x7, 0x4) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r6, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:36 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = accept$ax25(r1, &(0x7f0000000000)={{0x3, @rose}, [@bcast, @null, @netrom, @remote, @rose, @bcast, @remote, @rose]}, &(0x7f00000000c0)=0x48) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) [ 404.774236][ T320] tipc: TX() has been purged, node left! 08:04:36 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xe000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 08:04:36 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000200)={0x30, r5, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x4}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}]}, 0x30}, 0x1, 0x0, 0x0, 0x40040}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r4, &(0x7f0000007bc0)={0x0, 0x0, &(0x7f0000007b80)={&(0x7f0000007a00)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="300328bd7000fcdbdf250100000030010c8024000b8008000900ef30823908001a000e940000080009000300000008000a00373f00003c000b503a000a00801f000008000a"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) sendmsg$NLBL_CIPSOV4_C_REMOVE(r3, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0100002e", @ANYRES16=r5, @ANYBLOB="000125bd7000fbdbdf25020000000400088008000100010000003400048005000300020000000500030007000000050003000600000005000300000000000500030006000000050003000700000008000200020000000c0004800500030002000000"], 0x68}, 0x1, 0x0, 0x0, 0x20040001}, 0x8000001) sendmsg$NLBL_CIPSOV4_C_LISTALL(r1, &(0x7f0000000480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)={0x198, r5, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x30, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x82b3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xfcbeb3f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6cf32eb9}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4eda1d07}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3cc9}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0xc8, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8efe}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1cb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1eb}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xa9ca9c1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x82}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfda0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2b5f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc7a6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7c71fd04}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9e64}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x41bdc2a1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1345}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe272}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4ac213d1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x34ae}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x652f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x54c3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xaa45}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x79fc75a3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1189}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa0d3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3b8aa209}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc29e}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x6}, {0x5}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x54, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x80000000}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4e2deb57}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x76471763}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbbdd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7647b437}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1601}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6a66795a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x52b74447}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x684da20d}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}, {0x5}]}]}, 0x198}, 0x1, 0x0, 0x0, 0x18}, 0x80) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r6, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) setuid(r4) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 404.937817][ T320] tipc: TX() has been purged, node left! 08:04:36 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x800007, 0x4) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) write$smackfs_cipsonum(r1, &(0x7f0000000040)=0x7, 0x14) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) 08:04:36 executing program 5: open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000200)={0x30, r4, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x4}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}]}, 0x30}, 0x1, 0x0, 0x0, 0x40040}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r3, &(0x7f0000007bc0)={0x0, 0x0, &(0x7f0000007b80)={&(0x7f0000007a00)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="300328bd7000fcdbdf250100000030010c8024000b8008000900ef30823908001a000e940000080009000300000008000a00373f00003c000b503a000a00801f000008000a"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) sendmsg$NLBL_CIPSOV4_C_REMOVE(r2, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0100002e", @ANYRES16=r4, @ANYBLOB="000125bd7000fbdbdf25020000000400088008000100010000003400048005000300020000000500030007000000050003000600000005000300000000000500030006000000050003000700000008000200020000000c0004800500030002000000"], 0x68}, 0x1, 0x0, 0x0, 0x20040001}, 0x8000001) sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f0000000480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)={0x198, r4, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x30, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x82b3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xfcbeb3f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6cf32eb9}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4eda1d07}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3cc9}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0xc8, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8efe}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1cb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1eb}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xa9ca9c1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x82}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfda0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2b5f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc7a6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7c71fd04}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9e64}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x41bdc2a1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1345}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe272}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4ac213d1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x34ae}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x652f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x54c3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xaa45}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x79fc75a3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1189}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa0d3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3b8aa209}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc29e}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x6}, {0x5}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x54, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x80000000}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4e2deb57}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x76471763}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbbdd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7647b437}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1601}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6a66795a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x52b74447}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x684da20d}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}, {0x5}]}]}, 0x198}, 0x1, 0x0, 0x0, 0x18}, 0x80) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r5, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 405.056733][ T26] audit: type=1804 audit(1586505876.803:150): pid=23734 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/300/cgroup.controllers" dev="sda1" ino=16382 res=1 [ 405.065461][T23737] IPVS: ftp: loaded support on port[0] = 21 [ 405.087845][ T320] tipc: TX() has been purged, node left! 08:04:37 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) ioctl$FBIOBLANK(r1, 0x4611, 0x1) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="2b0e0000000000003f6192eccc3d60fa49bb3787a360e9e52e243cb0e8afde5c557185d0f0c6ded9c73844601db2b64afb328bc6f7b9f363e6eed300be1572de5bad71d818a17343cf6a0387137830ddacf2552a6558155443bd6b0fcbdbc6482d1407c0d7661d0995bfe298566f6605020003c2040000800104010804013f05"], 0x80) [ 405.257890][ T320] tipc: TX() has been purged, node left! [ 405.285234][ T320] tipc: TX() has been purged, node left! 08:04:37 executing program 5: open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000200)={0x30, r4, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x4}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}]}, 0x30}, 0x1, 0x0, 0x0, 0x40040}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r3, &(0x7f0000007bc0)={0x0, 0x0, &(0x7f0000007b80)={&(0x7f0000007a00)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="300328bd7000fcdbdf250100000030010c8024000b8008000900ef30823908001a000e940000080009000300000008000a00373f00003c000b503a000a00801f000008000a"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) sendmsg$NLBL_CIPSOV4_C_REMOVE(r2, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0100002e", @ANYRES16=r4, @ANYBLOB="000125bd7000fbdbdf25020000000400088008000100010000003400048005000300020000000500030007000000050003000600000005000300000000000500030006000000050003000700000008000200020000000c0004800500030002000000"], 0x68}, 0x1, 0x0, 0x0, 0x20040001}, 0x8000001) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r5, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 405.309561][ T320] tipc: TX() has been purged, node left! [ 405.361689][ T320] tipc: TX() has been purged, node left! [ 405.371526][ T320] tipc: TX() has been purged, node left! 08:04:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 405.403214][ T320] tipc: TX() has been purged, node left! [ 405.518044][ T320] tipc: TX() has been purged, node left! [ 405.658061][ T320] tipc: TX() has been purged, node left! [ 405.678387][ T26] audit: type=1804 audit(1586505877.433:151): pid=23775 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/301/cgroup.controllers" dev="sda1" ino=16357 res=1 08:04:37 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x3000000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:37 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000600)=0xe8) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000680)={0x0, @l2={0x1f, 0x6, @none, 0x2}, @xdp={0x2c, 0x1, r1, 0x2a}, @generic={0x1d, "600e9e1d434132111522614ea465"}, 0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)='team0\x00', 0x1, 0x4, 0x4}) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) 08:04:37 executing program 5: open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000200)={0x30, r4, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x4}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}]}, 0x30}, 0x1, 0x0, 0x0, 0x40040}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r3, &(0x7f0000007bc0)={0x0, 0x0, &(0x7f0000007b80)={&(0x7f0000007a00)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="300328bd7000fcdbdf250100000030010c8024000b8008000900ef30823908001a000e940000080009000300000008000a00373f00003c000b503a000a00801f000008000a"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r5, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 405.819310][ T320] tipc: TX() has been purged, node left! 08:04:37 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x10000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000140)={{{@in=@multicast1, @in6=@empty, 0x4e23, 0x8, 0x4e20, 0x0, 0xa, 0x21784a712d2bf48e, 0x0, 0x3b, 0x0, r4}, {0x8, 0x1f, 0x3, 0x100000001, 0xd0, 0x0, 0x507, 0x4}, {0xffffffff, 0x2, 0x1, 0x7}, 0x7, 0x6e6bb5, 0x1, 0x1, 0x3, 0x3}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d5, 0x2b}, 0xa, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3502, 0x2, 0x3, 0x7, 0x2, 0x7fff, 0x6}}, 0xe8) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r2, 0x408c5333, &(0x7f0000000000)={0x1, 0x8, 0x0, 'queue1\x00', 0x9}) 08:04:37 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x24, 0x0, 0x4, 0x70bd2a, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x6094}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0x4000001) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) 08:04:37 executing program 5: open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000200)) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000200)={0x30, r3, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x4}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}]}, 0x30}, 0x1, 0x0, 0x0, 0x40040}, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 405.988115][ T320] tipc: TX() has been purged, node left! 08:04:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000002) [ 406.042866][T23795] IPVS: ftp: loaded support on port[0] = 21 08:04:37 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x9, 0x0, @remote}, 0x1c) 08:04:37 executing program 5: open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 406.158226][ T320] tipc: TX() has been purged, node left! [ 406.171015][ T320] tipc: TX() has been purged, node left! [ 406.197034][ T320] tipc: TX() has been purged, node left! [ 406.249925][ T320] tipc: TX() has been purged, node left! 08:04:38 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000002) 08:04:38 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, r2, 0x1, 0x70bd27, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x9}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x800c881) [ 406.333754][T23799] IPVS: ftp: loaded support on port[0] = 21 [ 406.430509][ T320] tipc: TX() has been purged, node left! [ 406.436876][ T320] tipc: TX() has been purged, node left! [ 406.484196][ T320] tipc: TX() has been purged, node left! [ 406.516065][ T320] tipc: TX() has been purged, node left! 08:04:38 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4000000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:38 executing program 5: open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000200)) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:38 executing program 4: r0 = socket$inet6(0xa, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) [ 406.738033][ T320] tipc: TX() has been purged, node left! [ 406.907942][ T320] tipc: TX() has been purged, node left! 08:04:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000280)=0xfffffffffffffe54) setuid(r1) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:38 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000002) 08:04:38 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x11000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:38 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}, 0xffffffff}, 0x1c) getpeername$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000040)=0x1c) 08:04:38 executing program 5: open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:38 executing program 5: open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 407.057839][ T320] tipc: TX() has been purged, node left! [ 407.084020][T23886] IPVS: ftp: loaded support on port[0] = 21 08:04:38 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 08:04:39 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="75606dc237fc570d78a2ccabac467b66f800"/34, @ANYRES16=r2, @ANYBLOB="d57fc8d3b5a78ca942f112"], 0x3}}, 0x0) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f00000002c0)) sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)={0xb0, r2, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x9c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x14000}, 0x2) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) [ 407.208230][ T320] tipc: TX() has been purged, node left! [ 407.214345][ T320] tipc: TX() has been purged, node left! [ 407.242722][ T320] tipc: TX() has been purged, node left! [ 407.308208][ T320] tipc: TX() has been purged, node left! 08:04:39 executing program 5: open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 407.428092][ T320] tipc: TX() has been purged, node left! [ 407.567975][ T320] tipc: TX() has been purged, node left! 08:04:39 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x5000000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x200102, 0x0) setuid(r1) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:39 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000180)=""/204) 08:04:39 executing program 5: open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 407.717901][ T320] tipc: TX() has been purged, node left! [ 407.813997][T23934] IPVS: ftp: loaded support on port[0] = 21 08:04:39 executing program 5: open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:39 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000040), 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r1}) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000009, 0x11, r3, 0x2edeb000) r4 = dup3(r3, r2, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) [ 407.867922][ T320] tipc: TX() has been purged, node left! [ 407.988520][ T320] tipc: TX() has been purged, node left! [ 408.007152][ T320] tipc: TX() has been purged, node left! 08:04:39 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x12000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) [ 408.040892][ T320] tipc: TX() has been purged, node left! 08:04:39 executing program 5: open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 408.109206][ T320] tipc: TX() has been purged, node left! [ 408.138522][ T26] audit: type=1800 audit(1586505879.893:152): pid=23923 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="cgroup.controllers" dev="sda1" ino=16368 res=0 08:04:39 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'netpci0\x00', &(0x7f0000000180)=@ethtool_flash={0x33, 0x81, './file0\x00'}}) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) 08:04:39 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 408.166968][T23969] IPVS: ftp: loaded support on port[0] = 21 [ 408.258284][ T320] tipc: TX() has been purged, node left! [ 408.264811][ T320] tipc: TX() has been purged, node left! [ 408.286844][ T320] tipc: TX() has been purged, node left! [ 408.312630][ T320] tipc: TX() has been purged, node left! [ 408.332787][ T320] tipc: TX() has been purged, node left! 08:04:40 executing program 5: open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 408.380604][ T320] tipc: TX() has been purged, node left! [ 408.407645][ T320] tipc: TX() has been purged, node left! [ 408.431561][ T320] tipc: TX() has been purged, node left! 08:04:40 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x400000) ioctl$VIDIOC_SUBDEV_S_FMT(r2, 0xc0585605, &(0x7f00000000c0)={0x1, 0x0, {0x101, 0x6, 0x300c, 0x8, 0xa, 0xe, 0x1}}) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000000), 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) [ 408.544115][ T26] audit: type=1804 audit(1586505880.293:153): pid=24005 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/306/cgroup.controllers" dev="sda1" ino=16361 res=1 [ 408.628827][ T320] tipc: TX() has been purged, node left! 08:04:40 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x6000000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000080)='./bus\x00', 0x80000, 0x0) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x1010, r0, 0x5fc39000) r2 = dup3(r1, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) read$FUSE(r3, &(0x7f00000006c0), 0x1000) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f0000000000)={0x1e4, 0xc, &(0x7f00000002c0)}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:40 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 08:04:40 executing program 5: open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:40 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}, 0x4800}, 0x1c) 08:04:40 executing program 5: open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 408.838812][ T320] tipc: TX() has been purged, node left! [ 408.859171][T24022] IPVS: ftp: loaded support on port[0] = 21 [ 408.955921][ T320] tipc: TX() has been purged, node left! [ 408.963367][ T320] tipc: TX() has been purged, node left! [ 409.054719][ T320] tipc: TX() has been purged, node left! [ 409.062176][ T320] tipc: TX() has been purged, node left! 08:04:40 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x20000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000280)=0xc) setuid(r1) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:40 executing program 5: open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 409.098660][ T320] tipc: TX() has been purged, node left! [ 409.126889][ T320] tipc: TX() has been purged, node left! [ 409.175600][T24054] IPVS: ftp: loaded support on port[0] = 21 [ 409.238062][ T320] tipc: TX() has been purged, node left! [ 409.244557][ T320] tipc: TX() has been purged, node left! 08:04:41 executing program 5: open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 409.289610][ T320] tipc: TX() has been purged, node left! [ 409.303195][T24060] IPVS: ftp: loaded support on port[0] = 21 [ 409.341302][ T320] tipc: TX() has been purged, node left! [ 409.396467][ T320] tipc: TX() has been purged, node left! [ 409.416977][ T320] tipc: TX() has been purged, node left! [ 409.442675][ T320] tipc: TX() has been purged, node left! [ 409.466325][ T320] tipc: TX() has been purged, node left! [ 409.489745][ T320] tipc: TX() has been purged, node left! 08:04:41 executing program 5: open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 409.512594][ T320] tipc: TX() has been purged, node left! [ 409.552416][ T320] tipc: TX() has been purged, node left! [ 409.563881][ T320] tipc: TX() has been purged, node left! [ 409.598069][ T26] audit: type=1800 audit(1586505881.343:154): pid=24026 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="cgroup.controllers" dev="sda1" ino=16382 res=0 08:04:41 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 409.635833][ T320] tipc: TX() has been purged, node left! 08:04:41 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x7000000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) [ 409.749664][ T320] tipc: TX() has been purged, node left! [ 409.908060][ T320] tipc: TX() has been purged, node left! [ 410.068553][ T320] tipc: TX() has been purged, node left! [ 410.224779][ T320] tipc: TX() has been purged, node left! [ 410.281504][ T320] tipc: TX() has been purged, node left! [ 410.428361][ T320] tipc: TX() has been purged, node left! [ 410.511922][ T320] tipc: TX() has been purged, node left! [ 410.757882][ T320] tipc: TX() has been purged, node left! [ 410.937846][ T320] tipc: TX() has been purged, node left! [ 411.067998][ T320] tipc: TX() has been purged, node left! [ 411.227848][ T320] tipc: TX() has been purged, node left! [ 411.387858][ T320] tipc: TX() has been purged, node left! [ 411.567851][ T320] tipc: TX() has been purged, node left! [ 411.717931][ T320] tipc: TX() has been purged, node left! [ 411.897994][ T320] tipc: TX() has been purged, node left! [ 412.097894][ T320] tipc: TX() has been purged, node left! 08:04:43 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @empty=0xffff80fe}}, 0x1c) 08:04:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 08:04:43 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x20100000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:43 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x8000000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = pidfd_getfd(r1, r0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="01000000000000000000010000000000000007410000004c00180000000065000000000000000000000000000000000000000000000000000000000900"/98], 0x68}}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r4, 0x200, 0x70bd2b, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040015}, 0x10) r5 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0x50, r6, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x38, 0x2, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}]}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x24040890}, 0x40000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r5, 0x0) ioctl$TUNDETACHFILTER(r5, 0x401054d6, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000280)=0xc) setuid(r7) socket$can_j1939(0x1d, 0x2, 0x7) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:44 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:04:44 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:44 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 412.289188][ T320] tipc: TX() has been purged, node left! [ 412.397181][T24143] IPVS: ftp: loaded support on port[0] = 21 08:04:44 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 412.446673][ T26] audit: type=1804 audit(1586505884.193:155): pid=24146 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/823/cgroup.controllers" dev="sda1" ino=15985 res=1 [ 412.478801][ T320] tipc: TX() has been purged, node left! 08:04:44 executing program 2: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x100000002) [ 412.538881][ T320] tipc: TX() has been purged, node left! [ 412.550279][ T320] tipc: TX() has been purged, node left! [ 412.594010][ T320] tipc: TX() has been purged, node left! 08:04:44 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 412.637466][ T320] tipc: TX() has been purged, node left! 08:04:44 executing program 2: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x100000002) [ 412.691928][ T320] tipc: TX() has been purged, node left! [ 412.725390][ T320] tipc: TX() has been purged, node left! 08:04:44 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:04:44 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 412.832752][T24181] IPVS: ftp: loaded support on port[0] = 21 [ 412.908536][ T320] tipc: TX() has been purged, node left! [ 412.914871][ T320] tipc: TX() has been purged, node left! [ 412.954266][ T320] tipc: TX() has been purged, node left! [ 412.983910][ T26] audit: type=1804 audit(1586505884.733:156): pid=24186 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/824/cgroup.controllers" dev="sda1" ino=15905 res=1 [ 413.009115][ T320] tipc: TX() has been purged, node left! [ 413.015249][ T320] tipc: TX() has been purged, node left! [ 413.015774][ T320] tipc: TX() has been purged, node left! [ 413.016081][ T320] tipc: TX() has been purged, node left! 08:04:44 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:44 executing program 2: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x100000002) [ 413.016377][ T320] tipc: TX() has been purged, node left! [ 413.017524][ T320] tipc: TX() has been purged, node left! 08:04:45 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:45 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x9000000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) write$uinput_user_dev(r1, &(0x7f00000002c0)={'syz0\x00', {0x7fff, 0xf74, 0x9a, 0x50}, 0x55, [0x8, 0xbc56, 0x2f6, 0x13be, 0x588, 0x1ff, 0x1, 0x33c, 0x400, 0x8, 0x8001, 0x9, 0x10001, 0x4, 0xe052, 0x6d, 0x20, 0x9, 0x7, 0x3, 0x65da, 0x2, 0x8, 0x9, 0x381, 0x1, 0x101, 0x6, 0x5, 0x9, 0x7ff, 0x95dd, 0x3, 0x1000, 0x6, 0x7, 0x2c83ac7e, 0x358b, 0x10001, 0x7, 0xfff, 0x1, 0x9, 0x4, 0x2, 0x5, 0x6, 0x2b, 0x0, 0x7, 0x81, 0x66, 0x80000001, 0xd44, 0x1e, 0x7fffffff, 0x10001, 0x6, 0x1ff, 0x3, 0x1ff, 0x10000, 0x7978bab1, 0x5], [0x1000, 0x0, 0x0, 0x9, 0xffffffff, 0xfff, 0xffff, 0xeb0, 0x10000, 0x9, 0x80000001, 0x9, 0x1, 0x0, 0x8, 0x6, 0x1465, 0xfffffffe, 0x400, 0xffffffff, 0x1, 0x6, 0x5, 0x7, 0x10000, 0x1, 0x80, 0x5, 0x1ff, 0x3, 0x8, 0x4, 0x8, 0x80000000, 0x20, 0x80000001, 0x0, 0x80, 0x84, 0xff, 0x1b3d, 0x3, 0x0, 0x4, 0x1ff, 0x9, 0x80dd, 0x6, 0x5, 0x5, 0x6, 0x80, 0x8001, 0x8, 0x0, 0x7, 0x0, 0x7a, 0x4494, 0x1, 0x8, 0x5, 0x20, 0x4], [0xfffffeff, 0x800, 0x6, 0x2, 0x9, 0x200, 0x9, 0x1, 0x3f, 0xffff, 0x8, 0xffff, 0xf85c, 0x6d, 0xffff, 0x1, 0x4, 0x7ff, 0xfff, 0x2, 0x97fb, 0x5, 0x1, 0x6, 0xfff, 0x8, 0x1, 0x1, 0x3, 0x9, 0x8, 0xffff, 0x25d, 0x8000, 0xfffffffe, 0x4, 0x1, 0xff, 0x3ff, 0x1, 0x3, 0x1, 0xffffffef, 0x5, 0xffffffff, 0x2, 0x2, 0x6, 0x8001, 0xfffff000, 0xfffffff8, 0xcd, 0x0, 0x8, 0xfffffffe, 0xe03, 0x2, 0x40002, 0x7, 0x0, 0x2, 0x6, 0x89f5, 0x6], [0x6, 0x5, 0x0, 0x5, 0x1000, 0x9, 0x9, 0xff, 0xaf, 0x7c, 0x5, 0x4, 0x9, 0x36, 0x6, 0x3ff, 0x10000, 0x3, 0x6, 0xb4c5, 0xffff, 0x7, 0x7, 0x0, 0x3, 0xffffffff, 0x80, 0x19d, 0x80000000, 0x7fffffff, 0x3, 0x4, 0x8, 0x0, 0xdf7, 0x1, 0x2, 0x3698, 0x689, 0xff, 0x67, 0x6, 0xffff0a87, 0x1, 0x5, 0x54, 0x1, 0x1, 0x6, 0x2, 0x7f, 0x40, 0x5, 0xfffffff8, 0x7, 0x9, 0xb75, 0x7521, 0xfffffe01, 0xbe38, 0x10000, 0x7, 0xfffffff7, 0x4]}, 0x45c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:45 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 08:04:45 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 413.341076][T24226] IPVS: ftp: loaded support on port[0] = 21 08:04:45 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:04:45 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:45 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 413.566697][ T26] audit: type=1804 audit(1586505885.313:157): pid=24238 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/825/cgroup.controllers" dev="sda1" ino=15762 res=1 08:04:45 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 08:04:45 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 413.692572][T24262] IPVS: ftp: loaded support on port[0] = 21 08:04:46 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:46 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 08:04:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f00000002c0)={"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"}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) setuid(r1) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4001c10c2, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) accept4$ax25(r1, &(0x7f00000005c0)={{0x3, @netrom}, [@null, @rose, @rose, @remote, @bcast, @rose, @default, @bcast]}, &(0x7f0000000300)=0x48, 0x800) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x12bb00, 0x0) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@ipv4={[], [], @remote}, @in=@dev}}, {{@in6=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000380)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ocfs2_control\x00', 0x40082, 0x0) r7 = open(&(0x7f0000000340)='./bus\x00', 0x4003e9402, 0xf6f091560f73fc32) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r7, 0x0) getsockopt$inet_tcp_buf(r7, 0x6, 0x1f, &(0x7f0000000180)=""/151, &(0x7f00000000c0)=0x97) sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="6870d475bea737a73f873e39cec95e8d00002fa08ba5eac3238458003f585bf78a9a174641d4fc9b8647c198b7de4ef3d7a940acef25db1323301ebc74ccf3169abb65e83017150ee5f69a4fa9a91747ef49bb609e06", @ANYRES16=0x0, @ANYBLOB="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"], 0x68}}, 0x0) sendmsg$TIPC_CMD_SET_NETID(r3, &(0x7f0000000440)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x24, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {{}, {}, {0x8, 0x2, 0x9}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x84) ioctl$UI_SET_KEYBIT(r6, 0x40045565, 0xb) 08:04:46 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xa000000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) [ 414.330555][T24302] IPVS: ftp: loaded support on port[0] = 21 [ 414.347893][T24305] IPVS: ftp: loaded support on port[0] = 21 08:04:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:46 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 08:04:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:46 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 414.634919][T24310] IPVS: ftp: loaded support on port[0] = 21 08:04:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$netlink(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000002) [ 414.968488][ T26] audit: type=1804 audit(1586505886.723:158): pid=24382 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/827/cgroup.controllers" dev="sda1" ino=16275 res=1 08:04:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:47 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 08:04:47 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x40000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$netlink(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 08:04:47 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) connect(r1, &(0x7f0000000080)=@un=@abs={0xa}, 0x2) recvmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000000100)=@ax25={{0x3, @null}, [@default, @netrom, @remote, @netrom, @remote, @remote, @bcast, @null]}, 0x80, &(0x7f0000001780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/26, 0x1a}, {&(0x7f00000002c0)=""/90, 0x5a}, {&(0x7f0000000340)=""/111, 0x6f}, {&(0x7f00000003c0)=""/139, 0x8b}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/139, 0x8b}, {&(0x7f0000001540)=""/207, 0xcf}, {&(0x7f0000001640)=""/162, 0xa2}, {&(0x7f0000001700)=""/68, 0x44}], 0xa, &(0x7f0000001840)=""/225, 0xe1}, 0x40002000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r2 = accept4$llc(r0, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000040)=0x10, 0x800) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) setuid(r3) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:47 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xb000000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:47 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 415.379542][T24405] IPVS: ftp: loaded support on port[0] = 21 [ 415.406330][ T26] audit: type=1804 audit(1586505887.153:159): pid=24403 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/828/cgroup.controllers" dev="sda1" ino=16361 res=1 08:04:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:47 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 08:04:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x6d, 0x2000) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, r3, 0x536ae464467e3e0b, 0x0, 0x0, {0xb}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8}}]}, 0x3c}}, 0x0) sendmsg$DEVLINK_CMD_GET(r2, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000400)={&(0x7f0000000300)={0xdc, r3, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}]}, 0xdc}, 0x1, 0x0, 0x0, 0x8000}, 0x880) getgid() clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x81, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080), 0x0, 0x800000000000007}], 0x40, &(0x7f0000000180)={[{@inline_xattr='inline_xattr'}], [{@dont_appraise='dont_appraise'}, {@subj_user={'subj_user', 0x3d, 'vbo\x98net0\xc7\x9cB\xdaR\x9e\x947\xff\f'}}, {@permit_directio='permit_directio'}, {@smackfsroot={'smackfsroot', 0x3d, 'vboxnet0'}}]}) 08:04:47 executing program 4 (fault-call:8 fault-nth:0): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:04:47 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 415.872791][T24447] IPVS: ftp: loaded support on port[0] = 21 [ 415.923952][T24450] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 415.985694][T24450] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 416.046919][ T26] audit: type=1804 audit(1586505887.793:160): pid=24459 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/829/cgroup.controllers" dev="sda1" ino=16371 res=1 [ 416.071473][T24450] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 416.084710][T24454] FAULT_INJECTION: forcing a failure. [ 416.084710][T24454] name failslab, interval 1, probability 0, space 0, times 0 [ 416.091374][T24450] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock [ 416.166592][T24450] IPVS: ftp: loaded support on port[0] = 21 [ 416.205561][T24454] CPU: 1 PID: 24454 Comm: syz-executor.4 Not tainted 5.6.0-syzkaller #0 [ 416.213933][T24454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 416.223995][T24454] Call Trace: [ 416.227416][T24454] dump_stack+0x1e9/0x30e [ 416.231783][T24454] should_fail+0x433/0x5b0 [ 416.236267][T24454] ? alloc_pipe_info+0xe4/0x470 [ 416.241168][T24454] should_failslab+0x5/0x20 [ 416.245678][T24454] kmem_cache_alloc_trace+0x57/0x300 [ 416.250968][T24454] alloc_pipe_info+0xe4/0x470 [ 416.255654][T24454] splice_direct_to_actor+0x95b/0xb40 [ 416.261037][T24454] ? rcu_lock_release+0x9/0x20 [ 416.265804][T24454] ? do_splice_direct+0x340/0x340 [ 416.270837][T24454] ? fsnotify_perm+0x64/0x390 [ 416.275525][T24454] do_splice_direct+0x201/0x340 [ 416.280384][T24454] ? security_file_permission+0x60/0xc0 [ 416.285936][T24454] do_sendfile+0x809/0xfe0 [ 416.290374][T24454] __x64_sys_sendfile64+0x164/0x1a0 [ 416.295570][T24454] ? do_syscall_64+0x19/0x1b0 [ 416.300250][T24454] do_syscall_64+0xf3/0x1b0 [ 416.304763][T24454] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 416.310663][T24454] RIP: 0033:0x45c889 [ 416.314561][T24454] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 416.334171][T24454] RSP: 002b:00007f39b7449c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 416.342585][T24454] RAX: ffffffffffffffda RBX: 00007f39b744a6d4 RCX: 000000000045c889 [ 416.350554][T24454] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 416.358528][T24454] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 416.366499][T24454] R10: 0000000100000002 R11: 0000000000000246 R12: 0000000000000007 [ 416.374479][T24454] R13: 00000000000008d4 R14: 00000000004cb7c6 R15: 0000000000000000 08:04:48 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x48000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:48 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 08:04:48 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xc000000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:48 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400345042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = accept4$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14, 0x80800) syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x3, 0x2a800) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x82100, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000180)=0x4b) setuid(r3) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 416.592134][T24515] IPVS: ftp: loaded support on port[0] = 21 08:04:48 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 08:04:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:48 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 416.909426][T24549] IPVS: ftp: loaded support on port[0] = 21 08:04:48 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:04:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 417.400332][ T26] audit: type=1804 audit(1586505889.153:161): pid=24573 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/830/cgroup.controllers" dev="sda1" ino=16361 res=1 [ 417.825983][ T26] audit: type=1800 audit(1586505889.573:162): pid=24566 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="cgroup.controllers" dev="sda1" ino=15778 res=0 08:04:49 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4c000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:49 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xd000000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:49 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 08:04:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, 0x0, 0x0) [ 418.922029][ T26] audit: type=1804 audit(1586505890.673:163): pid=24599 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/327/cgroup.controllers" dev="sda1" ino=16368 res=1 08:04:52 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, 0x0, 0x0) 08:04:52 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x7ffff000) 08:04:52 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xe000000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:52 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x5c000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:52 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 08:04:52 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) chdir(&(0x7f0000000200)='./bus\x00') mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000002c0)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000300)=0x20) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000340)={r3, @in6={{0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x81}}, 0xff, 0x101, 0x400, 0x9, 0x6}, &(0x7f0000000400)=0x98) setuid(r1) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:52 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, 0x0, 0x0) [ 420.436014][ T26] audit: type=1804 audit(1586505892.183:164): pid=24628 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/831/cgroup.controllers" dev="sda1" ino=16359 res=1 [ 420.457766][T24630] IPVS: ftp: loaded support on port[0] = 21 08:04:52 executing program 5 (fault-call:4 fault-nth:0): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:52 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000003) [ 420.792585][T24663] FAULT_INJECTION: forcing a failure. [ 420.792585][T24663] name failslab, interval 1, probability 0, space 0, times 0 [ 420.863958][T24663] CPU: 1 PID: 24663 Comm: syz-executor.5 Not tainted 5.6.0-syzkaller #0 [ 420.872353][T24663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 420.882413][T24663] Call Trace: [ 420.886582][T24663] dump_stack+0x1e9/0x30e [ 420.890927][T24663] should_fail+0x433/0x5b0 [ 420.895364][T24663] ? sock_kmalloc+0x98/0x100 [ 420.899973][T24663] should_failslab+0x5/0x20 [ 420.904487][T24663] __kmalloc+0x74/0x330 [ 420.908653][T24663] sock_kmalloc+0x98/0x100 [ 420.913081][T24663] __ipv6_sock_mc_join+0x501/0x840 [ 420.918206][T24663] do_ipv6_setsockopt+0x26d1/0x3920 [ 420.923447][T24663] ? __fget_files+0x4b9/0x4e0 [ 420.928137][T24663] ipv6_setsockopt+0x49/0x160 [ 420.932816][T24663] ? sock_common_recvmsg+0x190/0x190 [ 420.938102][T24663] __sys_setsockopt+0x564/0x710 [ 420.942986][T24663] __x64_sys_setsockopt+0xb1/0xc0 [ 420.948025][T24663] do_syscall_64+0xf3/0x1b0 [ 420.952533][T24663] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 420.958424][T24663] RIP: 0033:0x45c889 [ 420.962323][T24663] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 420.981936][T24663] RSP: 002b:00007fc962922c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 420.990356][T24663] RAX: ffffffffffffffda RBX: 00007fc9629236d4 RCX: 000000000045c889 [ 420.998335][T24663] RDX: 000000000000002e RSI: 0000000000000029 RDI: 0000000000000006 [ 421.006317][T24663] RBP: 000000000076bf00 R08: 0000000000000108 R09: 0000000000000000 [ 421.014309][T24663] R10: 0000000020000140 R11: 0000000000000246 R12: 0000000000000007 [ 421.022287][T24663] R13: 0000000000000a90 R14: 00000000004d6850 R15: 0000000000000000 08:04:52 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000180)={0x23, 0x34524742, 0x1c8, 0x0, 0x1, @discrete={0x3, 0x2}}) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0, 0x10010, r1, 0xa66dd000) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x5, 0x8, 0x210000, 0x8, 0x0, 0xb7be}, 0x1c) setsockopt$sock_int(r2, 0x1, 0x31, &(0x7f0000000000), 0x4) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x120) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) read$fb(r3, &(0x7f00000000c0)=""/103, 0x67) close(r2) socket$tipc(0x1e, 0x5, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x10000, 0x0) r5 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r5, 0x0) ioctl$TCGETA(r3, 0x5405, &(0x7f00000001c0)) setuid(r4) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 421.161934][ T26] audit: type=1804 audit(1586505892.913:165): pid=24636 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/328/cgroup.controllers" dev="sda1" ino=16358 res=1 08:04:53 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 08:04:53 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x10000000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:53 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x60000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) [ 421.275271][T24675] IPVS: ftp: loaded support on port[0] = 21 [ 421.302088][ T26] audit: type=1804 audit(1586505892.963:166): pid=24676 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/832/cgroup.controllers" dev="sda1" ino=16362 res=1 08:04:53 executing program 5 (fault-call:4 fault-nth:1): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 421.513037][T24700] FAULT_INJECTION: forcing a failure. [ 421.513037][T24700] name failslab, interval 1, probability 0, space 0, times 0 [ 421.525778][T24700] CPU: 1 PID: 24700 Comm: syz-executor.5 Not tainted 5.6.0-syzkaller #0 [ 421.534115][T24700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 421.544213][T24700] Call Trace: [ 421.547535][T24700] dump_stack+0x1e9/0x30e [ 421.551876][T24700] should_fail+0x433/0x5b0 [ 421.556308][T24700] ? sock_kmalloc+0x98/0x100 [ 421.560908][T24700] should_failslab+0x5/0x20 [ 421.565424][T24700] __kmalloc+0x74/0x330 [ 421.569584][T24700] ? do_raw_write_lock+0xf1/0x440 [ 421.574613][T24700] sock_kmalloc+0x98/0x100 [ 421.579048][T24700] ip6_mc_source+0x8b7/0x1230 [ 421.583728][T24700] ? __ipv6_sock_mc_join+0x6c2/0x840 [ 421.589027][T24700] do_ipv6_setsockopt+0x28cf/0x3920 [ 421.594264][T24700] ? __fget_files+0x4b9/0x4e0 [ 421.598961][T24700] ipv6_setsockopt+0x49/0x160 [ 421.603643][T24700] ? sock_common_recvmsg+0x190/0x190 [ 421.608934][T24700] __sys_setsockopt+0x564/0x710 [ 421.613806][T24700] __x64_sys_setsockopt+0xb1/0xc0 [ 421.618856][T24700] do_syscall_64+0xf3/0x1b0 [ 421.623370][T24700] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 421.629267][T24700] RIP: 0033:0x45c889 [ 421.633174][T24700] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 421.652795][T24700] RSP: 002b:00007fc962922c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 421.661222][T24700] RAX: ffffffffffffffda RBX: 00007fc9629236d4 RCX: 000000000045c889 [ 421.669208][T24700] RDX: 000000000000002e RSI: 0000000000000029 RDI: 0000000000000006 [ 421.677184][T24700] RBP: 000000000076bf00 R08: 0000000000000108 R09: 0000000000000000 [ 421.685160][T24700] R10: 0000000020000140 R11: 0000000000000246 R12: 0000000000000007 [ 421.693132][T24700] R13: 0000000000000a90 R14: 00000000004d6850 R15: 0000000000000001 08:04:53 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000004) 08:04:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) prctl$PR_SET_ENDIAN(0x14, 0x1) setuid(r1) clone(0x22a02000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:53 executing program 5 (fault-call:4 fault-nth:2): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 421.930966][T24721] FAULT_INJECTION: forcing a failure. [ 421.930966][T24721] name failslab, interval 1, probability 0, space 0, times 0 [ 421.943722][T24721] CPU: 0 PID: 24721 Comm: syz-executor.5 Not tainted 5.6.0-syzkaller #0 [ 421.952052][T24721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 421.962108][T24721] Call Trace: [ 421.965413][T24721] dump_stack+0x1e9/0x30e [ 421.969752][T24721] should_fail+0x433/0x5b0 [ 421.974182][T24721] ? ip6_mc_add_src+0x5e5/0xfb0 [ 421.979060][T24721] should_failslab+0x5/0x20 [ 421.983578][T24721] kmem_cache_alloc_trace+0x57/0x300 [ 421.988884][T24721] ip6_mc_add_src+0x5e5/0xfb0 [ 421.993613][T24721] ip6_mc_source+0xeb2/0x1230 [ 421.998292][T24721] ? __ipv6_sock_mc_join+0x6c2/0x840 [ 422.003595][T24721] do_ipv6_setsockopt+0x28cf/0x3920 [ 422.008843][T24721] ? __fget_files+0x4b9/0x4e0 [ 422.013543][T24721] ipv6_setsockopt+0x49/0x160 [ 422.018237][T24721] ? sock_common_recvmsg+0x190/0x190 [ 422.023529][T24721] __sys_setsockopt+0x564/0x710 [ 422.028402][T24721] __x64_sys_setsockopt+0xb1/0xc0 [ 422.033441][T24721] do_syscall_64+0xf3/0x1b0 [ 422.037964][T24721] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 422.043858][T24721] RIP: 0033:0x45c889 [ 422.047750][T24721] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 422.067360][T24721] RSP: 002b:00007fc962922c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 422.075779][T24721] RAX: ffffffffffffffda RBX: 00007fc9629236d4 RCX: 000000000045c889 [ 422.083753][T24721] RDX: 000000000000002e RSI: 0000000000000029 RDI: 0000000000000006 [ 422.091741][T24721] RBP: 000000000076bf00 R08: 0000000000000108 R09: 0000000000000000 [ 422.099730][T24721] R10: 0000000020000140 R11: 0000000000000246 R12: 0000000000000007 [ 422.107727][T24721] R13: 0000000000000a90 R14: 00000000004d6850 R15: 0000000000000002 08:04:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0xc0305302, &(0x7f0000000000)={0x7, 0x0, 0x8, 0x0, 0x1, 0x1}) setuid(r1) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) ioctl$TIOCSIG(r3, 0x40045436, 0x1b) [ 422.118743][ T26] audit: type=1804 audit(1586505893.873:167): pid=24713 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/833/cgroup.controllers" dev="sda1" ino=16372 res=1 08:04:53 executing program 5 (fault-call:4 fault-nth:3): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:54 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x11000000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:54 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000005) 08:04:54 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 422.385909][T24731] IPVS: ftp: loaded support on port[0] = 21 [ 422.507044][ T26] audit: type=1804 audit(1586505894.253:168): pid=24737 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/834/cgroup.controllers" dev="sda1" ino=16361 res=1 08:04:54 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 08:04:54 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x68000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:54 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x3a, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 422.621960][ T26] audit: type=1804 audit(1586505894.333:169): pid=24714 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/329/cgroup.controllers" dev="sda1" ino=16360 res=1 08:04:54 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 422.722120][T24735] IPVS: ftp: loaded support on port[0] = 21 08:04:54 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000006) 08:04:54 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x3, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 423.081592][ T26] audit: type=1804 audit(1586505894.833:170): pid=24795 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/835/cgroup.controllers" dev="sda1" ino=16359 res=1 08:04:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000000)=0xc) setuid(r1) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:55 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x4, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 423.333007][T24812] IPVS: ftp: loaded support on port[0] = 21 08:04:55 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x12000000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:55 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x5, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:55 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x6, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:55 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x6c000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) [ 423.765128][ T26] audit: type=1804 audit(1586505895.513:171): pid=24803 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/330/cgroup.controllers" dev="sda1" ino=16379 res=1 08:04:55 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 08:04:55 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000007) [ 423.872473][ T26] audit: type=1804 audit(1586505895.543:172): pid=24805 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/835/cgroup.controllers" dev="sda1" ino=16359 res=1 08:04:55 executing program 3: ioperm(0x800, 0x7, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x20, r3, 0xab9535e9a6578fc1, 0x0, 0x0, {0x6b}, [@NL80211_ATTR_WDEV={0xc}]}, 0x20}}, 0x0) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x178, r3, 0x4, 0x70bd27, 0x25dfdbff, {}, [@NL80211_ATTR_SCAN_FREQUENCIES={0x4c, 0x2c, 0x0, 0x1, [{0x8, 0x0, 0x7ff}, {0x8, 0x0, 0x8001}, {0x8, 0x0, 0x962}, {0x8, 0x0, 0x1000}, {0x8, 0x0, 0xf0a}, {0x8, 0x0, 0x9}, {0x8, 0x0, 0x8}, {0x8, 0x0, 0xffffc53a}, {0x8, 0x0, 0x9db}]}, @NL80211_ATTR_SCHED_SCAN_MATCH={0x70, 0x84, 0x0, 0x1, [@NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0xc, 0x1, "8247d0d43c99dea9"}, @NL80211_SCHED_SCAN_MATCH_ATTR_BSSID={0xa, 0x5, @broadcast}, @NL80211_SCHED_SCAN_MATCH_ATTR_RSSI={0x8, 0x2, 0x1f}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0x16, 0x1, "812aee72cd8ce03e10d4ab48475a51fec854"}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0x16, 0x1, "4203a42fd64f77df130d438bc5181de38c01"}, @NL80211_SCHED_SCAN_MATCH_PER_BAND_RSSI={0x1c, 0x6, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x8, 0x1, 0x7fff}, @NL80211_BAND_5GHZ={0x8, 0x1, 0x9}, @NL80211_BAND_60GHZ={0x8, 0x2, 0x1}]}]}, @NL80211_ATTR_SCHED_SCAN_MULTI={0x4}, @NL80211_ATTR_SCHED_SCAN_MATCH={0x6c, 0x84, 0x0, 0x1, [@NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0x23, 0x1, "7b3a3d6b381ce6cd9cf844de39c5c785c8a634a1534954626e8559f994be65"}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0xe, 0x1, "ff330510ac4d43a5cef1"}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0xe, 0x1, "832fdb638d44b86ade11"}, @NL80211_SCHED_SCAN_MATCH_ATTR_RSSI={0x8, 0x2, 0x40}, @NL80211_SCHED_SCAN_MATCH_PER_BAND_RSSI={0x14, 0x6, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x8, 0x3, 0x7f}, @NL80211_BAND_2GHZ={0x8, 0x0, 0x3ff}]}, @NL80211_SCHED_SCAN_MATCH_ATTR_RSSI={0x8, 0x2, 0xfffffff8}]}, @NL80211_ATTR_SCAN_SSIDS={0x30, 0x2d, 0x0, 0x1, [{0x9, 0x0, [0x1, 0x1d, 0x14, 0x15, 0x1c]}, {0xa, 0x0, [0x16, 0x6, 0x7, 0x1c, 0x1a, 0x2]}, {0xc, 0x0, [0x16, 0x14, 0x19, 0x5, 0x13, 0x13, 0x3, 0x1e]}, {0x7, 0x0, [0x10, 0x20, 0x18]}]}, @NL80211_ATTR_SCHED_SCAN_INTERVAL={0x8, 0x77, 0x1}]}, 0x178}, 0x1, 0x0, 0x0, 0x800}, 0x4040000) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000040)=0xfffffffffffffcfb) ioprio_set$pid(0x1, r5, 0xf0) prctl$PR_SET_UNALIGN(0x6, 0x0) setuid(r6) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={{r0}, 0x19, 0x0, 0x8}) 08:04:55 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x7, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 424.047278][ T26] audit: type=1804 audit(1586505895.793:173): pid=24854 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/836/cgroup.controllers" dev="sda1" ino=16370 res=1 08:04:55 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x8, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 424.120854][T24857] IPVS: ftp: loaded support on port[0] = 21 08:04:56 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000008) 08:04:56 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0xb, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 424.431391][T24863] IPVS: ftp: loaded support on port[0] = 21 08:04:56 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x1f000000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) [ 424.576911][ T26] audit: type=1804 audit(1586505896.323:174): pid=24895 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/837/cgroup.controllers" dev="sda1" ino=16371 res=1 08:04:56 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x10, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:56 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x74000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:56 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x11, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:56 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = accept4$bt_l2cap(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80000) socket$caif_seqpacket(0x25, 0x5, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) setuid(r1) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 424.952013][ T26] audit: type=1804 audit(1586505896.703:175): pid=24872 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/331/cgroup.controllers" dev="sda1" ino=16355 res=1 08:04:56 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 08:04:56 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000009) 08:04:56 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x12, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 425.088851][T24938] IPVS: ftp: loaded support on port[0] = 21 [ 425.183365][ T26] audit: type=1804 audit(1586505896.933:176): pid=24940 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/838/cgroup.controllers" dev="sda1" ino=16377 res=1 08:04:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x13, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x14, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:57 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 425.437138][T24938] IPVS: ftp: loaded support on port[0] = 21 08:04:57 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x10000000b) 08:04:57 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x20000000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x15, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 425.768945][ T26] audit: type=1804 audit(1586505897.523:177): pid=25012 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/839/cgroup.controllers" dev="sda1" ino=16377 res=1 08:04:57 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x74860000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:57 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 08:04:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000000)=0xc) setuid(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, 0x2000}) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x16, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 426.033911][T25023] IPVS: ftp: loaded support on port[0] = 21 08:04:57 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x10000000f) 08:04:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x17, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:57 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 426.240569][ T26] audit: type=1804 audit(1586505897.993:178): pid=25033 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/840/cgroup.controllers" dev="sda1" ino=16363 res=1 08:04:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x18, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 426.404501][ T26] audit: type=1804 audit(1586505898.053:179): pid=25041 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/335/cgroup.controllers" dev="sda1" ino=16383 res=1 [ 426.470331][T25060] IPVS: ftp: loaded support on port[0] = 21 08:04:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x19, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:58 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x20100000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000010) 08:04:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x1a, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 426.888419][ T26] audit: type=1804 audit(1586505898.643:180): pid=25092 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/841/cgroup.controllers" dev="sda1" ino=16361 res=1 08:04:58 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7a000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000040)=0xc) setuid(r1) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:58 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 08:04:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x1b, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 427.070921][T25103] IPVS: ftp: loaded support on port[0] = 21 [ 427.120218][ T26] audit: type=1804 audit(1586505898.873:181): pid=25104 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/336/cgroup.controllers" dev="sda1" ino=16377 res=1 08:04:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x1c, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:59 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x10000008f) 08:04:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x1d, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 427.415334][ T26] audit: type=1804 audit(1586505899.163:182): pid=25133 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/842/cgroup.controllers" dev="sda1" ino=16361 res=1 08:04:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@rand_addr="ce7803c6e1a355216839913b76f0720b", 0x5, 0x0, 0xff, 0x4, 0x8554, 0x57b}, 0x20) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:04:59 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 427.635017][T25147] IPVS: ftp: loaded support on port[0] = 21 08:04:59 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x25000000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:04:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x1e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:59 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x1000000f0) [ 427.925668][T25179] IPVS: ftp: loaded support on port[0] = 21 08:04:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x21, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:04:59 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8c790300, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:04:59 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 08:04:59 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x1000001fe) 08:05:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x22, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:00 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x80, 0x0) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x80) r2 = socket(0x10, 0x803, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="400000001400b59500000000000000000a0000006594d2390cf1cf82984fb31f4e923438a6d58ae42ad698bb7b6c3f56ee05492fdbe9b9c77bf97c966a3a0caf812a442a0032a1ed621138397bd6060fbe84ee88192b79ce2936a19c6d86354cf136076f69919e9564403e9d66da36b2a7441457d220664bd0f0a98e01cbd5129785b14d560adeee6bceec83559503f7a82e9c0c565ff6fb9d2ae2beb2a68d6141fa28b46abd6ddfd71e3b3be227cc465ed0f60c77ca03d26f78a8249949fe2d3cef50a58c67dd19942e6e5d", @ANYRES32=r4, @ANYBLOB="1400020000000000000000000000ffff0000000014000100ff020000000000000000000000000001"], 0x40}}, 0x0) bind$can_j1939(r1, &(0x7f00000001c0)={0x1d, r4, 0x0, {0x0, 0xf0, 0x3}, 0xfd}, 0x18) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4000010, r0, 0x0) accept4$ax25(r0, &(0x7f0000000080)={{0x3, @null}, [@netrom, @netrom, @null, @remote, @default, @default, @remote, @null]}, &(0x7f0000000100)=0x48, 0x80000) r5 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) ioctl$SIOCRSACCEPT(r2, 0x89e3) r6 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r6, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r6, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000140)=0xc) setuid(r7) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x23, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 428.477328][T25223] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 08:05:00 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000420) 08:05:00 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 428.582118][T25223] IPVS: ftp: loaded support on port[0] = 21 08:05:00 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:05:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x24, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 428.961590][T25261] IPVS: ftp: loaded support on port[0] = 21 08:05:00 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000b35) 08:05:00 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:00 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 08:05:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 429.203593][ T26] kauditd_printk_skb: 6 callbacks suppressed [ 429.203604][ T26] audit: type=1804 audit(1586505900.953:189): pid=25278 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/846/cgroup.controllers" dev="sda1" ino=16357 res=1 08:05:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) clone(0xc75e43cfa623dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 429.357001][ T26] audit: type=1804 audit(1586505901.103:190): pid=25296 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/340/cgroup.controllers" dev="sda1" ino=16379 res=1 08:05:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2c, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:01 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100001800) 08:05:01 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000000)=0xc) setuid(r1) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:01 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 429.663037][ T26] audit: type=1804 audit(1586505901.413:191): pid=25312 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/847/cgroup.controllers" dev="sda1" ino=16376 res=1 08:05:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2d, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:01 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x40000000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:05:01 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100002000) [ 429.806647][T25318] IPVS: ftp: loaded support on port[0] = 21 [ 429.817523][ T26] audit: type=1804 audit(1586505901.573:192): pid=25317 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/341/cgroup.controllers" dev="sda1" ino=16371 res=1 [ 430.016328][ T26] audit: type=1804 audit(1586505901.763:193): pid=25326 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/848/cgroup.controllers" dev="sda1" ino=16383 res=1 08:05:01 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 08:05:02 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xc0ed0000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2f, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:02 executing program 3: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) vmsplice(r0, &(0x7f0000001500)=[{&(0x7f0000000080)="8327519551633516faaf1db867a404d1520893194240efedd2ec458ad19d34a893946ed196d4e8cb8ff07004a5ccc9be9932fa690897edb4b50aaa14b1f29f64d7ab1314042c21a192fe86101d547b0dd8462f473535e72600c3de284f0b2bd9db60f1a6c7546ae449b5f8cb9e57d13c7051cd6f9138c2cea160358a41454fd54d1a00c7c1540cd14b0a63959fb4373c10816b827c7e39d621dca64214509b25c7206eadf9a3494431e0a1c8a4b54cbdb911ce75ee16c5", 0xb7}, {&(0x7f0000000140)="f8dca95597fe9e4c6aa3b929d78854f7744a04162d68dbe8b24c5669400a485e6d6d69a83a76a2416ab5d63be40524af107d50ed0aed347c3e4aafd8db4fd9bcbf6355ab7ef3e61bef55b95054ad1fb92391fc639d5a939f9bfc3dbad613b05e8950bb61429a61915e7a8a3ef1113b9ed7bde242df1b255ba7805776f67b650443559d6088398db10724a280acef0b11066e71257c8a6d06493dcdd236ee82df3fd452b5cb9874706d432ef4f446db4bf8c83de7c429a7bd27d3688d67fca6a16c401c499bdea048314f4b4cfa0359aaa6a22545e3e33a4ade2de414b771dca55447f9", 0xe3}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000012c0)="629c20ec5198150f0c9e21a9954e4f33fe0aa5d90284b59a89fafc8d07faf95613f20e20624681d13247c506f81400775e9a3cb7450683207a3197dc7a130dc1a2ddfecb2b570fcda151194d7a5b2502fedd0caa5ee2b3b305f0cd8ea3544b96aa19c878b81b10e51ab7b6a3bbdb6c8daec441276ba3dbb363d9695ecacb08e479aa2b8d5d2e4604d035f2f8fc1f71c0efede62a2e27a4ef40aee3801cb23b710ff0de41d96b1a3fc12ce9252a001d4ade32fb6de562abb833f09a0098c2abe8c03c3c", 0xc3}, {&(0x7f00000013c0)="94ef", 0x2}, {&(0x7f0000001400)="0b0d65118b71538b42cf7a1603d8748c84221019bdd8d4ccb79d7dc8bfa106d3111cd716a5d40b956f39fba0449996387994d4e5ffc6bdf764d73b1d42d0e5e0803595deba357b62c8152be10c6690c677a03d2e0562f13f2f75efa85987560f643433a131659da70e3d81725eafa4b5f68b4149054b5498ba94a6066a69e7d75747e0c8c0f2886fa786fbcbfe2557317245a4a8ca8e86809e20b9866a9b39af612a996baf83321920252053ea8d03627ef0b03d1c6597d5eee87a049cabbef456434b0e8b0900aac137d6e501686a04a207de16530ec5556c01fc3e2ca13d9d574f82337bb3e10b5a", 0xe9}], 0x6, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) signalfd4(r2, &(0x7f0000000280)={[0x2]}, 0x8, 0x80000) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001580)=0xc) setuid(r3) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) read$smackfs_cipsonum(r4, &(0x7f00000015c0), 0x14) [ 430.293855][ T26] audit: type=1804 audit(1586505902.043:194): pid=25359 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/342/cgroup.controllers" dev="sda1" ino=16368 res=1 08:05:02 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100002800) 08:05:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x30, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:02 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 430.452754][T25364] IPVS: ftp: loaded support on port[0] = 21 08:05:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x31, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 430.587114][ T26] audit: type=1804 audit(1586505902.333:195): pid=25372 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/849/cgroup.controllers" dev="sda1" ino=16360 res=1 [ 430.692567][ T26] audit: type=1804 audit(1586505902.443:196): pid=25385 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/343/cgroup.controllers" dev="sda1" ino=16368 res=1 08:05:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x32, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 430.811685][T25367] IPVS: ftp: loaded support on port[0] = 21 08:05:02 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100003000) 08:05:02 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x48000000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:05:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x33, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:02 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 431.040115][ T26] audit: type=1804 audit(1586505902.793:197): pid=25415 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/850/cgroup.controllers" dev="sda1" ino=16372 res=1 [ 431.245695][ T26] audit: type=1804 audit(1586505902.993:198): pid=25439 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/344/cgroup.controllers" dev="sda1" ino=16384 res=1 08:05:03 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xcf0a0000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:03 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x35, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:03 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100003800) 08:05:03 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 08:05:03 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x36, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r4) getgroups(0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4]) mount$fuse(0x0, &(0x7f0000000040)='./bus/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x30040, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r5, @ANYBLOB="2c6d61785f726561643d3078303030303030303030300030303030332c686173682c66736e616d653d2c2c2c61707072616973652c6d61736b3d537359c6a499945481f9c0646f6e745f61707072616973652c88736e616d653d2f70d73cae21bf2d40ddcb16"]) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r6, 0x5441, 0x0) mmap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000180)={0x556, 0x800, 0x60, 0x400, 0xfffffbff, 0x20, 0x20, 0x2, {0x4, 0x2b, 0x1}, {0x96, 0x1f, 0x1}, {0xffffffff, 0x2}, {0xffff31ff}, 0x1, 0x50, 0x5, 0x5, 0x0, 0x3, 0xf5a, 0x400, 0x2d24, 0xfff, 0x8, 0x0, 0x24, 0x4, 0x2, 0x2}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000280)=0xffffffffffffff85) setuid(r7) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = socket$l2tp(0x2, 0x2, 0x73) accept4(r8, &(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000080)=0x80, 0x0) 08:05:03 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x37, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 431.769240][T25460] IPVS: ftp: loaded support on port[0] = 21 08:05:03 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x38, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:03 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100004000) 08:05:03 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4c000000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:05:03 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 08:05:03 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x39, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 432.274980][T25460] IPVS: ftp: loaded support on port[0] = 21 08:05:04 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xd00a0000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x3a, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:04 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 08:05:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x3b, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:04 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000100)={0x9b0000, 0x0, 0x6, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9b0953, 0x8, [], @p_u32=&(0x7f0000000040)}}) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) fstat(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r2) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x3c, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:04 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 08:05:04 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100004800) [ 432.854481][T25543] IPVS: ftp: loaded support on port[0] = 21 08:05:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x3e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:04 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4c7b0000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:05:05 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 08:05:05 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x42, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:05 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xebffffff, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) setuid(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f0000000080)={0xa00000, 0x5cc, 0x8001, r3, 0x0, &(0x7f0000000040)={0x9d09d6, 0x200, [], @p_u32=&(0x7f0000000000)=0x8}}) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r4, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x40, 0x1411, 0x278b7efb70578c70, 0x70bd27, 0x255fdbfb}, 0xfffffdb9}}, 0x40000) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:05 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100005000) 08:05:05 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x43, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:05 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x46, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 433.633473][T25598] IPVS: ftp: loaded support on port[0] = 21 08:05:05 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x20, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x20}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 08:05:05 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x48, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:05 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100005800) [ 434.017931][T25632] IPVS: ftp: loaded support on port[0] = 21 08:05:05 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x20, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x20}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 08:05:05 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x534d9cc7, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:05:05 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x49, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:06 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x4a, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 434.293350][ T26] kauditd_printk_skb: 11 callbacks suppressed [ 434.293361][ T26] audit: type=1804 audit(1586505906.033:210): pid=25660 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/351/cgroup.controllers" dev="sda1" ino=16376 res=1 08:05:06 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:06 executing program 3: modify_ldt$write(0x1, &(0x7f0000000000)={0x4, 0x20001000, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x10000, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)=ANY=[@ANYBLOB="01000002", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000100)={0x1, 0x6, 0x81, 0xff, r1}, &(0x7f0000000140)=0x10) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:06 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x4b, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:06 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100006000) 08:05:06 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x20, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x20}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 08:05:06 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x4c, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 434.744126][T25685] IPVS: ftp: loaded support on port[0] = 21 [ 434.767382][ T26] audit: type=1804 audit(1586505906.513:211): pid=25686 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/856/cgroup.controllers" dev="sda1" ino=16384 res=1 [ 434.898286][ T26] audit: type=1804 audit(1586505906.653:212): pid=25692 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/352/cgroup.controllers" dev="sda1" ino=16376 res=1 08:05:06 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x4d, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:06 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100006800) 08:05:06 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000002) 08:05:06 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x5c000000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:05:06 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x4e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 435.167158][T25722] IPVS: ftp: loaded support on port[0] = 21 [ 435.270565][ T26] audit: type=1804 audit(1586505907.023:213): pid=25725 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/857/cgroup.controllers" dev="sda1" ino=16357 res=1 08:05:07 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000002) [ 435.396123][ T26] audit: type=1804 audit(1586505907.083:214): pid=25732 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/353/cgroup.controllers" dev="sda1" ino=16361 res=1 [ 435.604387][ T26] audit: type=1804 audit(1586505907.353:215): pid=25748 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/354/cgroup.controllers" dev="sda1" ino=16384 res=1 08:05:07 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xf9fdffff, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:08 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000002) 08:05:08 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100007000) 08:05:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:08 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x60000000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:05:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x3f00, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 436.483533][ T26] audit: type=1804 audit(1586505908.233:216): pid=25777 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/858/cgroup.controllers" dev="sda1" ino=16364 res=1 08:05:08 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000002) 08:05:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x800) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x20, r5, 0xab9535e9a6578fc1, 0x0, 0x0, {0x6b}, [@NL80211_ATTR_WDEV={0xc}]}, 0x20}}, 0x0) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r5, 0x10, 0x70bd27, 0x25dfdbfc, {}, [@NL80211_ATTR_MAC={0xa, 0x6, @multicast}, @NL80211_ATTR_MAC={0xa, 0x6, @random="288a36e71af1"}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r2, r1, r6) ioctl$SNDCTL_DSP_SETFRAGMENT(r3, 0xc004500a, &(0x7f0000000300)=0x1) 08:05:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x1000000, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 436.619138][ T26] audit: type=1804 audit(1586505908.263:217): pid=25785 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/355/cgroup.controllers" dev="sda1" ino=16363 res=1 [ 436.742072][T25792] IPVS: ftp: loaded support on port[0] = 21 08:05:08 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100007800) [ 436.793975][ T26] audit: type=1804 audit(1586505908.543:218): pid=25794 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851837972/syzkaller.0wFbMh/356/cgroup.controllers" dev="sda1" ino=16360 res=1 08:05:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x3f000000, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:08 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000002) [ 437.018045][ T26] audit: type=1804 audit(1586505908.763:219): pid=25809 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/859/cgroup.controllers" dev="sda1" ino=16371 res=1 [ 437.109242][T25797] IPVS: ftp: loaded support on port[0] = 21 08:05:09 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xfdfdffff, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x9effffff, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:09 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000002) 08:05:09 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x10000fff0) 08:05:09 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x64020000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:05:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0xa4ffffff, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fanotify_init(0x0, 0x1000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setuid(r1) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:09 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x0) 08:05:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0xf5ffffff, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 437.630940][T25878] IPVS: ftp: loaded support on port[0] = 21 08:05:09 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x0) 08:05:09 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x10018bed5) 08:05:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0xffffff9e, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 438.017003][T25913] IPVS: ftp: loaded support on port[0] = 21 08:05:10 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffdf9, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0xffffffa4, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:10 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x0) 08:05:10 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x1fffffff0) 08:05:10 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x65020000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:05:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0xfffffff5, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x800) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x20, r5, 0xab9535e9a6578fc1, 0x0, 0x0, {0x6b}, [@NL80211_ATTR_WDEV={0xc}]}, 0x20}}, 0x0) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r5, 0x10, 0x70bd27, 0x25dfdbfc, {}, [@NL80211_ATTR_MAC={0xa, 0x6, @multicast}, @NL80211_ATTR_MAC={0xa, 0x6, @random="288a36e71af1"}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r2, r1, r6) ioctl$SNDCTL_DSP_SETFRAGMENT(r3, 0xc004500a, &(0x7f0000000300)=0x1) 08:05:10 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) recvfrom$netrom(r0, &(0x7f0000000200)=""/253, 0xfd, 0x60010160, &(0x7f0000000100)={{0x3, @default, 0x3}, [@null, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default]}, 0x48) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:05:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 438.738060][T25964] IPVS: ftp: loaded support on port[0] = 21 08:05:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400044242, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f0000000040)=0x3, 0x4) setuid(r1) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/vga_arbiter\x00', 0x20000, 0x0) sendto$inet(r4, &(0x7f0000001800)="0bd53aea1f750054079e34e88aa0890a90408321ae81a808d74e04a14d60dad7d6953cac23e0e4a897b288cd2e94b1966b2059a5561df3e237caca4f357d24018c46428330033ee4b3ba07cf7c17797f6b7c930b35d19ff95e6a26e925a4abd0af014065f9988fb14312967783c244a0bb7c0328871b0d596a21e64d66d2e41dcbbdbccc215b804bd365a779c59d81701e6b49c91dc6d6b3f23db345d06aab4de8d54abe907cd4d5cde8c1e690718de56961f61778296f20bde600ea4ecbe11b22a9053a45017c99", 0xc8, 0x40000, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r3, 0xc1004110, &(0x7f0000000380)={0xfffffffd, [0x8000000, 0x2, 0x2], [{0x80000001, 0x7fffffff, 0x0, 0x0, 0x1}, {0x50, 0x6, 0x0, 0x0, 0x0, 0x1}, {0x9177, 0x1, 0x0, 0x0, 0x0, 0x1}, {0xfffffffb, 0x9, 0x1, 0x1, 0x1, 0x1}, {0xfe, 0x9, 0x1, 0x1, 0x1, 0x1}, {0xfffff800, 0x44, 0x1}, {0x40, 0x5, 0x0, 0x1, 0x1}, {0x8, 0x0, 0x1, 0x1}, {0x5, 0xffffffc0, 0x1, 0x1, 0x1, 0x1}, {0x4, 0x7, 0x1, 0x1, 0x1, 0x1}, {0x4, 0x0, 0x0, 0x0, 0x1}, {0x80, 0x6, 0x1, 0x1, 0x1}], 0x2}) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000080)={0x8, 0x120, 0xfa00, {0x3, {0x8d92, 0x80000000, "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", 0x1, 0x0, 0x40, 0x5, 0x7, 0x0, 0x15}}}, 0x128) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r6, @ANYBLOB="c18f00000000000000006b000000000099000000000000000000e53e1e2b25f24c00cbe45ce1944efa40e33973e01f0071d756283b7b20f074e0b418b0cbd400c589d37b309fb8b540c2932dca9587c1c705ce9ba0e3b6a15947d7c04258f2674000"/110], 0x20}}, 0x0) socket(0x10, 0x803, 0x0) r7 = socket(0x1, 0x803, 0x0) setsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f00000001c0), 0x4) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) 08:05:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x3f00, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 438.941277][T25977] IPVS: ftp: loaded support on port[0] = 21 [ 438.971667][T25987] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 08:05:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 439.292916][T25987] IPVS: ftp: loaded support on port[0] = 21 08:05:11 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffdfd, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x3f00, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:11 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) sendmsg$IPSET_CMD_LIST(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000000706010200000000000000000200000005000100070000000800064000020004"], 0x24}}, 0x8040) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$getflags(r0, 0x408) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@getrule={0x14, 0x22, 0x800, 0x470bd29, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x30000000) connect$can_bcm(r1, &(0x7f00000002c0)={0x1d, r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r6, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r6, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x7, 0xfffffffc, 0x5}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000200)={r7, @in6={{0xa, 0x4e21, 0x2, @mcast2, 0x9}}, 0xbd4, 0x800, 0x9, 0x9, 0xae, 0x5, 0x12}, &(0x7f0000000180)=0x9c) r8 = socket$netlink(0x10, 0x3, 0x0) ioctl(r8, 0x2, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r3, r1, 0x0, 0x100000002) 08:05:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x3f00, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:11 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x68000000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:05:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r4) getgroups(0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4]) mount$fuse(0x0, &(0x7f0000000040)='./bus/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x30040, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r5, @ANYBLOB="2c6d61785f726561643d3078303030303030303030300030303030332c686173682c66736e616d653d2c2c2c61707072616973652c6d61736b3d537359c6a499945481f9c0646f6e745f61707072616973652c88736e616d653d2f70d73cae21bf2d40ddcb16"]) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r6, 0x5441, 0x0) mmap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000180)={0x556, 0x800, 0x60, 0x400, 0xfffffbff, 0x20, 0x20, 0x2, {0x4, 0x2b, 0x1}, {0x96, 0x1f, 0x1}, {0xffffffff, 0x2}, {0xffff31ff}, 0x1, 0x50, 0x5, 0x5, 0x0, 0x3, 0xf5a, 0x400, 0x2d24, 0xfff, 0x8, 0x0, 0x24, 0x4, 0x2, 0x2}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000280)=0xffffffffffffff85) setuid(r7) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = socket$l2tp(0x2, 0x2, 0x73) accept4(r8, &(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000080)=0x80, 0x0) [ 439.540544][ T26] kauditd_printk_skb: 11 callbacks suppressed [ 439.540553][ T26] audit: type=1804 audit(1586505911.293:231): pid=26042 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/864/cgroup.controllers" dev="sda1" ino=16371 res=1 08:05:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x1000000, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 439.739533][T26065] IPVS: ftp: loaded support on port[0] = 21 08:05:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x3f000000, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:11 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x801, 0x0, 0x0, {0x0, 0x0, 0xfffe}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) [ 440.167441][ T26] audit: type=1804 audit(1586505911.913:232): pid=26097 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/865/cgroup.controllers" dev="sda1" ino=16382 res=1 08:05:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r4) getgroups(0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4]) mount$fuse(0x0, &(0x7f0000000040)='./bus/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x30040, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r5, @ANYBLOB="2c6d61785f726561643d3078303030303030303030300030303030332c686173682c66736e616d653d2c2c2c61707072616973652c6d61736b3d537359c6a499945481f9c0646f6e745f61707072616973652c88736e616d653d2f70d73cae21bf2d40ddcb16"]) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r6, 0x5441, 0x0) mmap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000180)={0x556, 0x800, 0x60, 0x400, 0xfffffbff, 0x20, 0x20, 0x2, {0x4, 0x2b, 0x1}, {0x96, 0x1f, 0x1}, {0xffffffff, 0x2}, {0xffff31ff}, 0x1, 0x50, 0x5, 0x5, 0x0, 0x3, 0xf5a, 0x400, 0x2d24, 0xfff, 0x8, 0x0, 0x24, 0x4, 0x2, 0x2}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000280)=0xffffffffffffff85) setuid(r7) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = socket$l2tp(0x2, 0x2, 0x73) accept4(r8, &(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000080)=0x80, 0x0) 08:05:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x9effffff, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:14 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xffffff7f, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:14 executing program 4: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f0000001340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001300)={&(0x7f0000000280)={0x1060, 0x1, 0x5, 0x401, 0x0, 0x0, {0x0, 0x0, 0x8}, [{{0x254, 0x1, {{0x3, 0x8}, 0x2, 0x0, 0x5, 0x1, 0x28, 'syz1\x00', "b41764c4edb657a4e164990ef017e4ace31b525cff0f2651f2950b9d9981b1fb", "ee895a12847e5ddba0b01e5e4308f5e4ae2c881346259b363fb31672f906fc06", [{0x9687, 0x5d6, {0x3, 0x7fff}}, {0x10, 0x1000, {0x3, 0x7}}, {0x9, 0x7, {0x2, 0x4}}, {0x0, 0x7, {0x0, 0x7d96}}, {0x0, 0xf5, {0x1, 0x5}}, {0x2, 0x3000, {0x0, 0x1}}, {0x8001, 0x1, {0x0, 0x5}}, {0xda20, 0x400, {0x0, 0x1000}}, {0xfff, 0xfff, {0x3, 0x20}}, {0x8, 0x80, {0x0, 0x245a}}, {0x6, 0x0, {0x2, 0x7fffffff}}, {0x3b, 0x0, {0x3, 0xc41}}, {0x1ff, 0x4, {0x3, 0x2}}, {0x7, 0x0, {0x3, 0x236f}}, {0x2, 0x3, {0x3, 0x3f}}, {0x4, 0x4, {0x2, 0x7fffffff}}, {0xae, 0x2, {0x3, 0x4}}, {0xfe01, 0x9, {0x1, 0x881c}}, {0x3, 0x5e, {0x0, 0x3}}, {0x800, 0x1, {0x0, 0x87}}, {0x9, 0x6, {0x2, 0xffffffff}}, {0x80, 0x0, {0x0, 0x8}}, {0x6, 0x7607, {0x2, 0x401}}, {0x0, 0x8, {0x2, 0x81}}, {0x7f, 0x0, {0x3, 0x425}}, {0x7, 0x200, {0x2, 0x9d98}}, {0x5, 0x1, {0x2, 0x6}}, {0x4, 0x81, {0x1, 0x6}}, {0x1, 0x4, {0x0, 0x2}}, {0xc372, 0x1ff, {0x3, 0x1}}, {0x4, 0x3, {0x1, 0x3}}, {0x7, 0x6, {0x2, 0x1000}}, {0x0, 0x0, {0x1, 0x4e9e}}, {0x7ff, 0x4, {0x2, 0x9}}, {0x200, 0x101, {0x1, 0x3}}, {0xfff9, 0x7, {0x1, 0xffffffff}}, {0x7, 0x1, {0x0, 0x9}}, {0x7, 0x5, {0x1, 0x2}}, {0x6, 0x8, {0x0, 0x7}}, {0x0, 0x800, {0x3, 0x3}}]}}}, {{0x254, 0x1, {{0x1, 0xfffffff9}, 0x6, 0x1f, 0xa000, 0xfff0, 0x1f, 'syz0\x00', "ef9e784368a9a1f37e9c0af9f8304d5a6e5d22eeeed0a16cdcc55cb9f6c758b0", "58133ededb6d49f91ab0b56beb6a9e954040c0a8f112ce6d2e888ff792ec58c4", [{0x8000, 0x8, {0x1, 0xa}}, {0x4, 0x7f, {0x1, 0x4}}, {0x401, 0x5, {0x1, 0x6}}, {0x39, 0x4, {0x3, 0x101}}, {0x3, 0x4, {0x0, 0x9}}, {0x1, 0x7, {0x2, 0x6000}}, {0x9, 0x0, {0x0, 0x1000}}, {0x1, 0x1f, {0x0, 0x3}}, {0x2, 0x9, {0x1, 0x8}}, {0x7, 0x7f, {0x1}}, {0x4, 0x9b30, {0x1, 0xffffff07}}, {0xa3, 0x7, {0x3, 0x400}}, {0x5, 0x0, {0x3, 0x1}}, {0x3935, 0xfffc, {0x0, 0xfff00000}}, {0x7, 0x6, {0x0, 0x200}}, {0x2, 0x9, {0x1, 0x8}}, {0x0, 0xe3ef, {0x2, 0x800}}, {0x1ff, 0x0, {0x0, 0x97fe}}, {0x5d, 0x7, {0x1, 0xffffffff}}, {0x3, 0x1, {0x2, 0x4}}, {0x5, 0x7, {0x1, 0x1}}, {0x30, 0x5, {0x2, 0x3}}, {0x8001, 0x7fff, {0x2, 0x9}}, {0xf801, 0x8000, {0x1, 0x1ff}}, {0x7, 0x6, {0x1, 0x1000}}, {0xc6, 0x2b4, {0x2, 0x10001}}, {0x7, 0x1, {0x2, 0x6da8}}, {0x0, 0x8, {0x0, 0xd5}}, {0x80, 0x2, {0x1, 0x9}}, {0x5, 0x6, {0x0, 0x80000001}}, {0x7, 0x3ff, {0x3, 0x5}}, {0x7, 0x4, {0x0, 0x4}}, {0x214, 0x8000, {0x3, 0x800}}, {0x3f, 0x7, {0x3, 0xfffffffa}}, {0x1, 0x16a0, {0x0, 0xfff}}, {0x3f, 0x0, {0x2, 0x1000}}, {0x8, 0x4, {0x2, 0x9}}, {0x5, 0x7fff, {0x0, 0xfffff801}}, {0x0, 0xff7f, {0x2, 0x1}}, {0xd02, 0xfff, {0x0, 0x7ff}}]}}}, {{0x254, 0x1, {{0x0, 0x80}, 0x1, 0x3, 0x0, 0x0, 0x13, 'syz1\x00', "d96020c1f6d7d5f2546bff5b67503e449b3b789bbe820fe3a01bdb20e9417092", "dda0e284d763c1ed375d6349458db8e5c5218f9178f990df5992247358eb7255", [{0x3d, 0x5, {0x0, 0x6}}, {0x1, 0x0, {0x3, 0x7}}, {0x1ff, 0x9, {0x2, 0xca38}}, {0x1, 0x1c26, {0x1, 0x1}}, {0x6, 0x5, {0x1, 0x6}}, {0x1, 0x2, {0x3, 0x6b86}}, {0xfff8, 0x100, {0x3, 0x3}}, {0x6, 0x3, {0x2, 0xfffffffb}}, {0x8955, 0x800, {0x1, 0x3f}}, {0x7fff, 0x2cb9, {0x0, 0xfffffffc}}, {0x20, 0x3, {0x2, 0x78c8b048}}, {0x40, 0x8, {0x1}}, {0x1, 0x1, {0x1, 0xfffffff9}}, {0x0, 0x3, {0x3, 0x2}}, {0x416, 0x3, {0x2, 0x100}}, {0xff, 0xae4, {0x0, 0x2}}, {0x1, 0x78eb, {0x0, 0x9}}, {0x3f, 0x57bb, {0x2, 0x100}}, {0x7fff, 0x48, {0x1, 0x40}}, {0x6, 0xfff, {0x0, 0x7}}, {0x2, 0x0, {0x3, 0x7ff}}, {0x2, 0x6, {0x0, 0xff}}, {0x1, 0x200, {0x1, 0x5}}, {0x81, 0x4, {0x1, 0x9}}, {0x2, 0x3, {0x0, 0x200}}, {0x2, 0x4, {0x3, 0xffffffff}}, {0x1, 0x7f, {0x1, 0x3786}}, {0x81, 0x401, {0x3, 0x9}}, {0x0, 0x3f, {0x3, 0x1}}, {0x245, 0x7ff, {0x3, 0xfffff001}}, {0x3da9, 0xc623, {0x2, 0x7}}, {0x286a, 0xe3, {0x2, 0x5}}, {0x3f, 0xc2, {0x1, 0x81}}, {0x40, 0x8, {0x1, 0x588}}, {0x20, 0x5, {0x0, 0x7ff}}, {0x8, 0x9, {0x1, 0x42}}, {0x6, 0x1, {0x0, 0xfffffff7}}, {0xfffe, 0x7, {0x0, 0x1}}, {0x4, 0x200, {0x1, 0x6}}, {0x0, 0x9, {0x1, 0x6}}]}}}, {{0x254, 0x1, {{0x1, 0x8}, 0x9, 0x2, 0x7, 0x5, 0x1c, 'syz1\x00', "d83c155adcff933dca2e031eebf1a3bc4ec37dc07ad9fbc16b7c39a62011339a", "94cb30c379d18d1e639af7ebdbbe00ca0b30ccf7add104098fcb952ba3505877", [{0x7, 0x3, {0x1, 0x1}}, {0x7fff, 0x38a, {0x1, 0x9}}, {0x2, 0x3, {0x1, 0x9}}, {0x5, 0x200, {0x1, 0x8001}}, {0x1, 0xff, {0x2, 0x5}}, {0x64b, 0x81, {0x3, 0x800}}, {0x6, 0x8, {0x3, 0x5}}, {0x3, 0x8001, {0x1, 0x9}}, {0x3, 0x81, {0x0, 0x8}}, {0x8, 0xe111, {0x0, 0x5}}, {0x8, 0x7fff, {0x1, 0x2}}, {0x400, 0x9, {0x3, 0x10000}}, {0x3ff, 0x4, {0x2, 0x1}}, {0x0, 0x3f, {0x1, 0x9}}, {0x7, 0x3f, {0x2, 0x9}}, {0x7fff, 0x4, {0x2}}, {0x1000, 0x8, {0x1, 0xe53d}}, {0x4, 0x1, {0x0, 0x2}}, {0x401, 0xfff, {0x0, 0x8323}}, {0x1ff, 0x9, {0x2, 0x5}}, {0x1f, 0x3, {0x1, 0x6}}, {0x0, 0xffff, {0x3, 0x1}}, {0xd9a3, 0x5, {0x1, 0x4}}, {0x3, 0x800, {0x0, 0x1}}, {0xfe01, 0x1f, {0x0, 0x7}}, {0x2, 0x0, {0x0, 0x8}}, {0x2, 0x89, {0x2, 0x7c}}, {0x317d, 0x81, {0x3, 0x80000001}}, {0xd30d, 0x2, {0x0, 0xffffffff}}, {0x9, 0xff, {0x0, 0x22}}, {0x5, 0x2, {0x0, 0xa35b}}, {0xff14, 0x6, {0x2, 0x6}}, {0x100, 0x5, {0x2, 0x1000}}, {0x40, 0x4, {0x0, 0x274c}}, {0x200, 0x2c, {0x3, 0x9}}, {0x0, 0x1000}, {0x8, 0xe, {0x2, 0x7}}, {0x4, 0x6, {0x0, 0x38}}, {}, {0x3f, 0x0, {0x1, 0x8000}}]}}}, {{0x254, 0x1, {{0x0, 0xf2}, 0x4, 0x5, 0xbed1, 0x81, 0xf, 'syz1\x00', "e3963f3f2e444c66447ae6c057e7abb1b34fa5bc91c1cf17094efb8430104676", "4668c2601ce62594805c6a09581f04816e958dbb28035b7966e3caeb9a5c6ae3", [{0xe35, 0x4, {0x1, 0x2485}}, {0x8, 0x94cc, {0x3, 0x3}}, {0x3, 0x1, {0x1, 0xfff}}, {0x6, 0x485, {0x0, 0x5}}, {0x692, 0x5ca0, {0x0, 0x4}}, {0x0, 0x7f, {0x3, 0x3}}, {0x4, 0x0, {0x0, 0xd8f4}}, {0x80, 0x5, {0x1, 0x1}}, {0x2, 0x3, {0x2}}, {0x7, 0x4b, {0x3, 0x8}}, {0x3, 0x8, {0x1, 0x20}}, {0x6, 0xffff, {0x0, 0x9}}, {0x1, 0x7, {0x3, 0x8}}, {0x1ff, 0x8, {0x2, 0x10000}}, {0x0, 0x0, {0x3}}, {0x0, 0x80, {0x2, 0x81}}, {0x5, 0x3, {0x1, 0x80000000}}, {0xfffa, 0xd0, {0x3, 0xfffffff9}}, {0x8, 0x5, {0x1, 0x6}}, {0x19, 0x9, {0x0, 0xffffffe1}}, {0x7, 0x1f, {0x2, 0x2}}, {0x1, 0x2, {0x0, 0xd1d}}, {0x0, 0x4, {0x1, 0x1}}, {0x4, 0x4, {0x0, 0x9}}, {0xfffd, 0x7, {0x2, 0x6}}, {0x1, 0x40, {0x1, 0x1}}, {0x1000, 0x0, {0x3, 0xadf5}}, {0x0, 0x9, {0x2, 0xfffffff8}}, {0xfff, 0x3ff, {0x0, 0x400}}, {0x0, 0x0, {0x2, 0x4}}, {0x5, 0x2}, {0x7, 0xee, {0x1, 0x2}}, {0x9, 0x0, {0xb4bbeb989c6d5769, 0xffff}}, {0x4, 0x2, {0x3, 0x2f}}, {0x8, 0x0, {0x2, 0x4}}, {0x0, 0x3, {0x2, 0x7}}, {0x7f, 0x1ff, {0x3, 0xffffff9c}}, {0xffff, 0x5, {0x2, 0x101}}, {0x1, 0x400, {0x3}}, {0x5, 0x8, {0x2, 0xffff}}]}}}, {{0x254, 0x1, {{0x1, 0x7fff}, 0xe3, 0xfd, 0x3, 0x0, 0x18, 'syz1\x00', "0844f55e44a3571aba55a451a03a6dc00722c0e09e78a31298d1b365b648e4bf", "1a3fbf39aa038145eaf7cce4bed051369b6376a009d82a9ca4285c6345272ce4", [{0xffff, 0x8, {0x0, 0x91}}, {0x3000, 0x5, {0x0, 0x5}}, {0x800, 0x400, {0x0, 0x101}}, {0xffc0, 0x8, {0x1, 0x1fca}}, {0x5, 0x0, {0x1, 0x8}}, {0x4000, 0x0, {0x0, 0x12e}}, {0x1f, 0x0, {0x1, 0xffff}}, {0x1, 0x7ae, {0x3, 0x8}}, {0x5, 0x874, {0x0, 0x1}}, {0x9, 0x6, {0x1, 0x3e}}, {0x1, 0x0, {0x3, 0x200}}, {0x3, 0xfe3, {0x1, 0x4}}, {0x10, 0x6a, {0x2, 0x8}}, {0xe76, 0x7, {0x2, 0x8}}, {0x10ea, 0x7, {0x1, 0x7}}, {0x4, 0x1, {0x2, 0xbd4}}, {0x8, 0x7, {0x2, 0x8772}}, {0x0, 0x200, {0x3, 0x2}}, {0x11, 0x1f, {0x3, 0x8dd}}, {0x9, 0x3, {0x1, 0x4}}, {0x40, 0x0, {0x2, 0x800}}, {0x401, 0x1, {0x1, 0x3}}, {0x8, 0x4, {0x2, 0x401}}, {0x101, 0x8, {0x0, 0x3}}, {0x1, 0x5, {0x1, 0xffff}}, {0x3, 0x5, {0x0, 0xfa24}}, {0x3, 0xac8, {0x3, 0xb016}}, {0x1b, 0x9, {0x2, 0x1}}, {0x2, 0x1, {0x2, 0x8}}, {0x5, 0x101, {0x2, 0x2}}, {0x3, 0x274, {0x3, 0x4af}}, {0xffff, 0x7, {0x2, 0x3af}}, {0xf800, 0x6, {0x0, 0x810}}, {0x7f2, 0x6, {0x3, 0x57}}, {0xddf, 0xa662, {0x1, 0xfffffff7}}, {0x1, 0x7, {0x0, 0x7}}, {0xff, 0x3, {0x2, 0x2a}}, {0x4849, 0x6, {0x3, 0x4}}, {0x2, 0x7, {0x2, 0x9}}, {0xda, 0xde84, {0x1, 0x1}}]}}}, {{0x254, 0x1, {{0x0, 0xffffffff}, 0x81, 0x7f, 0x1, 0x65bc, 0x19, 'syz1\x00', "6ee3319ecafb893d799065e585dcacb90aca8220df727d32f1265feca488ff1d", "584da3a166a78f16eb1a698212f0c8e915804b32d22f8210a8e1e5fe4c1827c3", [{0x1, 0x101, {0x0, 0x7f}}, {0x160e, 0x4, {0x0, 0x10000}}, {0x3, 0xf86c, {0x3, 0x6}}, {0x8, 0x8, {0x0, 0x9}}, {0x9, 0x1ff, {0x2, 0x7}}, {0x0, 0x3, {0x1, 0x8}}, {0x89, 0xc33, {0x1, 0x8}}, {0x29, 0x7fff, {0x0, 0xc0}}, {0x1, 0xadac, {0x1, 0x8001}}, {0x101, 0x0, {0x1}}, {0x8000, 0x4, {0x3, 0x9}}, {0xe5, 0x7, {0x2, 0x2}}, {0x8000, 0x800, {0x3, 0x3}}, {0x4, 0x0, {0x2, 0x7bcc}}, {0x4, 0x6, {0x3, 0x100}}, {0x9, 0x4, {0x1, 0x5}}, {0x7, 0x9, {0x3, 0x8000}}, {0x1, 0xffff, {0x0, 0xffff5287}}, {0x0, 0x8000, {0x2, 0x9}}, {0x9, 0x4, {0x2, 0x9}}, {0x6, 0x80, {0x2, 0x4}}, {0x3, 0x7, {0x1, 0x9}}, {0x5, 0x7, {0x2, 0x772e}}, {0x8, 0x88, {0x2, 0x200}}, {0x8, 0x0, {0x2, 0x28000}}, {0xe9f, 0x7fff, {0x0, 0x4}}, {0xff, 0x614, {0x2, 0xdca1}}, {0xdfa0, 0xff, {0x0, 0x1ff}}, {0x9, 0x4, {0x0, 0xd90}}, {0x0, 0x81, {0x0, 0x9}}, {0x7, 0x5}, {0x7, 0xfff, {0x1, 0x200}}, {0x0, 0x0, {0x2, 0x1}}, {0x800, 0xef, {0x2, 0x400}}, {0xff7f, 0x2, {0x2, 0x8}}, {0x20, 0x20, {0x1, 0x3}}, {0x8630, 0x2, {0x0, 0x1f}}, {0x6, 0x400, {0x0, 0x80000001}}, {0x1ff, 0x1, {0x2, 0x7}}, {0x1, 0x5, {0x1, 0x38}}]}}}]}, 0x1060}, 0x1, 0x0, 0x0, 0x4045004}, 0x20000810) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="c6cc2294b318dfa0e96d4c9f1c0e2c128f280000000706010200001001000000050001000700100009000200730000000000b777c2941f38266205a0de5c9f7f04463bc31b828f62325b3dd83413606978f7315bfd95c7639f09b6a708458cfc0a502a823acdd4fe24d17398a1c32b8fdb93e5d74a28"], 0x28}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r3, r2, 0x0, 0x100000002) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, &(0x7f0000000180)={{0x1, 0x0, @identifier="422079df582ff157adf0719febb01a51"}}) 08:05:14 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x6c000000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:05:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f00000000c0)=[{&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f0000000000)=""/188, 0xbc}], 0x2) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f0000000100)={0x3, 'veth0_to_batadv\x00', {0xff}}) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0xa4ffffff, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 442.665645][T26136] IPVS: ftp: loaded support on port[0] = 21 08:05:14 executing program 4: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='memory.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r3, r2, 0x0, 0x100000002) [ 442.714513][T26133] IPVS: ftp: loaded support on port[0] = 21 08:05:14 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000100)=[0x5, 0xfff]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$netlink(0x10, 0x3, 0x0) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r3, r2, 0x0, 0x100000002) shmget(0x0, 0x1000, 0x8, &(0x7f000011b000/0x1000)=nil) 08:05:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0xf5ffffff, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 443.071224][ T26] audit: type=1804 audit(1586505914.823:233): pid=26179 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/868/cgroup.controllers" dev="sda1" ino=15953 res=1 08:05:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r4) getgroups(0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4]) mount$fuse(0x0, &(0x7f0000000040)='./bus/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x30040, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r5, @ANYBLOB="2c6d61785f726561643d3078303030303030303030300030303030332c686173682c66736e616d653d2c2c2c61707072616973652c6d61736b3d537359c6a499945481f9c0646f6e745f61707072616973652c88736e616d653d2f70d73cae21bf2d40ddcb16"]) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r6, 0x5441, 0x0) mmap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000180)={0x556, 0x800, 0x60, 0x400, 0xfffffbff, 0x20, 0x20, 0x2, {0x4, 0x2b, 0x1}, {0x96, 0x1f, 0x1}, {0xffffffff, 0x2}, {0xffff31ff}, 0x1, 0x50, 0x5, 0x5, 0x0, 0x3, 0xf5a, 0x400, 0x2d24, 0xfff, 0x8, 0x0, 0x24, 0x4, 0x2, 0x2}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000280)=0xffffffffffffff85) setuid(r7) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = socket$l2tp(0x2, 0x2, 0x73) accept4(r8, &(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000080)=0x80, 0x0) 08:05:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0xffffff9e, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x33) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x33) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) r2 = clone3(&(0x7f00000002c0)={0x8288800, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x29}, &(0x7f00000000c0)=""/182, 0xb6, &(0x7f0000000180)=""/77, &(0x7f0000000200)=[0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, r1, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x9}, 0x50) syz_open_procfs(r2, &(0x7f0000000340)='net/icmp6\x00') getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0xffffffa4, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 443.480081][T26205] IPVS: ftp: loaded support on port[0] = 21 08:05:15 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r4) getgroups(0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4]) mount$fuse(0x0, &(0x7f0000000040)='./bus/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x30040, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r5, @ANYBLOB="2c6d61785f726561643d3078303030303030303030300030303030332c686173682c66736e616d653d2c2c2c61707072616973652c6d61736b3d537359c6a499945481f9c0646f6e745f61707072616973652c88736e616d653d2f70d73cae21bf2d40ddcb16"]) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r6, 0x5441, 0x0) mmap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000180)={0x556, 0x800, 0x60, 0x400, 0xfffffbff, 0x20, 0x20, 0x2, {0x4, 0x2b, 0x1}, {0x96, 0x1f, 0x1}, {0xffffffff, 0x2}, {0xffff31ff}, 0x1, 0x50, 0x5, 0x5, 0x0, 0x3, 0xf5a, 0x400, 0x2d24, 0xfff, 0x8, 0x0, 0x24, 0x4, 0x2, 0x2}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000280)=0xffffffffffffff85) setuid(r7) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = socket$l2tp(0x2, 0x2, 0x73) accept4(r8, &(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000080)=0x80, 0x0) 08:05:15 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x74000000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:05:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0xfffffff5, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:15 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28811, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x24, 0x7, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0x7}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4008011}, 0x44041) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4068aea3, &(0x7f00000002c0)={0x0, 0x0, [0x154, 0x3, 0x2, 0xeb93]}) creat(&(0x7f0000000240)='./bus\x00', 0x8) sendmsg$IPSET_CMD_SWAP(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x6, 0x6, 0x401, 0x0, 0x0, {0x0, 0x0, 0xa}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x40040) sendfile(r2, r1, 0x0, 0x100000002) [ 443.726550][T26217] IPVS: ftp: loaded support on port[0] = 21 08:05:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r4) getgroups(0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4]) mount$fuse(0x0, &(0x7f0000000040)='./bus/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x30040, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r5, @ANYBLOB="2c6d61785f726561643d3078303030303030303030300030303030332c686173682c66736e616d653d2c2c2c61707072616973652c6d61736b3d537359c6a499945481f9c0646f6e745f61707072616973652c88736e616d653d2f70d73cae21bf2d40ddcb16"]) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r6, 0x5441, 0x0) mmap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000180)={0x556, 0x800, 0x60, 0x400, 0xfffffbff, 0x20, 0x20, 0x2, {0x4, 0x2b, 0x1}, {0x96, 0x1f, 0x1}, {0xffffffff, 0x2}, {0xffff31ff}, 0x1, 0x50, 0x5, 0x5, 0x0, 0x3, 0xf5a, 0x400, 0x2d24, 0xfff, 0x8, 0x0, 0x24, 0x4, 0x2, 0x2}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000280)=0xffffffffffffff85) setuid(r7) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$l2tp(0x2, 0x2, 0x73) [ 443.950971][ T26] audit: type=1804 audit(1586505915.703:234): pid=26255 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/869/cgroup.controllers" dev="sda1" ino=15905 res=1 08:05:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r4) getgroups(0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4]) mount$fuse(0x0, &(0x7f0000000040)='./bus/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x30040, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r5, @ANYBLOB="2c6d61785f726561643d3078303030303030303030300030303030332c686173682c66736e616d653d2c2c2c61707072616973652c6d61736b3d537359c6a499945481f9c0646f6e745f61707072616973652c88736e616d653d2f70d73cae21bf2d40ddcb16"]) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r6, 0x5441, 0x0) mmap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000180)={0x556, 0x800, 0x60, 0x400, 0xfffffbff, 0x20, 0x20, 0x2, {0x4, 0x2b, 0x1}, {0x96, 0x1f, 0x1}, {0xffffffff, 0x2}, {0xffff31ff}, 0x1, 0x50, 0x5, 0x5, 0x0, 0x3, 0xf5a, 0x400, 0x2d24, 0xfff, 0x8, 0x0, 0x24, 0x4, 0x2, 0x2}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000280)=0xffffffffffffff85) setuid(r7) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = socket$l2tp(0x2, 0x2, 0x73) accept4(r8, &(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000080)=0x80, 0x0) [ 444.214423][T26279] IPVS: ftp: loaded support on port[0] = 21 08:05:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 444.461731][T26286] IPVS: ftp: loaded support on port[0] = 21 08:05:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r4) getgroups(0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4]) mount$fuse(0x0, &(0x7f0000000040)='./bus/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x30040, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r5, @ANYBLOB="2c6d61785f726561643d3078303030303030303030300030303030332c686173682c66736e616d653d2c2c2c61707072616973652c6d61736b3d537359c6a499945481f9c0646f6e745f61707072616973652c88736e616d653d2f70d73cae21bf2d40ddcb16"]) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r6, 0x5441, 0x0) mmap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000180)={0x556, 0x800, 0x60, 0x400, 0xfffffbff, 0x20, 0x20, 0x2, {0x4, 0x2b, 0x1}, {0x96, 0x1f, 0x1}, {0xffffffff, 0x2}, {0xffff31ff}, 0x1, 0x50, 0x5, 0x5, 0x0, 0x3, 0xf5a, 0x400, 0x2d24, 0xfff, 0x8, 0x0, 0x24, 0x4, 0x2, 0x2}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000280)=0xffffffffffffff85) setuid(r7) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:16 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffeb, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:16 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={r1, 0xe, 0x1, 0x0, &(0x7f0000000280)=[0x0, 0x0, 0x0], 0x3}, 0x20) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.stat\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="280000ed0706030000000000000000000000010405000169317c24d1070000000900020073797a30000000004f9ef3093b35805a86a39e1da9db81a31b9bce4949e63a44c6743b35ee09a7a348e38d1fce766bbd80608ae87140043447bb34803da37c77d8b1c829beed486c86a7a9e08600cf1ce09578508965196b352c240465b53ac5fb"], 0x28}}, 0x20000000) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r4, 0x40485404, &(0x7f0000000140)={{0x3, 0x0, 0xec1, 0x2}, 0x100000000005, 0x9}) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nvram\x00', 0x288181, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$TIOCGICOUNT(r5, 0x545d, 0x0) openat$smackfs_netlabel(0xffffffffffffff9c, &(0x7f0000000240)='/sys/fs/smackfs/netlabel\x00', 0x2, 0x0) r6 = socket$netlink(0x10, 0x3, 0x8) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r3, r2, 0x0, 0x100000002) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 08:05:16 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x7a000000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:05:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 444.822460][T26330] IPVS: ftp: loaded support on port[0] = 21 08:05:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r4) getgroups(0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4]) mount$fuse(0x0, &(0x7f0000000040)='./bus/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x30040, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r5, @ANYBLOB="2c6d61785f726561643d3078303030303030303030300030303030332c686173682c66736e616d653d2c2c2c61707072616973652c6d61736b3d537359c6a499945481f9c0646f6e745f61707072616973652c88736e616d653d2f70d73cae21bf2d40ddcb16"]) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r6, 0x5441, 0x0) mmap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000180)={0x556, 0x800, 0x60, 0x400, 0xfffffbff, 0x20, 0x20, 0x2, {0x4, 0x2b, 0x1}, {0x96, 0x1f, 0x1}, {0xffffffff, 0x2}, {0xffff31ff}, 0x1, 0x50, 0x5, 0x5, 0x0, 0x3, 0xf5a, 0x400, 0x2d24, 0xfff, 0x8, 0x0, 0x24, 0x4, 0x2, 0x2}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000280)=0xffffffffffffff85) setuid(r7) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = socket$l2tp(0x2, 0x2, 0x73) accept4(r8, &(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000080)=0x80, 0x0) 08:05:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:16 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) sync_file_range(0xffffffffffffffff, 0x6, 0x800, 0x5) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) [ 445.149842][T26363] IPVS: ftp: loaded support on port[0] = 21 [ 445.162155][ T26] audit: type=1804 audit(1586505916.913:235): pid=26378 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/871/cgroup.controllers" dev="sda1" ino=16225 res=1 08:05:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r4) getgroups(0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4]) mount$fuse(0x0, &(0x7f0000000040)='./bus/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x30040, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r5, @ANYBLOB="2c6d61785f726561643d3078303030303030303030300030303030332c686173682c66736e616d653d2c2c2c61707072616973652c6d61736b3d537359c6a499945481f9c0646f6e745f61707072616973652c88736e616d653d2f70d73cae21bf2d40ddcb16"]) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r6, 0x5441, 0x0) mmap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000180)={0x556, 0x800, 0x60, 0x400, 0xfffffbff, 0x20, 0x20, 0x2, {0x4, 0x2b, 0x1}, {0x96, 0x1f, 0x1}, {0xffffffff, 0x2}, {0xffff31ff}, 0x1, 0x50, 0x5, 0x5, 0x0, 0x3, 0xf5a, 0x400, 0x2d24, 0xfff, 0x8, 0x0, 0x24, 0x4, 0x2, 0x2}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000280)=0xffffffffffffff85) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:17 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x24, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x7}]}, 0x24}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) setsockopt$ax25_SO_BINDTODEVICE(r4, 0x101, 0x19, &(0x7f0000000100)=@rose={'rose', 0x0}, 0x10) sendfile(r2, r1, 0x0, 0x100000002) 08:05:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 445.518547][T26396] IPVS: ftp: loaded support on port[0] = 21 [ 445.561134][ T26] audit: type=1804 audit(1586505917.313:236): pid=26422 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/872/cgroup.controllers" dev="sda1" ino=16177 res=1 08:05:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r4) getgroups(0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4]) mount$fuse(0x0, &(0x7f0000000040)='./bus/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x30040, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r5, @ANYBLOB="2c6d61785f726561643d3078303030303030303030300030303030332c686173682c66736e616d653d2c2c2c61707072616973652c6d61736b3d537359c6a499945481f9c0646f6e745f61707072616973652c88736e616d653d2f70d73cae21bf2d40ddcb16"]) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r6, 0x5441, 0x0) mmap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000180)={0x556, 0x800, 0x60, 0x400, 0xfffffbff, 0x20, 0x20, 0x2, {0x4, 0x2b, 0x1}, {0x96, 0x1f, 0x1}, {0xffffffff, 0x2}, {0xffff31ff}, 0x1, 0x50, 0x5, 0x5, 0x0, 0x3, 0xf5a, 0x400, 0x2d24, 0xfff, 0x8, 0x0, 0x24, 0x4, 0x2, 0x2}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000280)=0xffffffffffffff85) setuid(r7) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$l2tp(0x2, 0x2, 0x73) 08:05:17 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:17 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:05:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 445.838872][T26435] IPVS: ftp: loaded support on port[0] = 21 08:05:17 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r3) getgroups(0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3]) mount$fuse(0x0, &(0x7f0000000040)='./bus/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x30040, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r4, @ANYBLOB="2c6d61785f726561643d3078303030303030303030300030303030332c686173682c66736e616d653d2c2c2c61707072616973652c6d61736b3d537359c6a499945481f9c0646f6e745f61707072616973652c88736e616d653d2f70d73cae21bf2d40ddcb16"]) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r5, 0x5441, 0x0) mmap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000180)={0x556, 0x800, 0x60, 0x400, 0xfffffbff, 0x20, 0x20, 0x2, {0x4, 0x2b, 0x1}, {0x96, 0x1f, 0x1}, {0xffffffff, 0x2}, {0xffff31ff}, 0x1, 0x50, 0x5, 0x5, 0x0, 0x3, 0xf5a, 0x400, 0x2d24, 0xfff, 0x8, 0x0, 0x24, 0x4, 0x2, 0x2}) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r4) getgroups(0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4]) mount$fuse(0x0, &(0x7f0000000040)='./bus/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x30040, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r5, @ANYBLOB="2c6d61785f726561643d3078303030303030303030300030303030332c686173682c66736e616d653d2c2c2c61707072616973652c6d61736b3d537359c6a499945481f9c0646f6e745f61707072616973652c88736e616d653d2f70d73cae21bf2d40ddcb16"]) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r6, 0x5441, 0x0) mmap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000180)={0x556, 0x800, 0x60, 0x400, 0xfffffbff, 0x20, 0x20, 0x2, {0x4, 0x2b, 0x1}, {0x96, 0x1f, 0x1}, {0xffffffff, 0x2}, {0xffff31ff}, 0x1, 0x50, 0x5, 0x5, 0x0, 0x3, 0xf5a, 0x400, 0x2d24, 0xfff, 0x8, 0x0, 0x24, 0x4, 0x2, 0x2}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000280)=0xffffffffffffff85) setuid(r7) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 446.204213][T26475] IPVS: ftp: loaded support on port[0] = 21 08:05:18 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) pwritev(r4, &(0x7f00000014c0)=[{&(0x7f0000000200)="5fa2a61b48c985a031092eb6c0f2385e512bc74561e984ffa5460f6a7c573d5c4811d76cd0aae478441ace771d8ad0d85dd18dbc3917dc014f77dc16b674c2ebe2271b1606b57cc3c90ea8c52b2342fc504648a75891b6e249aa672cc2bf6d6e6fc21a16859ef37f9ef17c6c42f7a7e17cab81129edcecfedc73952ef054a4d96905c0e108397adb4e431185941756cb5026cc10ff1d5fc797b25ec23649bd22d61df1dc7837fc9425c0f5254f8cd15bd25ddb5fb67a615618d39d957c7211e0bfaecc5951e91bc5e6b683d06f96a4d899303cec9cff6f5da24faccc8be32171d2a2c4a804e746576ed742361a611325b20f3f902e6549786a2d4d481419506b39888964c8f88de4e5dc1337d9dbae22b309651243da5657d2a94926ed3023a4b2321d760c7f2591e11fc7ef576f4b597644a72b1d89fca2fc786d22081559ac8dee87da403ff6e81abf56abd7b94b8353dc6f0286e45629028ec19a814309cbe8e0d7ca51ef9afbc6d3cb47db8cf13ca7de56b0a1478e053fb72ed4d9ac6706449ff84e1b81b999652f5dc5c68215b84b63b9bce5a03d5ced45e71884a5697a732e244fada4cd2ee2b459c6cd56c4ab14a433ed5ac52b4ab113f6ce1d0fda37b3f0121429c4ecf232eb9609d5ea1dbefffe8a29cae707bde4c64fc93bde5d6114ee5049ef2b42cab6a5a61a918387c885013f1e3d67d30c9d57df7d4638811144a2ce609e1c2cb53aad332bbde7055fdca1ee5e9720e993641a2cdbbb0dc8f222bb018761daa79995ac4532e6b6f4b3d3bd265f7b887c2c42919144a6ad4b2fd0996c5c370d03b0d7783d0e5c42e272f33b866bfc9fde9266d73f3653bb8baa26faf7b8cc0b8588323145818db9a15bf6af2639b3d6ee4042d63d489f18e8394d7f4b275a86bfd31f0d2f4b5ea985c5d7d25c3265f782091041461439896ef8df6679bf726264066a950b133bc6a1bac1bbd67ce0648716d84ae01c853bc4346d2ebbb98c4d44ca3b2d7f39c6c5f157e23503b0f016c2c865c71a865e7ac387c3bfe0936244c35501f54ce4e092a9ad87e0fe50674ef2d97d1567dc644ea65de576ddb7553afcf8cc927c2f091793546e1f0285dbff724489d742af9ecec8c50da8fa4048b2e6cf49e7ea9c7260e562225ea79e86d1384ae94279d0160827c75697652b47c2dfea0384c7aba6bad3fd3f0f2a9bc181866edd24c15227adae1cfb7d9f4f648a84c36f790f181102de3eb48b0c3b92226358317b5832b2b05d548e132632b9d967d0600ac695b7ea725f7df5aa68b05728bb4c8c303760b75612b45ead9c715ce09cc866ed1dcd850dc1d44f68ffa3c88b67952c2f8c574491899b9985276c7b5f4de9a492bca877786c13c4de5c001b5384826a0259e62dcb35f7db831f31aaaf28f8c38ce10974320fea7d7cc634a0a1b09be80dd0894a0c1ddbac30abf5347cd58ed7db353329fabb021964377c8184ad0bc361993ee44e464580332c49c7f2a43020e1179abb8dc7c398d2c4274f70ca9699b1267acfc1fa5073a896cac99ceeef8f5c0a549dd0adc895b6a3931ace7c41e2010ee327cb17a00e70c8b8ed37c01b114f7f392d0c8bbdeadb366f4d1de8de9b55cb26daf400fab6136e153abbf90477ae3fe9a7643111b473a2bb3605a961f14e6d42021a43f9ea51e276b407ff34899b8c7a432a494e3ac9a93c4fef4674089d41d8583033bbcc07340b2851bd98dbaebc46f8a08839c1d239fd5abba12427ec31d591b0c6ec5eeb39e3bfef7291b1b560026bf2a207530de917b4b3bf6a3fd8c66a776d1275643cee2898a70b45a6fc48962a04ced8b12811107c4a551f6ff36171f75d68e9bdd2f185c14cc0da8bfd275f2f3c317c493024420c90586c4ba63f915e435187a42b3509eaa571c0e27e91b8237c49db4ec410e5bca21a03576cc159fbfab624a54c0bdd8f129b0fbd110b25777c3a36a2934bc82b32c1985ec1ee4e02f21a33b72a24e9551d67d0c938c82b0c3c175fa1549a404d84a53b7e47c547106ebac877dfbb659a20082d299df42715ff595324861363fd22e424f6dcc33a295f26c7ed892e33c1135ec08320af43b697e4bfc80799566e808339f00e606da44d2e9c5ff48c12642b1baceabca31b47f12ebb96c69b900c7b3bffc1e91618587ea600b5f07f45f7507c26575ca54c77394161dd63e0b7b4ff3d377533538d28b3a0675ed9948d6fca34f9b22b9bd8e964702cc81ad30cd845ce2adce4e3552a65340cff6862cef135891cf92cb0b3c46d2ece036a60d5aa9b4059ceb307dcc54058f50cfab944629131f1de8d9fea53b6fccf88dcc98d623c1e5e715750f074bdc1ba6acedd13bbd063e179755baadbc9b6b2057c52735920b30181efb297ec068c8a08381e63dd3c743598889c6318be374f7e1a73d5341762eb2e37811cf32ca067c3ed3e009bbd3ef5747515f047b41c10a324f87b51a9f1fa154e478a38b7919ad2371dd4126785fae830f707d1d55fe21002afc2170d8d0dfa57ffa5368beb190d793d50970bafc59a4e645943a2cce1ca5e2ccf353dc584c49835fe7cabf40e68126f0808719818e6327a4c2eb0ed613a98d7ef4811ee5be5e3002d88af50cf1801fd93fc4ad780e03de64e48cd6c871ae97f1682b19fc8f4c0962820d6e2920af292f87cb6e1e656174931e093190a1e1d0a358fb7b1a0e440fe9748bba0baa279628bd92316a95b98b7802ca63a0aeb8e11eaa3133cae88b907baed2c515ade3a863d18cae1967f13a8d51435e2db4f181edb06f73fcba159e2975dcee2dd9b8af802e8cf2720fd3a5df8982d6342fb0fb669335c569cb762c317e361e8d43bc70d4e98b97abb32dd7a53c64f1733ef6c786b58b7a30342ae7707768b9ed6c2cb6749e3203bb6aaef7f15a58fde0f9f20dd3a737b30a5a15d898db96969b96af892ede393fd48a573dcec96606abd160268de898bab892646a01e9a5c4d4c55c6aa3c1b64bdd91889ff481eb66be795b492090e37499969f7563fccefce2178992f7667fed8f724990c0e616237c0f6eaa946f8b9ee561aaaa572e580fb78e3b3aa7a00c4b063cc8018e7fbb9e868d475863ad0a84ef38d3feee2e561b239734e5d021f2d2f36da386dcb271bfa55c43f1031d85924af4986f06e166d2beed6085d806c37e91e594144354e5a9e6aba65185a3e062e98784e2ad2b55ae8cd11d922713a963dcf12120c9fe19914ed518d3b676f4bbbfcaae475665953da1f6b0ed055a7ccec3b8cde118fc6addb1df035a09b61450c69ee2b0b724245f7a1fcde2178f8b171a51bb74ed041d57a0dde6374e497d58e1397ecfd14a327fb3df433d67b460e8594b91d4d71f4f93f5d4f0588c249a871b831182e35d309cf7860d3042915bdfde4e8ce5199e298d09980a46864b42c839c905a9888b956719fd365f3b1b891d2d48994f6d323d2e23510baa3f38cee1f9647ccaea0974b88006ad1088284a8282e30748d36af52e9cc23f365dfb4bef524f671618ea10aad054757388ce7b93f7ac793b8d00230774a0be13eed371ed8cd5e57d98cf1ee1540e41cf0f27e55af8a312fce5778f065d45c22c3c6857645c5881acdfacb32f4f328d7ca543151e23b1053ba899c3b2f293889e9d64de7988e956e766f5ea88a77a7e838886a88660aa44c23a49fa588f3b0b24854d44e4e2807dece313129aab5d4ecb20c9e1290c0f01140c463bb5aeaaa6c9e2f33e912c7423125c3fd92cf0228b64f6ce2855f1ba7b02dd4c5b1186f983e0d77a545639e42715b0a024c523b9213914bf7b27528106c462ee9241387a23b447d3d641af81b29b29130701f38fcbbf6be584ac8381f4715cd5703331eb4fcdb16bace41922686b359267d746166526accde8cb61abe027fc2f0d9cba4f0f09e3146d61059256c059d51fda95bfdb65c3eb1e882a44e773fd445d957e9b66a56c19acc483cc91f11b3b82b29d822ba25e2f3b5ad20fef6e5f416c687b9323909a3ad56012cc200c2d1f7c72a0531960a560e3605f1d0d9a4c4cafd1244dcc043778f9920de58ce1fd9fe88739accd32382eb121d613b147eb0cb4617fb430f532258590e3ba565789a183ddbc6f97ac245fb20259ea653c1eb71d8b0c038c952b0b1efef4d47b322701abd53154db9b6052917ea7e5590419ce07d59309f06f8292085c50d150e81ea56e46108ba78b78a8cc2f9d415689ba78a6fcd6e3d857d4066c903f9514e7ce9d6277b93f1b826f0d4b7b32961772096f2f616f505cfb61ef961284674568b391962799e0ae3a257c218ab9aed1c3f28703433ba16a0aae82dd17fc971fd18d720cedac2babfeddb69c3fa79b05756c106a1f84dcb889ad9a1e9d9a3915f8487ffc3cbcf106ac5f05decd1c8bf7ad1c4026e1135e770834174e6046449a96696b3df3ef760ccb2c1cc3e23510e262597c9635ccfbd8f9aa9f931d7a67b080f4ae3c03940d30d6385733b951f8e5fef14d547671450e2500f2d94aeba0c1cc31f93fb5058a97052bc3818f9939a6a57c215a2b004c7950e8b547840f25d24c273c68a322d1d5113963bb146b61f55d2e5a5b1cf0b7559a7ea739e8a3c053b2c983a5a72f6258df160c6c5e5aaaa7f23429aef9714d2ff30cb363756f59bbc8223e34432a808971baed16f8a39b2ba85745d2de91bda4e61dfbcdc10c6c3a0ad70998f6c2f750d5f0233f5099f1086ca6fda53ec8ebe95d6a7aaaa56210064b17c3e7a025e9f35547866570397a611217560ca68bbc0af9c0cc76e46f635c51823c2abca0fec43ae342af78b52db887eac6f0ac8f462b78e4d8d157bed7120daddc3f33c7f89e2728e5ea651d59c61fd25106b796c79dcb110db7567571f5130e7dcff4d99aa5a395f4533867f94b1e18d1da6402c18ede7e15659f75161b944554b893d7dd7eb18fa9e72d97b07dbd58ebadd86753d70746bf04aeceb1c97efea238178c885379fa30a983c3190c6269d71ea1aaabf773da34fb5132c5dccef3dffee05e4ce880559e220b6ab85dc5962a03c75d1af01c13b34967c9f4734a5dc59be35a49391d8eda2b5b1262e5e4838df67fdaab4f24ec5cb36ef5aed8d70a19755e7de46e586aa5f5dd4b79821fba373556f082d56544eda8e9d78ee314a3bd7d969729f62075e257208341275ee8957f665e0b0962cdc06aac0fc50f35f9e7a49cc83b34f92f711888f2b44c7e2e07fbb40080723bc14773749e23421e9fde9dc3a8ad73fcd0ffdad3d26d2f1153355ee3534092e9cad454997cf28fa47946c5b9da1f9cbaeb41f7aab067887510db9a758fa0c7194112b751955841625b84ef31e5983a1f6e7a685697b4b0cacc5328a95c8abd646cc37b952494d53e6ba99c142c41b123376bb4848ae97b48f05e0b0f2cc7adc1459d2221313d048501fecd36a9223c298fced7a4d9cf51a194b8d29caaafd3b7b4b8b2df1b6615bf78292525d2237a653148bb1e199d910d00a912e6ab9dd77b0bce2b5526f741b44dee8a5fe789f480525bd64c8503374a6a868c0f543c00042c33b3538ccd5c0e58718c326dbed0f985fd10f49d1831a633af267d88b1889f73ca267aa9090f544215b8119e03e5c9c226b7bcff0f456964ac75198fa39734b957d43a372eceb14d8de1ffe2277b863c7a4d09c7358a6a6b79f354fff5887183cca9a671d2652651401f627e2dd7ffff3b77c4bb5b7823b3623c860973635b1d25c0edd89cc7cf389c57f233f23e4368bffbe38e6fb2fe00360daee5bb103f38ad0b29aaa67db0ada8e1d2d", 0x1000}, {&(0x7f0000000100)="d7b2cbab9e1befa5d60afd7348a803972d8946d9666933e4053ccc06f150e29cde86e4c85e817d88f9696dadfd1d9a7549a2c99fde3e66c94ed0f996133842e2d093dd9861d74ccd7de51b5d76ad7a608439bc3a040f84d85000669e6488d498ede579ec5c672a1df8c5ef166edbcd3bd56496c06a375ff3bcfb90d9451f709e345799761f43b18c99b776cb8a473692aa76", 0x92}, {&(0x7f0000001200)="be213f926d2431c3385d40d170078678b6e8db746bce4400aeb9a494697165cdec67b84520016bb8034feb7e29c559c6ace50833e4d041fe2e059a93772b005f80d7a07f25135d5237d70444af7f9a35af7ae1af4977fbb32c6dbf927bd5978d61e142c44d5efe7ce72660b813047bb81231b9e9c482e7173a3b4da30328e4012331155d25fe1bcccc49f97fd40eb054b175e0aa37c661ce9c262869163f3612acd56442932ab071182fceeb05eb124d76f3f5ce2e80eb638d15563ba2b5f0ac31209ded6ab885f09a6f125d71b409d6f92a9e23de29314962c350e479126ba3bec222a08a174c39a58121506116775944482f", 0xf3}, {&(0x7f0000001300)="fa932296205b170cece6935ef56a815c75432a903cb868db7a5a2632c8e7fa2e197484389f040da63f", 0x29}, {&(0x7f0000001340)="cd638c2ff41fedbe51036679ba375107cbf23787d9f6d08d472821916fe957a2292a8f66ea223c8ba2bdfff2faf154d76dea4776ab588bab2299c2f3220d219a8fba8d68751d2be5d187374c710be60887f96382aefed46f3f9c82ae6c99df6597ceeabaaac9f5b93b405a80749ab8a56d4c81ed5eb3", 0x76}, {&(0x7f00000013c0)="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", 0xfa}], 0x6, 0x100) sendfile(r2, r1, 0x0, 0x100000002) 08:05:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 446.455833][ T26] audit: type=1804 audit(1586505918.203:237): pid=26507 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/873/cgroup.controllers" dev="sda1" ino=16033 res=1 [ 446.460572][T26489] IPVS: ftp: loaded support on port[0] = 21 08:05:18 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r2) getgroups(0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2]) mount$fuse(0x0, &(0x7f0000000040)='./bus/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x30040, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB="2c6d61785f726561643d3078303030303030303030300030303030332c686173682c66736e616d653d2c2c2c61707072616973652c6d61736b3d537359c6a499945481f9c0646f6e745f61707072616973652c88736e616d653d2f70d73cae21bf2d40ddcb16"]) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r4, 0x5441, 0x0) mmap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:18 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xedc000000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:18 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x97ffffff, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:05:18 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) sendmsg$AUDIT_GET(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x10, 0x3e8, 0x4, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) [ 446.813954][T26522] IPVS: ftp: loaded support on port[0] = 21 08:05:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 446.986496][ T26] audit: type=1804 audit(1586505918.733:238): pid=26548 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/874/cgroup.controllers" dev="sda1" ino=16161 res=1 08:05:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r4) getgroups(0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4]) mount$fuse(0x0, &(0x7f0000000040)='./bus/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x30040, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r5, @ANYBLOB="2c6d61785f726561643d3078303030303030303030300030303030332c686173682c66736e616d653d2c2c2c61707072616973652c6d61736b3d537359c6a499945481f9c0646f6e745f61707072616973652c88736e616d653d2f70d73cae21bf2d40ddcb16"]) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r6, 0x5441, 0x0) mmap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000180)={0x556, 0x800, 0x60, 0x400, 0xfffffbff, 0x20, 0x20, 0x2, {0x4, 0x2b, 0x1}, {0x96, 0x1f, 0x1}, {0xffffffff, 0x2}, {0xffff31ff}, 0x1, 0x50, 0x5, 0x5, 0x0, 0x3, 0xf5a, 0x400, 0x2d24, 0xfff, 0x8, 0x0, 0x24, 0x4, 0x2, 0x2}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000280)=0xffffffffffffff85) setuid(r7) 08:05:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x0}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:19 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r2) getgroups(0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2]) mount$fuse(0x0, &(0x7f0000000040)='./bus/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x30040, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB="2c6d61785f726561643d3078303030303030303030300030303030332c686173682c66736e616d653d2c2c2c61707072616973652c6d61736b3d537359c6a499945481f9c0646f6e745f61707072616973652c88736e616d653d2f70d73cae21bf2d40ddcb16"]) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r4, 0x5441, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:19 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) prctl$PR_GET_SECCOMP(0x15) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x80001, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000180)={{r2}, 0x100000000, 0x3, 0x5}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000706010200000f08000000000000000005000100070000000900020073797a3000000000"], 0x28}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r4, r3, 0x0, 0x100000002) write$smackfs_change_rule(r0, &(0x7f0000000100)={'md5sum(em1GPL', 0x20, 'syz0\x00', 0x20, 'wtl', 0x20, 'wtbl'}, 0x1d) 08:05:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r4) getgroups(0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4]) mount$fuse(0x0, &(0x7f0000000040)='./bus/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x30040, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r5, @ANYBLOB="2c6d61785f726561643d3078303030303030303030300030303030332c686173682c66736e616d653d2c2c2c61707072616973652c6d61736b3d537359c6a499945481f9c0646f6e745f61707072616973652c88736e616d653d2f70d73cae21bf2d40ddcb16"]) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r6, 0x5441, 0x0) mmap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000180)={0x556, 0x800, 0x60, 0x400, 0xfffffbff, 0x20, 0x20, 0x2, {0x4, 0x2b, 0x1}, {0x96, 0x1f, 0x1}, {0xffffffff, 0x2}, {0xffff31ff}, 0x1, 0x50, 0x5, 0x5, 0x0, 0x3, 0xf5a, 0x400, 0x2d24, 0xfff, 0x8, 0x0, 0x24, 0x4, 0x2, 0x2}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000280)=0xffffffffffffff85) 08:05:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2, 0x3f00}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 447.480290][T26592] IPVS: ftp: loaded support on port[0] = 21 [ 447.494178][ T26] audit: type=1804 audit(1586505919.243:239): pid=26591 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/875/cgroup.controllers" dev="sda1" ino=16177 res=1 08:05:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r3) getgroups(0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3]) mount$fuse(0x0, &(0x7f0000000040)='./bus/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x30040, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r4, @ANYBLOB="2c6d61785f726561643d3078303030303030303030300030303030332c686173682c66736e616d653d2c2c2c61707072616973652c6d61736b3d537359c6a499945481f9c0646f6e745f61707072616973652c88736e616d653d2f70d73cae21bf2d40ddcb16"]) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r5, 0x5441, 0x0) mmap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000280)=0xffffffffffffff85) 08:05:19 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:19 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x9a010000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:05:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2, 0x1000000}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r3) getgroups(0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3]) mount$fuse(0x0, &(0x7f0000000040)='./bus/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x30040, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r4, @ANYBLOB="2c6d61785f726561643d3078303030303030303030300030303030332c686173682c66736e616d653d2c2c2c61707072616973652c6d61736b3d537359c6a499945481f9c0646f6e745f61707072616973652c88736e616d653d2f70d73cae21bf2d40ddcb16"]) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r5, 0x5441, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000280)=0xffffffffffffff85) 08:05:19 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r2) getgroups(0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2]) mount$fuse(0x0, &(0x7f0000000040)='./bus/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x30040, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB="2c6d61785f726561643d3078303030303030303030300030303030332c686173682c66736e616d653d2c2c2c61707072616973652c6d61736b3d537359c6a499945481f9c0646f6e745f61707072616973652c88736e616d653d2f70d73cae21bf2d40ddcb16"]) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2, 0x3f000000}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:19 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x206100, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x12) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x28, 0x7, 0x6, 0x701, 0x0, 0x0, {0xa}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000040}, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) ioctl$VIDIOC_S_MODULATOR(r3, 0x40445637, &(0x7f0000000280)={0x7, "bd6c2d92af50f09ac3a42d7ea17a76b5bae441081712fde22bf1bfe2ba89d950", 0x8, 0x80000000, 0x9, 0x4, 0x7c9ed5d38488902e}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = accept$inet(r0, 0x0, &(0x7f0000000300)) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000340)={0x0, 0x7c7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f00000003c0)={r7, 0x7}, 0x8) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nvram\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r8, 0x84, 0x20, &(0x7f0000000200), &(0x7f0000000240)=0x4) sendfile(r4, r2, 0x0, 0x100000002) 08:05:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r3) getgroups(0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3]) mount$fuse(0x0, &(0x7f0000000040)='./bus/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x30040, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r4, @ANYBLOB="2c6d61785f726561643d3078303030303030303030300030303030332c686173682c66736e616d653d2c2c2c61707072616973652c6d61736b3d537359c6a499945481f9c0646f6e745f61707072616973652c88736e616d653d2f70d73cae21bf2d40ddcb16"]) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000280)=0xffffffffffffff85) 08:05:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2, 0x9effffff}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:20 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x3, 0x0, 0x0, {0x5, 0x0, 0x7}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) [ 448.221128][T26641] IPVS: ftp: loaded support on port[0] = 21 08:05:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r3) getgroups(0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3]) mount$fuse(0x0, &(0x7f0000000040)='./bus/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x30040, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r4, @ANYBLOB="2c6d61785f726561643d3078303030303030303030300030303030332c686173682c66736e616d653d2c2c2c61707072616973652c6d61736b3d537359c6a499945481f9c0646f6e745f61707072616973652c88736e616d653d2f70d73cae21bf2d40ddcb16"]) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000280)=0xffffffffffffff85) 08:05:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2, 0xa4ffffff}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 448.432232][ T26] audit: type=1804 audit(1586505920.183:240): pid=26656 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/877/cgroup.controllers" dev="sda1" ino=15889 res=1 08:05:20 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4000000000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r3) getgroups(0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3]) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000280)=0xffffffffffffff85) 08:05:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2, 0xf5ffffff}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:20 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r2) getgroups(0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2]) mount$fuse(0x0, &(0x7f0000000040)='./bus/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x30040, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB="2c6d61785f726561643d3078303030303030303030300030303030332c686173682c66736e616d653d2c2c2c61707072616973652c6d61736b3d537359c6a499945481f9c0646f6e745f61707072616973652c88736e616d653d2f70d73cae21bf2d40ddcb16"]) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:20 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="b91c65a9ac2340ad8afc07a890e045750942f4ae3d2ce9568637bfe8aa5a9bfdac6a9ce948c404bdcce37255c4d98cc8bfad52102a667b07aa8433a16ffba40e2e3bb5291ae894d26defcb756fddf441434e312c635d769036", @ANYRES64=r1, @ANYRES16=r1, @ANYRES32=r2], 0x67) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r4, r3, 0x0, 0x100000002) 08:05:20 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x9b010000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) [ 448.923237][ T26] audit: type=1804 audit(1586505920.673:241): pid=26697 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/878/cgroup.controllers" dev="sda1" ino=16161 res=1 08:05:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2, 0xffffff9e}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000280)=0xffffffffffffff85) 08:05:20 executing program 4: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 449.015957][T26698] IPVS: ftp: loaded support on port[0] = 21 08:05:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2, 0xffffffa4}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:21 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'L-', 0x1}, 0x16, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32=r1], 0x8) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r3, r2, 0x0, 0x100000002) 08:05:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000280)=0xffffffffffffff85) 08:05:21 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2, 0xfffffff5}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000280)=0xffffffffffffff85) 08:05:21 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r2) getgroups(0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2]) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:21 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) sendmsg$NFT_MSG_GETGEN(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x10, 0xa, 0x801, 0x0, 0x0, {0x0, 0x0, 0x1}, ["", ""]}, 0x14}}, 0x2004c014) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:05:21 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xb4840300, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:05:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000280)=0xffffffffffffff85) 08:05:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 449.999071][T26756] IPVS: ftp: loaded support on port[0] = 21 [ 450.005236][ T26] audit: type=1804 audit(1586505921.753:242): pid=26761 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/881/cgroup.controllers" dev="sda1" ino=16379 res=1 08:05:22 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4001e1a00, 0x1) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) ioctl$SOUND_MIXER_READ_RECMASK(r1, 0x80044dfd, &(0x7f0000000100)) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) ioctl$SNDCTL_DSP_GETFMTS(r3, 0x8004500b, &(0x7f0000000180)=0x400) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r4, r2, 0x0, 0x100000002) r6 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r6, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x8000, 0x0) ioctl$KDSKBMODE(r6, 0x4b45, &(0x7f0000000140)=0x2) 08:05:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000280)=0xffffffffffffff85) 08:05:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x3f00, 0x0, @remote}}}, 0x108) [ 450.455219][ T26] audit: type=1804 audit(1586505922.203:243): pid=26798 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/882/cgroup.controllers" dev="sda1" ino=16377 res=1 08:05:22 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r2) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 450.654887][T26802] IPVS: ftp: loaded support on port[0] = 21 08:05:22 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000280)=0xffffffffffffff85) 08:05:22 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000080)={r4, 0x0, 0x10}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000340)={r4, 0x1, 0x8, 0x9c6, 0x3, 0x9}, &(0x7f0000000380)=0x14) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NL80211_CMD_NEW_STATION(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x6c, 0x0, 0x1, 0x70bd2d, 0x25dfdbfe, {}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x1}, @NL80211_ATTR_MAC={0xa, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, @NL80211_ATTR_STA_WME={0x34, 0x81, [@NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x3}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x3}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x9c}, @NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x4}, @NL80211_STA_WME_MAX_SP={0x5}, @NL80211_STA_WME_UAPSD_QUEUES={0x5}]}, @NL80211_ATTR_STA_TX_POWER_SETTING={0x5, 0x113, 0x1}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7}]}, 0x6c}, 0x1, 0x0, 0x0, 0x2000c000}, 0x8004) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000100)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000140)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uinput\x00', 0x800, 0x0) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r5, r1, 0x0, 0x100000002) 08:05:22 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xc0ed0000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:05:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000280)=0xffffffffffffff85) 08:05:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x3f00, @remote}}}, 0x108) 08:05:22 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 451.119910][ T26] audit: type=1804 audit(1586505922.873:244): pid=26841 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/883/cgroup.controllers" dev="sda1" ino=16379 res=1 08:05:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x1000000, @remote}}}, 0x108) 08:05:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000280)=0xffffffffffffff85) [ 451.277121][T26850] IPVS: ftp: loaded support on port[0] = 21 08:05:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x3f000000, @remote}}}, 0x108) 08:05:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000280)=0xffffffffffffff85) 08:05:23 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:23 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) ioctl$MON_IOCH_MFLUSH(r1, 0x9208, 0x9) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {0x7}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r3, r2, 0x0, 0x100000002) 08:05:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000280)=0xffffffffffffff85) 08:05:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x9effffff, @remote}}}, 0x108) 08:05:23 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) socket(0x10, 0x2, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:23 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xc79c4d53, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:05:23 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00') sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0500000001000000df25110000000500290000000000020000000000000005b745e8401aa2dece17002f00007b000005002f0000004198000000000000000005000600000005002e0000000000050035000100000001000000070000004bbdf60d050000001cd4206fda0c2750"], 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x10) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r4, r3, 0x0, 0x100000002) accept4$inet(r3, &(0x7f0000000140)={0x2, 0x0, @multicast1}, &(0x7f0000000180)=0x10, 0x80000) 08:05:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0xa4ffffff, @remote}}}, 0x108) 08:05:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000280)=0xffffffffffffff85) [ 452.120967][T26900] IPVS: ftp: loaded support on port[0] = 21 [ 452.254704][ T26] audit: type=1804 audit(1586505924.003:245): pid=26912 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/885/cgroup.controllers" dev="sda1" ino=16129 res=1 08:05:24 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000280)=0xffffffffffffff85) 08:05:24 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000280)=0xffffffffffffff85) 08:05:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0xf5ffffff, @remote}}}, 0x108) 08:05:24 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:24 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) lsetxattr$security_evm(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.evm\x00', &(0x7f0000000200)=@v2={0x3, 0x1, 0x9, 0x9, 0x43, "9c4b03166fa052ec03ec168033dd18c33440f327690b92550f1ba5a0ab33f5bbf31d1eb8175762fd350db303092b8752d0fa8884fcd6bd86ed775b29d6f25438e57c5d"}, 0x4c, 0x1) 08:05:24 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000280)=0xffffffffffffff85) 08:05:24 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xebffffff, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) [ 453.317881][ T26] audit: type=1804 audit(1586505925.063:246): pid=26959 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/886/cgroup.controllers" dev="sda1" ino=16384 res=1 08:05:27 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) socket(0x10, 0x2, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0xffffff9e, @remote}}}, 0x108) 08:05:27 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000280)=0xffffffffffffff85) 08:05:27 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x3, 0x0, 0x0, {0x0, 0x0, 0x8}, [@IPSET_ATTR_FLAGS={0x8}, @IPSET_ATTR_FLAGS={0x0, 0x6, 0x1, 0x0, 0x10000}]}, 0x28}}, 0x40) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, 0x2, 0x6, 0x201, 0x0, 0x0, {0xc, 0x0, 0x6}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,port\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x22}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x8812) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:05:27 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:05:27 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:27 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000280)=0xffffffffffffff85) 08:05:28 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0xffffffa4, @remote}}}, 0x108) [ 456.227593][ T26] audit: type=1804 audit(1586505927.973:247): pid=27001 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/887/cgroup.controllers" dev="sda1" ino=16362 res=1 [ 456.241005][T27004] IPVS: ftp: loaded support on port[0] = 21 [ 456.270247][T27001] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 08:05:28 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000280)=0xffffffffffffff85) 08:05:28 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0xfffffff5, @remote}}}, 0x108) 08:05:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000280)) 08:05:28 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) write$tun(r1, &(0x7f0000000180)={@val={0x0, 0x9000}, @val={0x0, 0x80, 0x800, 0x800, 0x2, 0x400}, @arp=@ether_ipv4={0x1, 0x800, 0x6, 0x4, 0xa, @link_local, @dev={0xac, 0x14, 0x14, 0x44}, @dev={[], 0x41}, @empty}}, 0x2a) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) connect$nfc_llcp(r2, &(0x7f0000000100)={0x27, 0x1, 0x1, 0x7, 0x5, 0x40, "627d43db6addac6892e052a236495f92121d1377e7bdc9f4519cbc76090c408c734d392a5c2791f1b322842e6bc4f55c602623afb85945dcd93243efe9252f", 0x4}, 0x60) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r3, r2, 0x0, 0x100000002) prctl$PR_SET_FPEMU(0xa, 0x2) 08:05:28 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) socket(0x10, 0x2, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000280)) 08:05:28 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 456.818566][ T26] audit: type=1804 audit(1586505928.573:248): pid=27046 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/888/cgroup.controllers" dev="sda1" ino=16360 res=1 08:05:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 456.912200][T27053] IPVS: ftp: loaded support on port[0] = 21 08:05:28 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xf70a0000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:05:28 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:28 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), 0x0) 08:05:28 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x200, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) connect$pppoe(r1, &(0x7f0000000100)={0x18, 0x0, {0x1, @link_local, 'bond0\x00'}}, 0x1e) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) socket$nl_route(0x10, 0x3, 0x0) 08:05:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), 0x0) 08:05:29 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 457.388682][ T26] audit: type=1804 audit(1586505929.143:249): pid=27097 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/889/cgroup.controllers" dev="sda1" ino=16372 res=1 08:05:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), 0x0) [ 457.464224][T27098] IPVS: ftp: loaded support on port[0] = 21 08:05:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:29 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) socket(0x10, 0x2, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 457.779919][T27118] IPVS: ftp: loaded support on port[0] = 21 08:05:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:29 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xf80a0000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:05:29 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:29 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:29 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS32(r2, 0xc0245720, &(0x7f0000000280)) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) r5 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r5, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[@ANYRESHEX=r1, @ANYPTR64=&(0x7f0000000200)=ANY=[@ANYRESHEX=r3, @ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRESDEC, @ANYRESDEC=r4, @ANYBLOB="75d7363ae3c8a02d965bc2a1f3800596ceeaf4bfb93e8c962474d2a1cf92d0e09741b337f659804d88222980d5e4934cc092d21668df5e373ebe42bce37a8fa01957c4e4d91d036b756df228323af0af08f57164f2ec7b41c51d8acb68926bba431cae63a1f3de8b1d5e1b", @ANYRES32=r5, @ANYRES16=r1, @ANYRESHEX=r0], @ANYRESOCT=r1], @ANYRES16=0x0], 0x1c) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) r8 = socket$netlink(0x10, 0x3, 0x0) ioctl(r8, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r7, r6, 0x0, 0x100000002) 08:05:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:30 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) socket(0x10, 0x2, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 458.274693][ T26] audit: type=1804 audit(1586505930.023:250): pid=27172 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/890/cgroup.controllers" dev="sda1" ino=16381 res=1 08:05:30 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:30 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x1}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) [ 458.400767][T27175] IPVS: ftp: loaded support on port[0] = 21 [ 458.470070][T27179] IPVS: ftp: loaded support on port[0] = 21 08:05:30 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:30 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='pids.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000340)={0x108, 0x1, 0x1, 0x5, 0x0, 0x0, {0x5, 0x0, 0x4}, [@CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x1006}, @CTA_LABELS_MASK={0x10, 0x17, [0x0, 0xdad, 0x3ff]}, @CTA_PROTOINFO={0x58, 0x4, 0x0, 0x1, @CTA_PROTOINFO_DCCP={0x54, 0x2, 0x0, 0x1, [@CTA_PROTOINFO_DCCP_HANDSHAKE_SEQ={0xc, 0x3, 0x1, 0x0, 0x1}, @CTA_PROTOINFO_DCCP_ROLE={0x5, 0x2, 0xff}, @CTA_PROTOINFO_DCCP_HANDSHAKE_SEQ={0xc, 0x3, 0x1, 0x0, 0x1a}, @CTA_PROTOINFO_DCCP_HANDSHAKE_SEQ={0xc, 0x3, 0x1, 0x0, 0x6}, @CTA_PROTOINFO_DCCP_HANDSHAKE_SEQ={0xc, 0x3, 0x1, 0x0, 0x8}, @CTA_PROTOINFO_DCCP_ROLE={0x5, 0x2, 0x8}, @CTA_PROTOINFO_DCCP_ROLE={0x5, 0x2, 0x81}, @CTA_PROTOINFO_DCCP_STATE={0x5, 0x1, 0x3}]}}, @CTA_TUPLE_ORIG={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @rand_addr=0x8}}}]}, @CTA_LABELS={0xc, 0x16, 0x1, 0x0, [0x0, 0x2]}, @CTA_MARK_MASK={0x8, 0x15, 0x1, 0x0, 0x1}, @CTA_NAT_SRC={0x1c, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @broadcast}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @rand_addr=0x1}]}, @CTA_TUPLE_MASTER={0x24, 0xe, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x3b}}, {0x8, 0x2, @local}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}]}, 0x108}, 0x1, 0x0, 0x0, 0x200484c1}, 0x2000080) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0xc4, 0x17, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0x6}, [@NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x3}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_FLOWTABLE_HOOK={0x4c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'macvlan1\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}]}]}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}, 0xc4}, 0x1, 0x0, 0x0, 0x20004040}, 0x11) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:05:30 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:30 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:30 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xf9fdffff, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) [ 459.134449][T27241] IPVS: ftp: loaded support on port[0] = 21 08:05:31 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="280000000706010200000000000000839d48edf009565caa19fbf0a0df0e160000000088d46c1f0007000fef110431f64a547a3000000000"], 0x28}}, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) connect$rose(r2, &(0x7f0000000000)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x6, [@null, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x40) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) r4 = fcntl$dupfd(r0, 0x0, r3) openat$cgroup_ro(r4, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = socket$netlink(0x10, 0x3, 0x0) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") ioctl$PPPIOCSCOMPRESS(r3, 0x4010744d) sendfile(r5, r1, 0x0, 0x100000002) 08:05:31 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x800000000000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:31 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) socket(0x10, 0x2, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:31 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 459.381981][ T26] audit: type=1804 audit(1586505931.133:251): pid=27267 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/893/cgroup.controllers" dev="sda1" ino=16363 res=1 08:05:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 459.449883][T27271] IPVS: ftp: loaded support on port[0] = 21 [ 459.635241][T27281] IPVS: ftp: loaded support on port[0] = 21 08:05:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:31 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:31 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:31 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xfdfdffff, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) [ 460.175831][T27337] IPVS: ftp: loaded support on port[0] = 21 [ 460.202060][T27339] IPVS: ftp: loaded support on port[0] = 21 08:05:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:32 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote, 0x3f00}}}, 0x108) 08:05:32 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:32 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0xa20000, 0x10001, 0xd90, 0xffffffffffffffff, 0x0, &(0x7f0000000140)={0x9909e2, 0x3, [], @p_u8=&(0x7f0000000100)=0x3}}) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000000c0)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r4, &(0x7f00000002c0)={&(0x7f0000000140), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x14, r5, 0x2}, 0x14}}, 0x40) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x64, r5, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @broadcast}, @NLBL_UNLABEL_A_SECCTX={0x2f, 0x7, 'system_u:object_r:devicekit_disk_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @rand_addr=0x7ff}]}, 0x64}, 0x1, 0x0, 0x0, 0x4004410}, 0x44) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000002) 08:05:32 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote, 0x1000000}}}, 0x108) [ 460.779933][T27399] IPVS: ftp: loaded support on port[0] = 21 [ 460.910116][ T26] audit: type=1804 audit(1586505932.663:252): pid=27404 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/894/cgroup.controllers" dev="sda1" ino=16381 res=1 [ 460.927942][T27406] IPVS: ftp: loaded support on port[0] = 21 08:05:32 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000009000/0x1000)=nil, 0x1000, 0x200000a, 0x10, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:05:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote, 0x3f000000}}}, 0x108) 08:05:32 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:33 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xfdffffff, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:05:33 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote, 0x9effffff}}}, 0x108) 08:05:33 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 461.439496][T27463] IPVS: ftp: loaded support on port[0] = 21 08:05:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote, 0xa4ffffff}}}, 0x108) [ 461.660271][T27480] IPVS: ftp: loaded support on port[0] = 21 08:05:33 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote, 0xf5ffffff}}}, 0x108) [ 461.941576][T27511] IPVS: ftp: loaded support on port[0] = 21 08:05:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote, 0xffffff9e}}}, 0x108) [ 462.119410][ T26] audit: type=1804 audit(1586505933.873:253): pid=27460 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/895/cgroup.controllers" dev="sda1" ino=16382 res=1 08:05:33 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 462.240907][ T26] audit: type=1804 audit(1586505933.873:254): pid=27468 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/895/cgroup.controllers" dev="sda1" ino=16382 res=1 [ 462.384188][T27562] IPVS: ftp: loaded support on port[0] = 21 08:05:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote, 0xffffffa4}}}, 0x108) 08:05:34 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:34 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xb00000000000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:34 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xfffffdf9, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) [ 462.414010][ T26] audit: type=1804 audit(1586505934.153:255): pid=27535 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/895/cgroup.controllers" dev="sda1" ino=16382 res=1 08:05:34 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="280000000706010200000000000000000000fc0009000200d001696a9556fd48ce73797a30fb0d3c6b205e3581c6ba5faa9ca8853bf153374b95c646ea93b39ea1519e1d4fbcd3918ce7d9761c71ce77fb679736b9a0c8ce5058ab8f612c0dbab3dbf35f5a6f8a0e50f2d22f4800ab40212c89a4536188421dc83c5b690b4e0674160c29f2b0fe47dcf84db01dc996888129ab21c5ca1220"], 0x28}, 0x1, 0x0, 0x0, 0x44801}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r5 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r5, 0x0) connect$llc(r5, &(0x7f0000000280)={0x1a, 0x308, 0x7, 0x3, 0xba, 0x81, @broadcast}, 0x10) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) ioctl$EVIOCGLED(r4, 0x80404519, &(0x7f0000000200)=""/88) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x111080, 0x40) r7 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r7, 0x0) ioctl$SOUND_OLD_MIXER_INFO(r7, 0x80304d65, &(0x7f0000000180)) ioctl$SIOCAX25OPTRT(r6, 0x89e7, &(0x7f0000000140)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2, 0x56}) sendfile(r2, r1, 0x0, 0x100000002) [ 462.582692][ T26] audit: type=1804 audit(1586505934.333:256): pid=27575 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/896/cgroup.controllers" dev="sda1" ino=16382 res=1 [ 462.622427][T27579] IPVS: ftp: loaded support on port[0] = 21 08:05:34 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote, 0xfffffff5}}}, 0x108) 08:05:34 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 462.927594][T27616] IPVS: ftp: loaded support on port[0] = 21 08:05:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x3) [ 463.085913][T27627] IPVS: ftp: loaded support on port[0] = 21 08:05:34 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x20000248) 08:05:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 463.406235][T27663] IPVS: ftp: loaded support on port[0] = 21 08:05:35 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:35 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xc00000000000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:35 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="d57fc8d3b5a78ca942f112"], 0x3}}, 0x0) sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80200008}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0xd4, r2, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x88, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xd58}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1f}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xde}, @TIPC_NLA_SOCK_CON={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0xd1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8001}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x101}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x100}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x32}]}]}, @TIPC_NLA_MEDIA={0x30, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x4080}, 0x40048084) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x24, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x95}]}, 0x24}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r6, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r6, 0xc058560f, &(0x7f00000003c0)={0x1, 0xc, 0x4, 0x200000, 0x3, {r7, r8/1000+30000}, {0x5, 0x2, 0x4, 0xff, 0x40, 0x6, "5a085eac"}, 0x3ff, 0x4, @fd, 0x3, 0x0, r3}) write$P9_RRENAME(r9, &(0x7f0000000440)={0x7, 0x15, 0x1}, 0x7) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") setxattr$trusted_overlay_opaque(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='trusted.overlay.opaque\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) sendfile(r4, r3, 0x0, 0x100000002) 08:05:35 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xfffffdfd, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) [ 463.626229][T27699] IPVS: ftp: loaded support on port[0] = 21 [ 463.655519][ T26] audit: type=1804 audit(1586505935.403:257): pid=27697 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/897/cgroup.controllers" dev="sda1" ino=15712 res=1 08:05:35 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000100)) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000080)={r4, 0x0, 0x10}, &(0x7f00000000c0)=0x18) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000000)={r4, 0x7fff}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r5, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:35 executing program 2: open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x10002) accept4$tipc(r3, &(0x7f0000000080)=@name, &(0x7f00000000c0)=0x10, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2, 0x3}}, {{0xa, 0xffff, 0x0, @remote}}}, 0x108) [ 464.032401][T27737] IPVS: ftp: loaded support on port[0] = 21 [ 464.188195][T27749] IPVS: ftp: loaded support on port[0] = 21 08:05:36 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fallocate(r0, 0x14, 0x89, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x4e24, 0x0, @remote}}}, 0x108) [ 464.368073][ T26] audit: type=1804 audit(1586505936.113:258): pid=27710 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/897/cgroup.controllers" dev="sda1" ino=15712 res=1 08:05:36 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:05:36 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xd00000000000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:36 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:36 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xffffff7f, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:05:36 executing program 2: open(0x0, 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 464.665606][ T26] audit: type=1804 audit(1586505936.413:259): pid=27802 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/898/cgroup.controllers" dev="sda1" ino=16360 res=1 08:05:36 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f00000000c0)={0x5, 0x4, 0xe719, 0x81, 0x7fffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x202, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000080)=0x6, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x33) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r5, 0x0, 0x0) fcntl$lock(r4, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x100000001, 0x400, r5}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x7, 0x2, {{0xb, '\xc2bdev@,/%!:'}}}, 0x18) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r6, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 464.770813][T27811] IPVS: ftp: loaded support on port[0] = 21 [ 464.823201][T27813] IPVS: ftp: loaded support on port[0] = 21 08:05:36 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:36 executing program 2: open(0x0, 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:37 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="280000000706010200000000000000000000000005000100070000000900020073797a3000000000cf4d5cca1226d9ecc70b96b993af436767265b08fb8d47a289c90d1204a3e2000c106a78e74156acf6a9d2503950"], 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) ioctl$VIDIOC_ENUMINPUT(r2, 0xc050561a, &(0x7f00000002c0)={0x7, "e0c0069cf3a9d54e0eff8ec3ee914fe91c88743e8f96b1893670041335314511", 0x1, 0x1, 0x5, 0x40, 0x400, 0x4}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r6, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_AF={0x5}]}, 0x1c}}, 0x0) sendmsg$FOU_CMD_DEL(r4, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="ec000030ac6a8e741fd3eff468c3bd41bfdbd8708d2fd7f6f1310dec2cae25290d2fb4f9d79057", @ANYRES16=r6, @ANYBLOB="000426bd7000fbdbdf250200000005000400020000000800060000000000050002000a0000000800060000000000050002000a0000000400050008000600e0000001060001004e21000008000600000000ff14000700fe800000000000000000000000000013"], 0x6c}, 0x1, 0x0, 0x0, 0x8010}, 0x20000040) r7 = open(&(0x7f0000000080)='./bus\x00', 0x40057d642, 0x101) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r7, 0x0) sendfile(r7, r1, 0x0, 0x100000002) 08:05:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) ioctl$USBDEVFS_GETDRIVER(r3, 0x41045508, &(0x7f0000000280)={0xcf, "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"}) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 465.282612][T27857] IPVS: ftp: loaded support on port[0] = 21 08:05:37 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 465.464813][ T26] audit: type=1804 audit(1586505937.213:260): pid=27868 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/899/cgroup.controllers" dev="sda1" ino=16383 res=1 08:05:37 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:05:37 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xe00000000000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r2, 0x8982, &(0x7f0000000000)) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 465.625487][T27888] IPVS: ftp: loaded support on port[0] = 21 08:05:37 executing program 4: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcsu\x00', 0x26000, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r0, 0x4004ae8b, &(0x7f0000000180)={0x9, "71ff8bff3d1b73f0c1"}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r3, r2, 0x0, 0x100000002) r5 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r5, 0x0) mkdirat$cgroup(r5, &(0x7f0000000100)='syz0\x00', 0x1ff) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x501000, 0x0) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000200)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e23, 0xffff, @loopback, 0x8}}, 0x24) r7 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000580)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_LIST(r6, &(0x7f00000006c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f00000005c0)={0x94, r7, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast2}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast2}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:hald_acl_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x26, 0x7, 'system_u:object_r:auth_cache_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x94}, 0x1, 0x0, 0x0, 0x4000000}, 0x44800) 08:05:37 executing program 2: open(0x0, 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000080)={@dev={0xfe, 0x80, [], 0x8}, @mcast1, @mcast2, 0x6, 0x20, 0x8, 0x400, 0x7, 0x100004}) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 465.885683][ T26] audit: type=1804 audit(1586505937.633:261): pid=27918 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/900/cgroup.controllers" dev="sda1" ino=16383 res=1 [ 465.925552][T27922] IPVS: ftp: loaded support on port[0] = 21 08:05:37 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:38 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) ioctl(r2, 0x9, &(0x7f0000000100)="dd8b0c99cd8bb462c5c267645a05c042c1a43ec96c081c80bc5b3dad2ffb2c76fb58dc82e25f22f5aba32da4d7355072a2e7f25593175b208580c72469debe9c2871495aac4746fff7b556ba39ccb0fe4196eb2b56e276d5382bfd") r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r3, r1, 0x0, 0x100000002) 08:05:38 executing program 2: open(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 466.348943][T27958] IPVS: ftp: loaded support on port[0] = 21 08:05:38 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) write$binfmt_script(r2, &(0x7f0000000280)={'#! ', './bus', [{}, {}], 0xa, "7d737424a54074676f829630148e5cb41194efb0dcfafda1a399b2f0085e18d01ad9482e759325cec6f89701654eced206c2a0e6ae97a3ff69d776962249b33e6096e5f484a39c275b0a9516e1e1868ed19abc15b5117982f890abedd11d3455a2583a9af11911f8a8821bf440089043c2d796585b76df4cb9d336d6dbad533417b1577ce7ca8e96ec285e95b086f9712b"}, 0x9c) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 466.460111][ T26] audit: type=1804 audit(1586505938.213:262): pid=27968 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/901/cgroup.controllers" dev="sda1" ino=16382 res=1 [ 466.552049][T27973] IPVS: ftp: loaded support on port[0] = 21 08:05:38 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xffffff97, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:05:38 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:38 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000100)="175a27868eac9c0cb3f07541c9b0f9de2b21d2905db954c76d7bc7136dee2ead9fa4c099a4ef7ea0dd6af37deaecf292aca37e7a941646fb16d7fb1e371610640d4fed8bd7007a7295c01e7845be2950d6b43e299e0d229b1e46d3f2edb04e68625e3642d111fb9710", 0x69}], 0x1, &(0x7f0000000200)=[{0x100, 0x29, 0x6, "415bef8b83057b38f75b247037c67567efdde908521888770389f6ed1ebdb881164eaaf5ae501aa5a78c19b430b1df1cd63dba70720c6a692da657238e3b89658218837186d4299840324d3ef7ca3ddbe724f433362c3f398242a425b13bab554b1c252acecf154a83a2abc2646fc1132172cd9779d1aa99efddf2f73d725152383970be556a83714077f2ccd37303777e0030a0b182fdde65a6de13082cc6d508dee3b46b13d8ea170ad59097aee24ca3c23eff62678ac6deaf60bd54fcd9914a3e790256470a5b8118a0243d29a3f0062d7b2437b22c57dcd7bbfedcb76e20f90f31bb5351720f155a42"}, {0x90, 0x11, 0x11df, "9a57f168e26388dfc553a3b0e38908f888d2855eefc551cdfc9454128a8eb95ead37f14fe04242c0b97c7af89f2cd1b95c57d1ad6dc96d630afcf4040d4edbe2909839d3388b623722d1497480b02f432d1575cb2555d0c86bb1c8377d8f1668ba9e2c85ce9662c4ae474dbb9ec6b85133200b353321c48ea01aa7"}, {0x90, 0x30e, 0x63f, "33f59101a678dbd526dfaeeda7edf94a6e5b5400e390c2a62da10b0a7d13637aceaec85e72fb0f8c9858b13b73b44e34d75395fd6f8546625f401c98e92d6e523e6f7c76945b792c803559ab6705b2cb1b6f22b7b74bae8ddc75c1f431e2846a640a2cacffa6fd1d026ced407c1588bb00aa2dc0607e3f306cda9f1a3e178b0d"}, {0xe8, 0x76, 0x0, "90734aa09e1e6bfd247d26e1bcb4557a9af33e5d5521901196fa4b7bec098151d0e7f1be9d4444efcf7ca44987fa47f78370d0670e8080ad84142c11962cb8f734ceb3b686718c2ad5f3fb35863faeb699664415ca4147213fc9eeb537123995c9f89ada0bc2be61184165db248ada2bb265b645c5135877c63241e5b60d14732d4c056d6712fc2c9fb73626557f493419bc02dfb0e4b02f2f4f0fd019cbed8940cb24d71cfb5dfed7240f48f8c66395e857f0fc4e1e0f90269fbfa576a9ec35e9c6fc9dc1ad4b773b79b5429a70525768cdac6b"}, {0x70, 0x10e, 0xff, "6bb9d5071976c3d014c36a07a36d6bbfc3e6c9f64b8900d89313649e1d1fa2bf878e2bf651943bc9697ba3e40c39c8080b439fa17c75d969d9dceb47dacce610cdec654e73b064876edd50b0ced1bfad144d92e339379b3658b2df2c284d4deb"}, {0x20, 0x1, 0x6b5e876f, "be5c6c1434a87e79b635"}], 0x398}, 0x40) 08:05:38 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x90002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x808) sendmsg(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f00000000c0)="094b2c00cecc27615da30fb5b62e85c5167f26a94ad881aa8692c8d5f53f98b85a5101c0309c6cf4da016a2a31e86fbc9a92b40bc8d4c73512862ad469e788f81b0812", 0x43}, {&(0x7f0000000280)="2b3565110eefed015083c6c09cba5da0cfa38ea530e300572f0d3fb74d5c1009bd7c8704cc5311b692aad00b3b9858dfbdeaa7c56d509256db588a21faebcfe5c6bd45a62836cd128527ff6ed5e515d3a71914e794dc961a43ad939e862a9a110b3d75c5f7a06f2a785da39973bd1be7c502ec7ce39fee39dc22970e5623971e497230d90d974f391c41e94ba10a4e42ef1a06fc61e87f439ca671ffb0a3d4adf814a2", 0xa3}, {&(0x7f0000000340)="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", 0x1000}], 0x3, &(0x7f0000001380)=[{0xf8, 0x84, 0x7, "a9f22650b74105f54790bb441dc910291c53c45f3c1ea6687cefdd217b52d9c27fe611bab5c67f5e98f365fb5e5674c7a1a48fde07d4281d7c0809f812faf516bdbe4a7994d9f8aa9a463850804c6fd6a2fc869a26d29c8426ade6075d69c96d503d53e5983ce37d046cf877377c379ba6026e92f5cc28d8baa4b77632a6fa4f887bdf00a0e082817792cebfae9fe33af9cd9e8fa7a799f6de4ce5e533f54e8d075dc32dbb1889a3689e4ca1694d63d7867497885f8657b62e69f9b18d8cdb55a4a122a4597bb5b7c58b6f1f10deba73dfaaf8552b6f9a16cb422bff8cd75adb1c1224f98e3502"}], 0xf8}, 0x4000001) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:38 executing program 2: open(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 467.009318][T28032] IPVS: ftp: loaded support on port[0] = 21 08:05:38 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x18, 0x0, 0x7, {0x5}}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 467.170857][T28038] IPVS: ftp: loaded support on port[0] = 21 08:05:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) vmsplice(r3, &(0x7f00000004c0)=[{&(0x7f0000000080)="d9f30d6ff4bf888fd63d8814ee7e0aa85a7250886cce24411ef7c5c9d7260336f18108046b14e1d580e3b265c9d06e378cdf15e5900853ac4114fd552ebd3c976db8111db7788e35cb76cf3040d2481c37911052ae157981971ffddad9e7342b62001db02534c79e31a6f5b4eec744bb0b1b28efeefb276464a3f0f62c8e993f4c920b164a3e0bca6d63b5c641ee", 0x8e}, {&(0x7f0000000000)="0fb8278c03", 0x5}, {&(0x7f0000000280)="0a43256f833d27a39a9917155581317a204bdcbb63a7c8df4273eea27b8baeb4ab57960932940051a7df7978d1a19ad0fc52ed1294fd839c25bac8a1b852eeba8e6895220846", 0x46}, {&(0x7f0000000300)="2b7e6cdf9658ce42917be3efc0024938a07c82f3695ef4caa832c44438367d2ddee64dd29f6c7262d98461fb86bb6d1b52f882aa2b0269a5855cd1e4afc599fb37260ad106093372001b470fdef784bc4e9704a209362438677235fdba765a6d599da890fe8ea56293ace84a58c6963a87f39f0b34d3360cc45a3549355a140b6552e115b5a43a63e7e09d620c0375097e9486e575df5f2b365c3ecda124a2c8f21a590636aac3da6ae559771b7bf6caca62549b3bfc533db27b45fad2de79b3700c51911963e9a5fc7dd30aeb9b6f90f8c43138e47aa42002dba5b4e14985a56503250ed8ce48db2040b65d57659dbcfccefea9", 0xf4}, {&(0x7f0000000400)="87c36244309a2be7233d76a363733b767def032bc7a778ab71f1a16d11184ac7602ee2caaae0dc98eb7a8efd493a014849f31180408c9a8c104b3e3e0e72cbee30df2d98f7ecfd75da68332b10eefc2c3fe28633dbbdbadc0bacd140d8c815962f9320ce71212274781022fdad3a280423b78d161bacd14dae215ebd29b86dc6cf4af8363ad831b9a4a97bb328", 0x8d}], 0x5, 0x4) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:39 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x9}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:05:39 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:39 executing program 2: open(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 467.600681][ T26] kauditd_printk_skb: 1 callbacks suppressed [ 467.600691][ T26] audit: type=1804 audit(1586505939.353:264): pid=28086 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/903/cgroup.controllers" dev="sda1" ino=16379 res=1 [ 467.699396][T28097] IPVS: ftp: loaded support on port[0] = 21 08:05:39 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xffffffeb, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:05:39 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:39 executing program 2: open(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCRSACCEPT(r2, 0x89e3) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:39 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0xf000000, 0x6, 0x2, r4, 0x0, &(0x7f0000000140)={0x980910, 0x713, [], @p_u32=&(0x7f0000000100)=0x2}}) 08:05:39 executing program 2: open(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:39 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)={0x44, r2, 0x300, 0x70bd2d, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @local}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000020}, 0x8000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 468.173809][ T26] audit: type=1804 audit(1586505939.923:265): pid=28138 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/904/cgroup.controllers" dev="sda1" ino=16379 res=1 [ 468.221358][T28145] IPVS: ftp: loaded support on port[0] = 21 08:05:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r3, 0x80184153, &(0x7f0000000580)={0x0, &(0x7f0000000540)=[&(0x7f0000000080)="eba473c0dfa2db487a66aad3b2762b42c221c688b1e8392e78012c1b005e1c437f5c39bdd4a2ae1cd6c9671038ed4c789b1aaf48ccb02c0d14ea4c9bbd35e1eaa1088b3d3eb6420fc8f0c0290139884703dcfbce36f74587fad0ad141eadea911483f38cc466bea117d3274063c2a13a9033afe22d6c02518a", &(0x7f0000000280)="5b2fe1d8b43453244a863acd87c545ce98d7f32f9496e142457e4829259dbd2e24f2142203112b71471f96f64a4138951454a1150f7590c5fbae78c7bacf0c9805fa8d3138fbaad17cb10b9881c0fcc7c9b5c00e527f3530541f55c567f7cd922b1728dd02b4a5227d686ae116069b8bd19520440ffbd2e1dec33f5bdb862d0e9c766a421207ac827e2291fc38a4bdd95c4842d5499b6ab7bb1e0b9edb915292cfb57d1943dd2ff46bb53c3598bb0aa3fc5a4efd8084742e98e76c204bc8a1af94258a6a7483a5", &(0x7f0000000380)="df5969849040948ab4dd2bba649b0dc47b00899196eb09cbb978d0b33ba712e57cc072cf16da81879a5e61a2201458b3dfaccd976b2203da2126845fae3dc678e386ed28b941e15da96872511cc5e4371817f654accf34946209ce84956c6e0c37b3d7feba1a88eb9ef8822677e83d82058fbc3db65032b84f788b", &(0x7f0000000400)="2257d3b8785b7444337d1689fe9cfa0e05617843001167d6ae5850df8b78854ecaef3c5d8e06551d18c7f8d03929a14f502f527794ed218b7f22d25530eea13b980d4117ee9f8c75b76e06a7870bab286ebe9b4bb119cc74863fa31467fa9dc620951e2989db9cbdd9524ee97e902eb2cbb6fa4937a1ea70e16154ae6a620cf626311075298810bad29ec4c3ef8fcc45d5ac3dbaed556b8bcead03a0829f7a443de90cf66734644862340e7c9a963cec8f4c14f4c19fea17389ecb1a", &(0x7f00000004c0)="f5b606cfb67534a8a4105052bd4133a77bedf386f87039c37776c2474b71fe8f5b7b2747e107b77ead09bcdc65e6ca53cc64b49431848513d9c7737cb27b76b33c4ffb241d63e37d1913d4f2dfac3a2e8b2824a85dedb622cf741455cabd52c1", &(0x7f0000000000)="2fff0946df00ada288e4766cbbcbcc121862fb4c347a102ceafbe2659ae96fe7269db9cd8235df2137e2cac0b49ce911d5fce6fa389170459f3ea332dd27d9", &(0x7f0000000100)="0cade19629474ef6949c2bf1e6765a8621566ec8d40130519d23b3ab1b"]}) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:40 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:40 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") socket$key(0xf, 0x3, 0x2) sendfile(r2, r1, 0x0, 0x100000002) [ 468.462019][T28156] IPVS: ftp: loaded support on port[0] = 21 08:05:40 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 468.703170][T28179] IPVS: ftp: loaded support on port[0] = 21 [ 468.721876][ T26] audit: type=1804 audit(1586505940.473:266): pid=28184 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/905/cgroup.controllers" dev="sda1" ino=16371 res=1 08:05:40 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:05:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00') sendmsg$BATADV_CMD_SET_MESH(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)={0x1c, r4, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r4, 0x31a, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000010) 08:05:40 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1100000000000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:40 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:40 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x2c, 0x7, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0x8}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8080}, 0x40010) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) write$input_event(r4, &(0x7f0000000000)={{}, 0x1f, 0xa926, 0x472}, 0x18) sendfile(r2, r1, 0x0, 0x100000002) 08:05:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000280)={0x80000001, 0x3f, 0x724}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x100000001) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000080)={0x0, 0x8000}) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)=@can_newroute={0x2c, 0x18, 0x10, 0x70bd25, 0x25dfdbfe, {0x1d, 0x1, 0x3}, [@CGW_MOD_OR={0x15, 0x2, {{{0x1, 0x0, 0x0, 0x1}, 0x0, 0x2, 0x0, 0x0, "25e0163bc5527832"}, 0x4}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x80) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) pwritev(r3, &(0x7f00000006c0)=[{&(0x7f0000000400)="bbeb99bb9d99700a8293d1b3729c9859067eb7c319e2068379ef9c1b386e022eb65af0db6b312d6f4ece3628e2b1f2d3f851f2899c73b4d177e67216038e680dd9415bcef6e2997ef4fed61b6345e6315122d337d3b461f14a2eef28bbbbb93f56711995852822abfc443a01236f676fb7da694f277a7bebff7b0ba6d5079fc7f47e436ab1baddb9a2a55e7e3c0d788e0227b9c6ad1f78a5970322c60981f724588b1cd527ee3e07f2467887d834e55a7ef071faf374dd7b1f", 0xb9}, {&(0x7f00000004c0)="e8c6069144109d237c8a51e3f5480211ed47964e76ec6d14eec8ad5cb0c8615011d27e559c60c6bdeb4cc2c63ca11171868f24af1db673e87e08481ba341f3d00300a5bf7b84a03e8026116354080181f0d3f9e6", 0x54}, {&(0x7f0000000540)="da6b67d5ccac415dcdb7aff0250dcd3afae9918168c5bd2500ad5d5f26607b037307d285aae416127c084d4273367d7f292417e74a3eaf2333529705920fea8bbfafb6b1882ca23c581af0e519c9e5803b37506ea36f3ab3c9cf87957734519b1b277d13f7db8b3bb74a6369738484d96d80514670a845e416ec6cb2", 0x7c}, {&(0x7f00000005c0)="32338e7b3dd6a869723c8f2c9bcffc4229c2971f70a67763f29120612971127bf42fe744acace032caa39431361927fa06350ab68982285d0345d209f4bcaea2fe6a035c981ff4f9f6f065128363be10cb9045405a55ca77a8d7daba0c3a7d8928be9208fef4ac7656893c6fdac65377083338dfec52785a4d13f467d197ae43cfbdb29acaa0429398c6ea393188d48f8032e5ff78c4eb7404244ceee39db656517e7aeadd2b9bb2551118546d7a263c72f446ffe35dc3089a0908af8e8977b3775e34ad74ba1a4db7229e6251c17da8a6295920c1341bfd55", 0xd9}], 0x4, 0xffff) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r5 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r5, 0x0) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f00000003c0)={0x6, 0x8}) 08:05:40 executing program 2: open(0x0, 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:41 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 469.271777][ T26] audit: type=1804 audit(1586505941.023:267): pid=28242 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/906/cgroup.controllers" dev="sda1" ino=16376 res=1 [ 469.365329][T28247] IPVS: ftp: loaded support on port[0] = 21 08:05:41 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:41 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000100)={0x6}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$netlink(0x10, 0x3, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) sendmsg$NFULNL_MSG_CONFIG(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="34000000010401080000000000000000030000040500010003000000080004400000800008000440ffffffe0080000005407"], 0x34}}, 0x20004014) sendfile(r2, r1, 0x0, 0x100000002) 08:05:41 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 469.811296][ T26] audit: type=1804 audit(1586505941.563:268): pid=28279 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/907/cgroup.controllers" dev="sda1" ino=16371 res=1 08:05:41 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xfffffffd, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) [ 469.875883][T28278] IPVS: ftp: loaded support on port[0] = 21 08:05:41 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x1c, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:05:42 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x80000000000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:05:42 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1200000000000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) [ 470.960247][ T26] audit: type=1804 audit(1586505942.713:269): pid=28287 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/908/cgroup.controllers" dev="sda1" ino=16371 res=1 [ 471.092421][ T26] audit: type=1804 audit(1586505942.743:270): pid=28289 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/908/cgroup.controllers" dev="sda1" ino=16371 res=1 08:05:42 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@mpls_newroute={0x38, 0x18, 0xa22, 0x70bd29, 0x25dfdbfe, {0x1c, 0x80, 0x14, 0x38, 0xfc, 0x1, 0xc8, 0x0, 0x1400}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x9d}, @RTA_VIA={0x14, 0x12, {0x6, "37c52d8b7117bf232f6699494b92"}}]}, 0x38}, 0x1, 0x0, 0x0, 0x200460d5}, 0x0) r6 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r6, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000001e80)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000001f80)=0xe8) r8 = socket(0x10, 0x803, 0x0) r9 = socket(0x1, 0x803, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000003c80)={&(0x7f0000000040)=[0x10001, 0x101, 0x9, 0x5, 0x0, 0xa2, 0xfffffc00, 0xfffffffe, 0x80000000], 0x9, 0x800, 0x0, r2}) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000003c40)={0xa, {0x2, 0x81, 0xfb}}, 0xa) sendmsg$nl_route(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r10}, [@IFA_LOCAL={0x14, 0x2, @ipv4}, @IFA_ADDRESS={0x14, 0x1, @mcast2}]}, 0x40}}, 0x0) sendmmsg$inet(r2, &(0x7f0000003a00)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000280)="57a25c22d560fee8baed4844b18deeb63c61bc81277c910a233c3e12fa53fcdb876c7437d788ddbb2a84fb872b5e4ba871e17e19a881654da2f9713702270be10f877e9bf3806b1f139bc5f608bbefaec55c42489ac71dea23e782a7bfd5f81799e8d451a5e6ef40b916195a45d468bdcf5fd0b4d4755a068ff5d4eb6ccfda9ec72987907b4357f7d06c28314d340998fd40c34ce1df95ae704e21eff006ffe666da16b4761ba056282d80c1a6bcd3e4dfefaa3c269422c552e5547c15e69b1ad837fbdb6080004c586765c928ead8101200e6de34913006c80d188fa3f158061cdb8295517db51af92c6e13e5c9b19868ce4c01b28f8adb609e60c0397341b0364514f22cfb8aeecd14cfa4dffe877015ae9539c9053af6cb92b59e0e4c21600e73b58c9bf8ca8361c849bc8fb33f3800124ebce5b90faeb26eb253b2dbc6f6dbaf3d7e865534e251743de6babebdb57fe2e967cb09506d4f74721a421028a9fb6d74d0ce4285f731a70b1424cbf139c93249f7adad958a110562aa77f586c26768c60e82e6619d28b3afd00f94d88c0067c4214fd417877bec6ab8524bbd43e981588a96032776a6bff5056540339aca6c5aefbfee0e12009a32be5cb5c6b8d5ab51940882ea5525d6df9aafc0234d67806567d49e12a2274c5711e17e170c109a9419c5f35d9d72e976b737cff70c0ad0d25a0c6efa736be14f8aa10a6640a5f1b4348f358a6a577113d466ded0853792ab98f2774aa7155b06b0dd984161499e17f52704359347a9fb0b3caf7f811fa1456d5f7f4c430711be1db6b9fce02457fe7bf42d7317eb17d293b4aca37d1d2152c528eddec9f6211036bf04af1458db04bec8c9f20a5a98b824a731c7650ab8ef9c4d604da9346fb9066820a678a53d69207f8a69bf0e0d8d8e09c39ef8a4e6816f90e73304969aeab1f81a75e8147e03b7a2baf42b2340e2727341f9839f2bc9f252b4ee4a5d2966b5da5d58cc829fbe00d5ae2fc82919f57893c4729517a660260a6388794afac14c6a8a5fea77ee10e1aa2b96e30f507da445eb16154cd4e776f85ba1cdeb94d867bd36b65de620844976adc423a1eca2f64774ee462f502edac8b2fbdd50abee28bb02f9a8bc336e0b19f2c3a30e7a252f9ab6a853622f7c4b87570bfda060399ffd94b69b5da23697ea159a456f7625a3e7675164ae7159b10b7f08d3b54cd70c07f55cd9c331137ec0b3dcacddc6c5f0344675c5c3ed15cec403c0bd9d1037c770c891d6d8c0448b9518e3ae727e2b49baa858a78af3f94eda8f391b2dc1603f69cfb979a7e16408c4c4ca8578d480a46fb5d0f4cafde6cec1f32744a0965b25839cebf5f014fc9735d7ac1ff2693d8b80cb9621ffcb976cad6a3840ce8cc46d6d1986dafedeb5e20c6b00b12cfacad1e043175f513b1060b5c2b311cf7908cfef032e0097a55e7e791fd1488de1993ea7f1d180ca410f433885bfc5bed3abffab0d2dc4f281e5375cb30720b330469ee9de4f6128229b42aa2b94ebef658b06aeb2c2b8eef649423ee4f47de61717706ef5a1c06b30fd4305e5880527be01c6ae4ea8f75662a5e8e696ea5f45c9213dead77b946b6ec905f50b5af107e477a38876a8be63dae33cd2f9960767991c7377ef4ab1771e2ea40ae15bebc0309be202b6887dff886fed7b4da72532005515ec0d4dd79af9a68df5a38ec0a7890a3fa91fc929cfcfbcaf97b4fd82dd59ba02574a01f5ade0b14af78381e08eac70a6ab27433c5f69ec16f7172a464e5b1ace300b112ac0804e45c9406f974c16abc2ec552b2bde54f3b21aaaedd652b2ec7b11e986ce2b6098b033676a2f71f396739b00be53208941e5f1674de9dfb34c3ec31ea2456b52a7ef9ae52c511a757cb02849c9c74f3903456e400ea43b6d0ad1f2c5c80f8dd56d419de0b2e011bf7ed5a7245287e1ef7a73f0ca0829f2c9b4483b9d94d748843d6e9be2733a0b34f2dc40e48038c8da7ae2f8b9af686b2c13115930ca0aeee0256b93def63768a03819082d8aa853adb519b9a426ca61e5d48349541b37ef583a7a6c84215d710a0c5d0b49e61009ae786740d14f6c876c793f861ee48d17e49d80b257719b9314202bcbe920d9b6f26b4662db31f35ebaf62a4e04cfce2f58b7c7a631325708af9b849eea85b90c2588120994c6e86bccbb1b77bd4af628c422b5a542ef8e6cadd86f17fcdf77e328f8ce88df875d98af7f173e3221bd1fb7f5ef4f29a81b75a320b9584af8a1242035b45b9b97594ce5475cf440a81b026099b9082152dd1e433dfad521c55fb5eb54e7616f283fc2abfd26c678a51dc8f133b2f8b08fc7fd9ec86055686287582dbb9921a202266b51d2dbbb8f45a95a631c250e8ca59ecef733c1c31be9b90137236450885cdc4e8011a70eaaeef6d850f0bbfe41aa4d8962ac82d1f14c71999541201057e467269248f73486dd527fd3b46d739ac25750fe1001b62edc4767fa207079485fd934af88971b169a98f7e4967627bdc6f123fa9cf8e1d782ce579f4633154d5665585ec48791ecc21fb3b3b27db598546d72760c653b41e619c5e474ba69a3c5cce727b030ba18f28d589472f05109bf160a09562a3e826e80260cceec067970f6778f7151c56a75b8217266fff5ca32e370f8a833b2206b876ff612b463f6f8a4900abf4ee45cf0f1bf4d9c874ecc9e9933581e982684ccc6a709d6241946996f7a49dc8c7ef8adceda001c567e4ef41d9ce702fb24855695e25da98b661c31e00cd8c926868b2b768e6e79c14402696e9bcd55b8cc6131cfe553c4e186076a9d173eaae82066c994f6d703dc028491ef9c186f88dcb5bfa62cfab6ac2722032e84640f69328039cb288c66b44e707fc8796dc991c5a5bfee46adfd4f1b4d8827d7f87de64dfc0e71279119b3b836aac76f64bbcfd078fdcbce2b1af24f0504dcdaebb592831fcefefe63652612da3e58e108527c19dbf2a97fc4dad4cb82fd1ed00033a52f0d509ed9ded3741e38d179a51314103b4a2382dea9846f93bbb39eaf2b131ff1fc16944b92abb8f653846551697ad74bc3d4d319b71c2566d6293749b26f5dcb4841eb7d9cf8254ec2620e129a0335d67699d1ee0fb577f116a74003e344f63bcda059f57c17b1adb8fa4f2449d39e474cebe062e355da306c412b1999f31b31717ffac01905bc9116ce683bdf9e005182ed21c2b270257e05aafd416ef42b18215e1909491fc439ccc1d225b726d3851b3a3a024bf1b63dab4cce488b14d83bb39c973f3769fc91c59b128a847a4ed89a6ea80668b22a0a9c9ed05ab75bf056aeca7c9f82998e8d115c54daeaed6cc1606736f91fd3de6f72b37308699f6d92b473ea8e163a0192917421186df8157cb1dca83d2012e8c1749d29d76a9ba5fcfd6ad63590273907e8292514bc904f61d816db79bf4d145cbc1f6b8d029934f03e502c688ca86d2f25ec33409fddaee03ac968f74c89fe9fbfb8d99e84ebc89f4c2fba44540eaa4223f91738ab17f716a754104f08317aa7a65d8a5ae497b7fb373daa2eff6aa4a7ce06758438321aa0fd372603973d1f022b8549b1186c1df8fe50c722de09ef74732346e5436a18b06eb74177b2d585e06aadcdaaeedead5fb092c9a87c0c35b9a719e89b9e43e03a6d8282eb0318ef03fb63b250356c9bb5a12f657f0a45b5ae9c8c3ae9c93f37a51554f777552ec0b19140e0b9ea5320edfa2b8fc35fd4224eef3a2de0d1fb641351a2b9978c66564f1bb94c19955346118b23033957d4ca1f6b3c0d8e923a6c1ef9c938015083773f0bc40311ca4f146f30d6143fdee660ef9a140073e07eb310e3e7d0f1436173f02c43bc3374440dbc31d8a346cbc0a73771385eedb2942713c2ce0d64c8c4a166f6c1a8434ccb08f42d3ba0a3fac128cd2b0caef4d4bce37acf0b57624a24d07ad0064f27f495fd62e2e9b5c3fcbd8ce1653997e3b44d439491d03fd7d756fa051bb3262a293aa6e651c8adbe8e64823edabad1167e8d25f94b91f5acfe573da2fbd233818fba7552b967439bf0bfaa05d2649e92ef35be1ea2c3f118f030c4ba5999cda9ddf55759042f5e419619678c72636598dfbed93c27352edbb41611cd9bbd83b9f5aa3617b0e9e1f00188f71cea2d43d093e42be18034296ceb82df66bd3c96c4e983901be97668bb9ade11899b609feeff361075d666cf3412bd55d2a30e1c6a134e106783cd76e72c44f405654d5c2a2c89c1be98d916c358b4821cd59b10c9895891257e98039e8b02cc898f1cd665d49b2ce00a09b45ff00f1de4ed9799b18e09ad21cbfc73e30ab853f6660446ef05a375372c4ae1014dfb5c4b9a3fd81ccf7dec8fc34b1494e581991efe33ecd14121514d3a6118b6ef090b299b6514b6ae35895d36f5bff416a2fe0ba870576bb4aa5a7289e06bdad80fc2d58a1b15b7fe0d2dbc6e6ae5cf21dfa437dea07e1113f6a5c61145a611171cfad139400e54768c1e89cef0ddabe8e9cfb8e7845921fdd5e4a39a32d4e509f08cf37f9d7e793d2f99cc10e5b334b1a1317bf3f82660042128a670e1edbde95b90a2c97c198a411f230ba066292e08350c450dd0eeee657862620a3d65024d82940fbeb166f27d739b4ce19c126d9823d3ed58e229a203f5768aeeb79a54210241d84e932da0b4e80a5cb71f48934650feb8f8ee0b7a2f411990099cedb6447ea9803a2338ba33125fa610cf90acc1f533ce83f82c8bb1f790ae5ed1b0dd5987e88fe0a776389c4a157e88da04137717d737354a5ae97291b058688d580a19e71dcf11f8984b00b10d3c5c3fa4689765f0270f22ffca0441a1bf8dae41bc261be5c0ea04cba84bb9ddf68fbe043575995ad58b0b578ce29c86691ac39cdc02258bca8b1a06e9dc72279e0bddcdc5a5b3f65f571e2f6eaefb4d3c8f01fea365755c8b15c0a104555b7b2cd5ce2283d750e703062f15f9491b5b4a40cf42dd451a03a802918ae3989c90124cec2e668b449e7f3d0282fad6a9541b800b08fef0778a912aefa6132593115f0057723533328bdd38ed812dd7c55de1c286535b509b23a1c615581fc83fa99d5e7f8319fb39830fcd964d6544f4d1f87f2693e9614312086994c1b5e3421c0f47616f3be0251177abb60c4ad4c92b1f883d3af52294fcc4cfcefbe8f220b37c55db7163c36cdd84d358e79dee76e939873d40f163f4b08a66e73ecf47f0d0650ba243273ebf3ae3f3d6d60dc99d071758a774f33e81c2f53ba0c205c26bf9bd5fdab8b27f0030343be385ba9437e5b17e76b8a6d46788807a6cd52d7bdcb8bca775d01f8309ac3a2b94d1b5fbfb228c727ce039a0d222214314838b8667a42a3b1e7a2ac614d2ea2c5cb387b97c402a4420d1375717371d1cbb7bc029707664013440ba9f22f27d8a5150aa344e3a8140ed155b90c3d555595278c34dfbd0fe48ebb55b905de03172b503be972aa2b4dac382d09b8f4841c13388cbd8df41b29492942b0d34316aea9236c4ab5acd0bc6e2b6913e21fe5f0bd957c133df25e23fd0d08146214cf4b3db492a2a0bb0bd184292b6e26cec17a70c121bb04e1cfa0818ea02e797c234839373f0c6d89f2e36bb809caf264e1a8b6a0f7357df1c8ff25cbbec0b15b9f8409689359772c4614bb8e5d19a9dd0422cd32e866ca17341f123de500bc58f98a37a37d96f1c9b466be931f73b68c9973ff73c1d6fd8f2b14b76b155d3fba8ae2d9ba166280cd1bfeed7fa7c4f52de5e0432468ff9e11a4b0811e576ea4e778e3b4c2a2abc76ad0665ffd8", 0x1000}, {&(0x7f0000001280)="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", 0xfc}, {&(0x7f0000001380)="73cef2fb117aa5067533547b361e5bafdc36d99c0fe151a1283ded8b309d12bfcf9a09ef08fad12883d3812e48b48f0e497e3240758352179a52810f724082254b572c41bf0457d0eb91fcf6ff5831a7951550aeaa3cdaab923dfbbb7894a8ac991f5889c650542a569008d31eeebc7ffe9a35c70dc9923c0c8983d2be6cf81d37a73ded37c14a365134db2fb5c60f8078648abeff0af4b100eeaec947373582c020a9d42859e8c261653e759eae98ffcdfc8d631065a9870608075ccf72fe152a8fc9b0ad2e216c184fe4136934fcd908f0d48af2d20f57696fb861694a", 0xde}, {&(0x7f0000000000)="8fd7277d88", 0x5}, {&(0x7f0000001480)="06e2a714ac7505908e3179d82538d5968315e87f7824174dc2b2ed7010597c3a2084bca011c3806e0b726c32eae9c1a2bb9e3dad2e5ac4797475d0d92c502993da89643d86710d677dc7a4906e22def943c25829c504e2eda7826587047c3432e55a93f5e92ad09cda93786beac1ce7df1f7fbcea4882d549d527c0450428b26a28d5f2c6541207274a3c7d5872ffd70675e939c18645084e25d3160a924b979fb2a8cfccb81322cbdeb811b9636773113f279c13b69a647d5be1b635c62b16ccd51e7e130fb0081f76e37db57e07a8349ced1a0c0cc02", 0xd7}], 0x5, &(0x7f0000001580)=ANY=[@ANYBLOB="140000000000000000000000070000000001000000000000140000000000000000000000020000008000000000000000880000000000000000000000070000009404000044146d41ac1e010100000008ac14141804000000070773ac1414aa442cc220000000080000000000000073fffffffb0000000000000fff0000000200000001fffffc0000001000890badac1414bbe00000019404010000891797ac1414bbac1414aa7f000001ac1414aae00000024404be130001110000000000000000000000010000000000ff00000100000000000000000000001c000000000000000000000007000000070b5b7f0000017f00000100000000da14000000000000000000000033c13ecba7c198cb00000000110000000000000000000000010000000600000000000000140000000000000000000000020000000600"/336], 0x150}}, {{&(0x7f0000000100)={0x2, 0x4e23, @multicast1}, 0x10, &(0x7f00000019c0)=[{&(0x7f0000001700)="8369573e07f5ee6788c97b89dc9520da8134872f81360a8c1decc05d3fca9df6a81463f05ddd07b4e60310b17a990bced275806c3b8fd78ee526472436f35a03f2b823c8fb05e0ee1a46968e4ccda0dfd488c9c423274324f172bf91f1fa796e7c66d2a2dc818ccb0c9044033ce02b02a20bf480fa25ff3b4809ebcdbd5e70a5ef7e26c5091e98fbaa0e970eb3ea5ee85e601430c6bfcdfc", 0x98}, {&(0x7f00000017c0)="4433ed972fc5a4dd7ec9d7c8bd135ce107bb91471bf55a1dabdf057b4c87482d0f3036a911fa088fdcd292f2a0101a5d74efced9d9fe128fae7f854551796a446e4c8c8d8221f41ae485a9f5934bc06d4c0e1555511baad731e7f3a3668d0086f74f8da71ed16b954742e5130128d9965920379b0e1587ba99c92e977cc6b52ebcaa4f09c3a156bbb72df29e681fba0525adc4acfa2809be87aad6d83140e3cf91e3a757f650ee0bb6e36ca3ca07a661b0ca7dc9191f5615867967d231d5fc77928ecdc50f16afdfa93fa77011f592328b93b3da8007da87a3210c95d16fc5eda566cec569c0c4103323addb6fbb5dbe67c3379329be", 0xf6}, {&(0x7f00000018c0)="b7486f985a03d8a48ee9eabe593ac1d90eab3ba10d7e3b23c11306ed9cbdf958028e87898e188497a3f483", 0x2b}, {&(0x7f0000001900)="e92a5b363b1b03592c838e019b3465b0b9440516db97ec5f3741430005bb65d3f277759963799a4798a1764ad85a3967e85b292dd4d3fc2e64b1d0771c3f5e6e0ca28dafbf4b82d9b04e95ee1b7dc3c37c867e44", 0x54}, {&(0x7f0000001980)="4303ebbe8464d57173ddac059143c53ac3f453cc65cc6d6f63fd6b6afee5340f67e72cd37b7acfccdcbc7f45b6d1e3cf", 0x30}], 0x5, &(0x7f0000001a40)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x88}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x54d4}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xf8}}], 0x68}}, {{&(0x7f0000001ac0)={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000001e00)=[{&(0x7f0000001b00)="486e8d3d8fb18139a17ce4cbc5dfd77499356af2d4f3b54b69d9ad3926b6d887d7fc343c291200a46cc6aed3e07e38127223", 0x32}, {&(0x7f0000001b40)="22dc03a6a7c1b96ecf1e1456f820efadf5d8e971034942698025a009beef6ddcdb8fe1db160ea74c5bd32d45322c0ad59e0d069c352eb2cfc8dc92191ea6609ba8950d5cfe261468d07888a4681433b4b96faab28fdc9eccb3f020290ef6294357da8a7dada28396b4b168fd067f3b21b63b", 0x72}, {&(0x7f0000001bc0)="da0fd5da3c47770923ad752bd27cc4df551ae06cd1b9480133748110b504c4c767c96eae218b7f1d864c66d06ca86192f6ed60e19c0ab3bca1f63f55e442eebc832abf0ea523092693d4528376aeb08662", 0x51}, {&(0x7f0000001c40)="3b84703340a6d1cde3b881c90bcd96c39841f4bdf6e37ca19eb43aa1f89dde36b30b713982642244d3e234f89393ce180283c503ffd64b38d09bc00e11638e88b472eb873b56b15d6208983782a9073d8f3efb736574a72f20bd5837b931bd0f63dcb963", 0x64}, {&(0x7f0000001cc0)="38d821478806d03fc9cc8cb9e4a367e019dc5ea212a953dd863386942dfe9c66649306a567477b73f6d427186b3363eb012267039e3427b9794781660b88ec5a6e44", 0x42}, {&(0x7f0000001d40)="5a5d152a3a27af11da343d04bb4f425facbb2b33da561e4e6aa2107361ef989bae843c0d69b0d9de9d9386c23b618d40d8be45da1b9df369e1a048c183163ba8c6bed4f0ba31429bb6d52b4da8f7cc6e2069cfca6728b3632f74805376908ec91a5f848cf98a5c72b0d8ef662414663b017b219b4cb58d7ef55b91314a5ec4f4be8d300c64958a794712f037388a0db81907471819ff5d28789409c8bec724653c37d8d008c1", 0xa6}], 0x6, &(0x7f0000001fc0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @multicast1, @local}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x591d}}], 0x38}}, {{&(0x7f0000002000)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000002800)=[{&(0x7f0000002040)="abc6c0f0b3906ae1f3350c4d0d9cbe314b9d2478b3ff1c34d883484cf30c3f0db8be413be749e14f1db271c2fb71a69f32dfec3d1bab147dc831187b0435ee555d963a43c069cfc4472654375e22288ec34975e389d439be486820b30bb3c5e8628d8a45769b6eb474fde5932a50e942664ba9f6b44615480201f59d9869", 0x7e}, {&(0x7f00000020c0)="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", 0xfe}, {&(0x7f00000021c0)="a9ba03eed6a94e", 0x7}, {&(0x7f0000002200)="a3e1ad4a0654dd649680bfc43f40e7392101ae62e9535b321addd571e1e1de0eb59727440c519137b740921e7d3d2e5c6490682f42f076618c2019ed2cb9837517710c29b6b5c6b0901cbd78fe19f70e3ea6c3010f8e36cd8c98af55ce4ef5800cfd04cbdf82e9e7d8524500622c90b07cc6dda8505f79e155eae249d54f774444f2af2896be945be42318b47649b22f650dc8b0ccce5aec599c5f99719faa890a4d4e8da8fdd156bc732637fd6f6e24eac4c5314b23da4374fd89034e335bd11b40af6657768551a79d6f4ab7c42115868658e437f96168fdd9f1b87edc37ea70168a81455a273eed812f4949ccdbed1a3087e97f8cb304aa8f0d", 0xfb}, {&(0x7f0000002300)="a688cb5eca039c4e45c566186c9edb67f5383191370be040979ece654506eb9478465b499071ab5e36e406539b1ed90195e9c27a7f8ad1979607d225f4071b63d058ad4ed2ce", 0x46}, {&(0x7f0000002380)="2ba7a2691cef21561bde98240b2409e1fb2698c3af7caeb7c58c6b20e839377c3b86e808b2e4829d1aae139da53b00afdef77a3aa960a8daa59ff48349b5872d972b51cbd5bfda344c63a630b2c63a07cfa64fbc6365501a759b70e9688affd60cf31946fe742212a12414703c96482bb41a0d6293ed91120ae3620a7d3e4ad0092f8dc20cd3c7eef8448a5e9d006a97e32e1bcd07635a980702a5667d0cf12d29c05757aee7bd3adebd438986ed57e8fc9d32889d3188475bf2d839c8f4b3a8d66cbdc1c6d9c22b4bcbfd49218e9c3011135a42468b8da98a126b01707b95ad06ae93ae15f0", 0xe6}, {&(0x7f0000002480)="9f91f1c521374c9cdf77191fadd40f8662f33bca02edf844c614c0c9eba8bc88847d0b34d624a7ea1a7e4bb796231df9fd8ce22a5f026d787ce55d02f064e7d9c73acd0a3b946a96185c59ea94c29152b1d657aaf6cc37671e8998b7e68e053f350823c6392ce8b9b7443ff78e424f4cbd70d0e6688deb98ec63c7ba7d5c5f581c5e71f9f6c0cd62a5a26e144c69a21e9e28e04fbf7f2f04065f0ec5c07d418fd1c10b5adcb82b25f311d7975c4b0c32eaf3b2f55c95c67b0747d04450158afe15cb56334c66de86c520f0c84d924744", 0xd0}, {&(0x7f0000002580)="3283bfaea570c36a850d9fac3120b70985eccef61cd4f6c10ffa3494478c7b64a19713eed7ae83a4fa0aada330116a503869ddfeabdfa04c2cf228b3d9e72a1336204975391d0ec162eb88c229b7e9ddba56b6f2a2d4d4740d10923088e74e80a7821be90d02861c261f8b5c4f8a3497c36af7a03cdec2ec489668aa432357ac7969727970eab47b33eb29ab53cc306028418dd40a8c1291b41bb7e7b28d08d79eb22058905b20602f18e45e2ee4e17bf4f04a891131af1243693422ebc43d47aa3173fb544bae555396e98451323ccd1b", 0xd1}, {&(0x7f0000002680)="277e40096e6d9a22e183550ac1e1094f5777bfe6967291976fd91aa6793063646dcbc3aa35956a8a256efe33e0322273d2a00b1e65eb5f336b589d48677aae73c8b2d25757161faa90942a3548d0bcd826aa960394d6e82cd8d1eb1965", 0x5d}, {&(0x7f0000002700)="1df27c8a0755a2b5a5d577e85c2a9706bf02364e33e92c07701d71b0008e0846126ca6abf3ea32e4b401f0b2d16eff8c5e5f959a4dd03bdefc85316f0f44b22dfd6845cca8b4c8166eba8ca4135918fd4fcf8cd7dc11ff3949d5141dcdb1b50e58e803d32908faaf0e4608fb621639d29a1f4cdb7c5cd8406b2f983cadc25a0b720ea7d8f75336de5bbac70cdbf75ec205f78eb102a7510ee9259247823f9b0914b0a498e916273c35278ae6c4e788d67bb117f8effd72d958e9a71b44eecac3079cb7b675d8c1dd55e0aa010e061cfc50d1927e2791f4c3a684e0f72aa0ff8518750f206bcf8e7ed19338ed07e7aab37928c09717d557", 0xf7}], 0xa}}, {{&(0x7f00000028c0)={0x2, 0x4e1d, @multicast2}, 0x10, &(0x7f0000002ac0)=[{&(0x7f0000002900)="e21b17cb84e075fad2abfe64c2c0db1ddfa1ca712baa34c3081dccdff3ff9cc53070347ceea433bf3cadb6d5d62bb8929764056c0b769ea0651c605521a4948264826a77e9d207233389dc800c40d65657f827d90ac50ef058c4ddef1cb8c905c5d82074e84b3d1726ef2c66aa66bfb1ca2466f723c3521908dba76e945aeb0e8d6027bab03fbec9ab670ef82bcdf782af85688f528b77d3979aa0c7e3d7486b52943140d10bb0f5b80cf4c82cd88413c17b096688b32752bb93628e42cc13a7e5256760c045ce65465b1f27fde6cf5a36f0c2375c9ef1598f2d2d00e4d5e75c", 0xe0}, {&(0x7f0000002a00)="e4cb8a289d9c54d0c6ca62b75453dfb10e61533d7645d132ba312f05b2f83933d15b61671b5053598b1e18a0f07752f43272fd10d95e3f76c20ef85645a8050fc8a40bdd5736dbbed8fd59eafbf89cc9d1c5561fe2320460882d2e42d83d27f930a154465a788bc7f758b67b7caf3c5455914ede371b507c580a1495790bfdce9ec167efa5f717", 0x87}], 0x2, &(0x7f0000002b00)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@generic={0x88, 0x7, "7f2657a9f5"}, @timestamp={0x44, 0xc, 0x27, 0x0, 0x4, [0x1, 0xba]}, @rr={0x7, 0xb, 0x4, [@dev={0xac, 0x14, 0x14, 0xb}, @local]}, @noop, @timestamp_prespec={0x44, 0x14, 0xb0, 0x3, 0x9, [{@loopback, 0x1}, {@dev={0xac, 0x14, 0x14, 0x41}, 0x7}]}, @generic={0x7, 0x9, "6e072870b869c7"}, @generic={0x7, 0xc, "4337964f1b9425bcb2e7"}, @lsrr={0x83, 0x13, 0x9d, [@multicast2, @dev={0xac, 0x14, 0x14, 0x43}, @multicast1, @loopback]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback}}}, @ip_retopts={{0x80, 0x0, 0x7, {[@timestamp_addr={0x44, 0xc, 0x42, 0x1, 0x2, [{@remote, 0x68c1}]}, @cipso={0x86, 0x64, 0xffffffffffffffff, [{0x0, 0x10, "becd3ec995ab2c212044039a87b9"}, {0x0, 0x10, "423c45c24925b8965d98c608d836"}, {0x0, 0x11, "b43f19e532751ad56ffa49f62af8c3"}, {0x6, 0xd, "6641b2e43657a816f3130f"}, {0x0, 0xe, "eb31ce4895976e05bc5de19d"}, {0x1, 0x12, "31e3b7fad329dc949a2ad9b9c0f84aba"}]}]}}}], 0x170}}, {{&(0x7f0000002c80)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f0000002f00)=[{&(0x7f0000002cc0)="5c07aaa329c7e5d5b404d23dcbc4470955cdb64c0e0b063f5b38b3907eb09494f877e98aa121fc14bb0a2de9bc5c0894fa52cfcd9bddd625dc4383d09b79314de3c73a5a9af090ee1c79f659af4fc516c6c8119df3b1e320ba05968dff7fec", 0x5f}, {&(0x7f0000002d40)="275290038e3d24da925a03aff5de27923d2a9133557ae86b4831ac151b30afbd7d582bd89155fc43839bc7655e5026f6fbd3ba8ad5fb1ccfa69595d1e161c5a80daf8cf87ad546e0a7f059dcc3376f2bda7b299d1305274d60d3819bf414fcd60e6e2f12783b5539da1a539c3c6041a36d1150cc8d8614a20e2236fc15135c1a14cbfead921d0969fe07762b34f1291435d7885fb9b1aae84d541bc214d5865fd3e41557343b6ae1131db0028a3cb04f9d2ac98171db0706a9397808cd2a347cb93f326735c6c3cc2f5c5fd2756816b91008ca965562f94bdc1454e8fbc97d42f66b37e13b75e2424794c5931686", 0xee}, {&(0x7f0000002e40)="0a1bac527bb87d9d4c0d5eb9833eb2af62f3f24e5228e3764ef6c680e0311627b9fd1a47c6d374f5277fbf61dc5c60fcda2faa5fa445ac12f9362175d0a98f4e075f66cdb891c390451e11187f7d9e824cf69576754b4eaffe85a61375522876dae22a2cfbd973b55601621cf9c1b9352905195ee2b20429af244f945c3e7550d89e31d145791fcf8647", 0x8a}], 0x3, &(0x7f0000002f40)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r10, @remote, @loopback}}}, @ip_retopts={{0x78, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x14, 0x29, 0x3, 0x8, [{@broadcast, 0xfffff800}, {@multicast2, 0x3}]}, @timestamp_addr={0x44, 0xc, 0x7c, 0x1, 0x6, [{@dev={0xac, 0x14, 0x14, 0x27}, 0x8000}]}, @timestamp={0x44, 0x18, 0xff, 0x0, 0x8, [0xfffffffe, 0x0, 0x1f80, 0x0, 0x9]}, @noop, @generic={0x82, 0x9, "d7a57b6946c773"}, @end, @timestamp_prespec={0x44, 0x4, 0x96, 0x3, 0xa}, @timestamp={0x44, 0x20, 0x5c, 0x0, 0x7, [0x3023, 0x37, 0x71, 0xa4f, 0x3, 0x2, 0x20000]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x4}}], 0xc8}}, {{&(0x7f0000003080)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f00000033c0)=[{&(0x7f00000030c0)="bb2dba62aac9adc555af314b8f0eab3ae98d08a64aff3f4b1f26b0d7892187b8aaf7b9542d442597467da78cd28d26463faba3d4bea9668a4733871eb1d47f5813d7a01750199b5a432015ee452ebcf5a1e79c2bc2fae76a8c08c4d1ee5fdb29ba6bb2978c31", 0x66}, {&(0x7f0000003140)="75426e6949aa66c645f69b900f4ed63ff264b6cd1d7b8c61c939a7f2ec0020d29bda6539d517de0211c48496adae8e1655996149b1ad9b0eeefa570eb243562af2821d789e04c0ba1a9de9eda6904fb4c307e3aa682c533937930273bd7b0b7e4ca120989579c5d0222cc8a41cf17487b6ec495c55f10307afee39c39aeba95cda0fc03e6f7b665174f2f6132245573bd7bf8fa8ab12ffbbc62a4efa", 0x9c}, {&(0x7f0000003200)="699196567f00a7208714dcd921157ebf85e3ee97272f8a128e45439226b20bda9ee3839b1567ef30a1172601b82f7f191d7dcb30d1c867d35443795bdd49bb3d1087accfc86f18dde331e809d531521d9b895bceb11ef15e061742eb1ed2ca5e061c4c895849b43f614df4e3c24416de6166117e1d0d2825522db78f00cd8855d1e9e5825f59e79bee35aa944c7ba763639d1b1a5e67acbd5a6c578bf7a02900a50857086446d260cb5f014877f3837badc2bb28c7cdfd350bb3a9", 0xbb}, {&(0x7f00000032c0)="2db6c39749a978a377b3470b8706ce0726ea6bcd3d7779fe4cd1e939b6b391280e4a03f897aaa2c8f772a43ce15abbb56f9c2356c160f1b96a8ffe2fc5a90d0137ce", 0x42}, {&(0x7f0000003340)="bb49a38a7c8120d00d64d077d5c0979f099e98db3600f4620bb3efe600ac35b37d5dc8263474f5f641bc28fe1fe864045ebad3e320e83ae82ce3005e7dc8772cd42308242c4e5881800174bdc7ff60585e198fd6d30a9e9493d383f7a8cd", 0x5e}], 0x5, &(0x7f0000003440)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x8}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_retopts={{0x5c, 0x0, 0x7, {[@lsrr={0x83, 0x23, 0xcd, [@rand_addr=0x8001, @empty, @multicast2, @broadcast, @dev={0xac, 0x14, 0x14, 0x1a}, @multicast2, @broadcast, @empty]}, @timestamp_addr={0x44, 0x1c, 0x48, 0x1, 0x6, [{@multicast1, 0x6}, {@broadcast, 0xfffffff8}, {@multicast2, 0x4e344451}]}, @cipso={0x86, 0xd, 0x1, [{0x5, 0x4, "024e"}, {0x4, 0x3, '|'}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x5}}, @ip_tos_u8={{0x11}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x25}}, @ip_tos_int={{0x14}}, @ip_ttl={{0x14, 0x0, 0x2, 0xfffffffa}}], 0x120}}, {{&(0x7f0000003580)={0x2, 0x4e20, @local}, 0x10, &(0x7f00000036c0)=[{&(0x7f00000035c0)="9c19b24f9e50ec921964092376f6c3b4142343cadfdcf62161b7389e185dac582dbd0627a5636eb7987f10d34ecc2ee4622fb9dba7d25afaf72543ce35393494da31fb4e29579a558807d4803507e0f279a67b93fa30265996b7d75ec1af5de8e778b5a851427d8bbc64fb19676fe6202fa2e53ff638bccc07520a3d9b10a3755c1c5a51a602f8d92738c4ac7317a7ac4a52dfbff4a467573528d1076fbc952c5b99222cff067174df47", 0xaa}, {&(0x7f0000003680)="796365e8e3b6ec503d11d356f332901c7fd1d9c060bad2906bb386026e4d319a9787f132914e06aef2ea568eaaad71ae8f1e0e2714fff59a318b", 0x3a}], 0x2, &(0x7f0000003700)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x3ff}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}], 0x60}}, {{&(0x7f0000003780)={0x2, 0x4e23, @multicast2}, 0x10, &(0x7f0000003980)=[{&(0x7f00000037c0)="67f57d541384dbc3dcac9b293dce3b1bf14bf1ca47c35ed93036eae947e60fe14e2f36f066664e4322d9cac1706ac5bdeb6f4a44f6b1bb5816fc38c4386359843ffc86f76a1ab44450780ab28801c2860b4c0bcff0bef99f55703af7b0514af22ca48f52efb23f3ac1c4409be3dc16715e0d3e152020d0660cdd20bbf8de5e89005ab024cb7006fc5cccd09f66002dca53547cbca4c8af944160dd42c633c1ef6ca623a8d33e48ca249ad71566732475ce140a", 0xb3}, {&(0x7f0000003880)="c72b9f12927bb5ec7be387a2aeecc7bb79e67a918503687df3a8cab55e7e7b435e25018c23a902ad5b22c2e7cb85b5042202aaab3a47f22e5454bf95f9404ac5073d0dfe96bb7cad5df0609735b16ba98b7041ad3cc0a687268dda040eeafd3bd2f38ad0dc75a6be81b50ebf74ea508df6d425c1123accf5a45d428ee55b8f03c02f9f723dd1210ffeb5caea7ce4d49d25f6570b765e6fd57c0cd4dd4c7389847fbe68c76ece679d240650eb2801f15276313d6ecde650dd0e5119d108fe0988324f0d10906e7f46", 0xc8}], 0x2, &(0x7f00000039c0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7}}], 0x18}}], 0x9, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0xfffe, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f0000000000)=""/8, &(0x7f0000000080)=0x8) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000140)={0x40000, {{0xa, 0x4e21, 0x0, @mcast1}}, {{0xa, 0x8000, 0x6, @mcast1}}}, 0x108) [ 471.372393][ T26] audit: type=1804 audit(1586505943.123:271): pid=28293 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/908/cgroup.controllers" dev="sda1" ino=16371 res=1 08:05:43 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r3, 0x4010641a, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[0x3, 0x200]}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) [ 471.615471][ T26] audit: type=1804 audit(1586505943.363:272): pid=28316 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/909/cgroup.controllers" dev="sda1" ino=16384 res=1 08:05:45 executing program 2: open(0x0, 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:45 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) signalfd4(r3, &(0x7f0000000000)={[0x1f]}, 0x8, 0x80000) 08:05:45 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$netlink(0x10, 0x3, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x52700, 0x0) ioctl(r3, 0x1000008912, &(0x7f0000000100)="320db5055e0bcfe847a071d39656befbe3dce61c57f0478514120aaa46d86b6e60e9a88028e165f7628ab7f60f1df395a7d0ad0ab56a6819869557f6d292bbf82f62a02e5ff5bb88f8f89f14d7b9a490ce8a103b024ede0500baca59a5e4c6faf7df11083276bf7c048abec43c403e55") sendfile(r2, r1, 0x0, 0x100000002) 08:05:45 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0xedc000000000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:05:45 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:45 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 473.952211][T28353] IPVS: ftp: loaded support on port[0] = 21 [ 473.971815][ T26] audit: type=1804 audit(1586505945.723:273): pid=28358 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/910/cgroup.controllers" dev="sda1" ino=16362 res=1 [ 473.978389][T28356] IPVS: ftp: loaded support on port[0] = 21 08:05:46 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x84800) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x20, r2, 0xab9535e9a6578fc1, 0x0, 0x0, {0x6b}, [@NL80211_ATTR_WDEV={0xc}]}, 0x20}}, 0x0) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x48, r2, 0x200, 0x70bd27, 0x25dfdbff, {}, [@NL80211_ATTR_SSID={0x24, 0x34, "50e31bc9b2b37685bc68f72a1895253a88ab7ad7888eb8d41b987bc411832832"}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_HIDDEN_SSID={0x8, 0x7e, 0x1}]}, 0x48}, 0x1, 0x0, 0x0, 0x4050}, 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) ioctl$EVIOCSABS20(r3, 0x401845e0, &(0x7f0000000080)={0x0, 0x2, 0x1, 0x0, 0xb79, 0x8}) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mmap$dsp(&(0x7f0000000000/0x9000)=nil, 0x9000, 0x1000000, 0x80010, r3, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r6, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$netlink(0x10, 0x3, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) ioctl(r3, 0x7, &(0x7f0000000100)="080db5055e7ef3b7cde9c95df5410e4496874d66e7206119") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = msgget$private(0x0, 0x0) msgrcv(r6, 0x0, 0x0, 0x0, 0x0) msgrcv(r6, 0x0, 0x0, 0x3, 0x0) msgsnd(r6, &(0x7f0000000100)={0x3}, 0x8, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 08:05:46 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:46 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r2) getgroups(0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2]) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 474.546007][ T26] audit: type=1804 audit(1586505946.293:274): pid=28407 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/911/cgroup.controllers" dev="sda1" ino=16370 res=1 08:05:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r1, &(0x7f00000000c0)=@abs, &(0x7f0000000000)=0x6e) dup(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) r5 = fcntl$getown(r0, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r4, 0xc1105518, &(0x7f00000002c0)={{0x8, 0x6, 0x200, 0xc2fd, 'syz0\x00', 0x7fffffff}, 0x3, 0x200, 0x8, r5, 0x4, 0x8, 'syz1\x00', &(0x7f0000000280)=['*%i\x00', '*\x00', '*.\x00', '#nodev+security\\}*\x00'], 0x1c, [], [0xfff, 0xfb4f, 0x69, 0x1]}) [ 474.677410][T28413] IPVS: ftp: loaded support on port[0] = 21 [ 474.764834][T28415] IPVS: ftp: loaded support on port[0] = 21 08:05:46 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2010000000000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:46 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:05:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x3, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x201, 0x0, 0x0, {0xc, 0x0, 0x5}, [""]}, 0x14}}, 0x4000) 08:05:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x10000, 0x0) setsockopt$inet6_dccp_buf(r4, 0x21, 0xd, &(0x7f0000000140), 0x0) sendfile(r2, r1, 0x0, 0x100000002) 08:05:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @remote}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 475.225539][ T26] audit: type=1804 audit(1586505946.973:275): pid=28472 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/912/cgroup.controllers" dev="sda1" ino=16378 res=1 08:05:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={r1, 0xe, 0x1, 0x0, &(0x7f0000000280)=[0x0, 0x0, 0x0], 0x3}, 0x20) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.stat\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="280000ed0706030000000000000000000000010405000169317c24d1070000000900020073797a30000000004f9ef3093b35805a86a39e1da9db81a31b9bce4949e63a44c6743b35ee09a7a348e38d1fce766bbd80608ae87140043447bb34803da37c77d8b1c829beed486c86a7a9e08600cf1ce09578508965196b352c240465b53ac5fb"], 0x28}}, 0x20000000) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r4, 0x40485404, &(0x7f0000000140)={{0x3, 0x0, 0xec1, 0x2}, 0x100000000005, 0x9}) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nvram\x00', 0x288181, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$TIOCGICOUNT(r5, 0x545d, 0x0) openat$smackfs_netlabel(0xffffffffffffff9c, &(0x7f0000000240)='/sys/fs/smackfs/netlabel\x00', 0x2, 0x0) r6 = socket$netlink(0x10, 0x3, 0x8) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r3, r2, 0x0, 0x100000002) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 08:05:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresgid(0xee00, 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, 0x0, r4) getgroups(0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4]) mount$fuse(0x0, &(0x7f0000000040)='./bus/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x30040, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r5, @ANYBLOB="2c6d61785f726561643d3078303030303030303030300030303030332c686173682c66736e616d653d2c2c2c61707072616973652c6d61736b3d537359c6a499945481f9c0646f6e745f61707072616973652c88736e616d653d2f70d73cae21bf2d40ddcb16"]) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r6, 0x5441, 0x0) mmap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000180)={0x556, 0x800, 0x60, 0x400, 0xfffffbff, 0x20, 0x20, 0x2, {0x4, 0x2b, 0x1}, {0x96, 0x1f, 0x1}, {0xffffffff, 0x2}, {0xffff31ff}, 0x1, 0x50, 0x5, 0x5, 0x0, 0x3, 0xf5a, 0x400, 0x2d24, 0xfff, 0x8, 0x0, 0x24, 0x4, 0x2, 0x2}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000280)=0xffffffffffffff85) setuid(r7) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$l2tp(0x2, 0x2, 0x73) 08:05:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x4e21, 0x0, @remote}}}, 0x108) 08:05:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) sendmsg$IPSET_CMD_LIST(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="280000000706010200100000000000000000ba8b75b1ecf42a6ffd4978261f3672bb000001000700544e742b3e75595baae8b017bb66007df94d2414971de72b73ea59b9a625fb943ffc5bfd839b0458f08e451d6e84b9ad80904c53f727991592bde22b087648ba0df0c40d956da4febd4546cb5ebcf052e8a6ad506b080ca73f4a11e4f6de049e861f2fd9b33eb7aa4190420bf67d92de0a075484acaf1fa4d8d86f9441c10f3a23309a64"], 0x28}, 0x1, 0x0, 0x0, 0x4040004}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r3, r1, 0x0, 0x100000002) 08:05:47 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r0, 0xc0884123, &(0x7f0000000280)={0x4, "aa2e42755b2db853b3c5b43d74774325bcb01e4964931722f12101a1ee5700fb76ad99d5b3ed474595fc753e5838ed19318a4eaa084ffe696be7541d667b3a2d", {0xffff, 0x5}}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) sendmsg$IPCTNL_MSG_CT_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x40, 0x1, 0x1, 0x5, 0x0, 0x0, {}, [@CTA_TUPLE_REPLY={0x2c, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_ZONE={0x6}]}]}, 0x40}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r3, &(0x7f0000000140), 0x492492492492805, 0x0) close(0xffffffffffffffff) accept$phonet_pipe(r0, &(0x7f0000000000), &(0x7f0000000080)=0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r6, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={r1, 0xe, 0x1, 0x0, &(0x7f0000000280)=[0x0, 0x0, 0x0], 0x3}, 0x20) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.stat\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="280000ed0706030000000000000000000000010405000169317c24d1070000000900020073797a30000000004f9ef3093b35805a86a39e1da9db81a31b9bce4949e63a44c6743b35ee09a7a348e38d1fce766bbd80608ae87140043447bb34803da37c77d8b1c829beed486c86a7a9e08600cf1ce09578508965196b352c240465b53ac5fb"], 0x28}}, 0x20000000) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r4, 0x40485404, &(0x7f0000000140)={{0x3, 0x0, 0xec1, 0x2}, 0x100000000005, 0x9}) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nvram\x00', 0x288181, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$TIOCGICOUNT(r5, 0x545d, 0x0) openat$smackfs_netlabel(0xffffffffffffff9c, &(0x7f0000000240)='/sys/fs/smackfs/netlabel\x00', 0x2, 0x0) r6 = socket$netlink(0x10, 0x3, 0x8) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r3, r2, 0x0, 0x100000002) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) [ 475.688019][T28492] IPVS: ftp: loaded support on port[0] = 21 [ 475.824607][ T26] audit: type=1804 audit(1586505947.573:276): pid=28499 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/913/cgroup.controllers" dev="sda1" ino=16377 res=1 08:05:47 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2000000000000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:05:47 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2500000000000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x440200, 0x0) 08:05:47 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r0, 0xc0884123, &(0x7f0000000280)={0x4, "aa2e42755b2db853b3c5b43d74774325bcb01e4964931722f12101a1ee5700fb76ad99d5b3ed474595fc753e5838ed19318a4eaa084ffe696be7541d667b3a2d", {0xffff, 0x5}}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) sendmsg$IPCTNL_MSG_CT_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x40, 0x1, 0x1, 0x5, 0x0, 0x0, {}, [@CTA_TUPLE_REPLY={0x2c, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_ZONE={0x6}]}]}, 0x40}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r3, &(0x7f0000000140), 0x492492492492805, 0x0) close(0xffffffffffffffff) accept$phonet_pipe(r0, &(0x7f0000000000), &(0x7f0000000080)=0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r6, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) getsockopt$PNPIPE_HANDLE(r1, 0x113, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r2, r1, 0x0, 0x100000002) 08:05:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x2080, 0x0) 08:05:48 executing program 2 (fault-call:1 fault-nth:0): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:48 executing program 3 (fault-call:2 fault-nth:0): open(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 476.385245][ T26] audit: type=1804 audit(1586505948.133:277): pid=28543 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/914/cgroup.controllers" dev="sda1" ino=16352 res=1 [ 476.437192][T28552] FAULT_INJECTION: forcing a failure. [ 476.437192][T28552] name failslab, interval 1, probability 0, space 0, times 0 08:05:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f00000000c0)=0x1e) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x80, 0xfffffdff, @remote, 0x42}}}, 0x108) [ 476.508650][T28554] FAULT_INJECTION: forcing a failure. [ 476.508650][T28554] name failslab, interval 1, probability 0, space 0, times 0 [ 476.529473][T28552] CPU: 1 PID: 28552 Comm: syz-executor.2 Not tainted 5.6.0-syzkaller #0 [ 476.537834][T28552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.547903][T28552] Call Trace: [ 476.551207][T28552] dump_stack+0x1e9/0x30e [ 476.555550][T28552] should_fail+0x433/0x5b0 [ 476.559986][T28552] should_failslab+0x5/0x20 [ 476.564499][T28552] kmem_cache_alloc_node+0x64/0x290 [ 476.569703][T28552] ? dup_task_struct+0x52/0x7b0 [ 476.574565][T28552] dup_task_struct+0x52/0x7b0 [ 476.579263][T28552] ? _raw_spin_unlock_irq+0x1f/0x80 [ 476.584477][T28552] copy_process+0x539/0x52f0 [ 476.589086][T28552] ? rcu_lock_release+0x5/0x20 [ 476.593874][T28552] _do_fork+0x134/0x650 [ 476.598039][T28552] ? ksys_write+0x1b1/0x220 [ 476.602548][T28552] __x64_sys_clone+0x21c/0x260 [ 476.607335][T28552] do_syscall_64+0xf3/0x1b0 [ 476.611857][T28552] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 476.617751][T28552] RIP: 0033:0x45c889 [ 476.621646][T28552] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 476.641253][T28552] RSP: 002b:00007f298a8ccc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 476.649667][T28552] RAX: ffffffffffffffda RBX: 00007f298a8cd6d4 RCX: 000000000045c889 08:05:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000000c0)={0x5, 0xd, 0x80, 0x7f}, &(0x7f0000000100)=0x80000001, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x2}}, 0x10) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 476.657639][T28552] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0c75e43cfae22dd4 [ 476.665606][T28552] RBP: 000000000076bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 476.673577][T28552] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 476.681559][T28552] R13: 0000000000000074 R14: 00000000004c3143 R15: 0000000000000000 [ 476.740735][T28554] CPU: 1 PID: 28554 Comm: syz-executor.3 Not tainted 5.6.0-syzkaller #0 [ 476.749104][T28554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.759165][T28554] Call Trace: [ 476.762470][T28554] dump_stack+0x1e9/0x30e [ 476.766821][T28554] should_fail+0x433/0x5b0 [ 476.771258][T28554] should_failslab+0x5/0x20 [ 476.775769][T28554] kmem_cache_alloc_node+0x64/0x290 [ 476.780988][T28554] ? dup_task_struct+0x52/0x7b0 [ 476.785872][T28554] dup_task_struct+0x52/0x7b0 [ 476.790578][T28554] ? _raw_spin_unlock_irq+0x1f/0x80 [ 476.795789][T28554] copy_process+0x539/0x52f0 [ 476.800417][T28554] ? rcu_lock_release+0x5/0x20 [ 476.805206][T28554] _do_fork+0x134/0x650 [ 476.809371][T28554] ? ksys_write+0x1b1/0x220 [ 476.813953][T28554] __x64_sys_clone+0x21c/0x260 [ 476.818757][T28554] do_syscall_64+0xf3/0x1b0 [ 476.823272][T28554] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 476.829172][T28554] RIP: 0033:0x45c889 [ 476.833071][T28554] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 476.852687][T28554] RSP: 002b:00007f9a647e7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 476.861110][T28554] RAX: ffffffffffffffda RBX: 00007f9a647e86d4 RCX: 000000000045c889 [ 476.869091][T28554] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0c75e43cfae22dd4 [ 476.877069][T28554] RBP: 000000000076bf00 R08: ffffffffffffffff R09: 0000000000000000 08:05:48 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fgetxattr(r1, &(0x7f0000000100)=@known='system.posix_acl_access\x00', &(0x7f0000000280)=""/90, 0x5a) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) getsockopt$inet_dccp_int(r3, 0x21, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 476.885056][T28554] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 476.893033][T28554] R13: 0000000000000074 R14: 00000000004c3143 R15: 0000000000000000 08:05:48 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x14, 0x7, 0x6, 0x201, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x75694000) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r4, 0x84, 0x4, &(0x7f0000000100)=0x35a07cce, 0x4) openat$cgroup_ro(r4, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 08:05:48 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:05:48 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) 08:05:48 executing program 3 (fault-call:2 fault-nth:1): open(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f00000000c0)={0x10001, 0x0, 0x4, 0x4000000, 0x1, {0x77359400}, {0x2, 0x8, 0x40, 0x42, 0x3, 0x1, "033874b5"}, 0x9, 0x1, @userptr=0x10001, 0x3, 0x0, 0xffffffffffffffff}) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f0000000280)={0x1, 0x10000, [{0x5df, 0x0, 0x4}]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x400002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x7af30bca) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:48 executing program 2 (fault-call:1 fault-nth:1): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 477.176761][ T26] audit: type=1804 audit(1586505948.923:278): pid=28571 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir958163706/syzkaller.ezFYu0/915/cgroup.controllers" dev="sda1" ino=16360 res=1 [ 477.219465][T28579] FAULT_INJECTION: forcing a failure. [ 477.219465][T28579] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 477.230395][T28581] FAULT_INJECTION: forcing a failure. [ 477.230395][T28581] name failslab, interval 1, probability 0, space 0, times 0 [ 477.232697][T28579] CPU: 1 PID: 28579 Comm: syz-executor.2 Not tainted 5.6.0-syzkaller #0 [ 477.232705][T28579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 477.232710][T28579] Call Trace: [ 477.232729][T28579] dump_stack+0x1e9/0x30e [ 477.232747][T28579] should_fail+0x433/0x5b0 [ 477.232770][T28579] prepare_alloc_pages+0x28c/0x4a0 [ 477.232787][T28579] __alloc_pages_nodemask+0xbc/0x5e0 [ 477.286102][T28579] kmem_getpages+0x49/0x900 [ 477.290623][T28579] cache_grow_begin+0x7b/0x2e0 [ 477.295398][T28579] cache_alloc_refill+0x359/0x3f0 [ 477.300431][T28579] ? trace_irq_disable_rcuidle+0x1f/0x1d0 [ 477.306155][T28579] ? check_preemption_disabled+0xb0/0x240 [ 477.311877][T28579] ? debug_smp_processor_id+0x5/0x20 [ 477.317174][T28579] kmem_cache_alloc_node+0x1ba/0x290 [ 477.322483][T28579] ? dup_task_struct+0x52/0x7b0 [ 477.327334][T28579] dup_task_struct+0x52/0x7b0 [ 477.332013][T28579] ? _raw_spin_unlock_irq+0x1f/0x80 [ 477.337222][T28579] copy_process+0x539/0x52f0 [ 477.341826][T28579] ? rcu_lock_release+0x5/0x20 [ 477.346646][T28579] _do_fork+0x134/0x650 [ 477.350808][T28579] ? ksys_write+0x1b1/0x220 [ 477.355321][T28579] __x64_sys_clone+0x21c/0x260 [ 477.360108][T28579] do_syscall_64+0xf3/0x1b0 [ 477.364618][T28579] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 477.370508][T28579] RIP: 0033:0x45c889 [ 477.374403][T28579] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 477.394122][T28579] RSP: 002b:00007f298a8ccc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 477.402549][T28579] RAX: ffffffffffffffda RBX: 00007f298a8cd6d4 RCX: 000000000045c889 [ 477.410524][T28579] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0c75e43cfae22dd4 [ 477.418499][T28579] RBP: 000000000076bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 477.426472][T28579] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 477.434438][T28579] R13: 0000000000000074 R14: 00000000004c3143 R15: 0000000000000001 [ 477.465955][T28581] CPU: 0 PID: 28581 Comm: syz-executor.3 Not tainted 5.6.0-syzkaller #0 [ 477.474317][T28581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 477.484377][T28581] Call Trace: [ 477.487673][T28581] dump_stack+0x1e9/0x30e [ 477.492009][T28581] should_fail+0x433/0x5b0 [ 477.496440][T28581] should_failslab+0x5/0x20 [ 477.500952][T28581] kmem_cache_alloc_node_trace+0x69/0x2b0 [ 477.506676][T28581] ? __get_vm_area_node+0x1ac/0x380 [ 477.511880][T28581] __get_vm_area_node+0x1ac/0x380 [ 477.516910][T28581] __vmalloc_node_range+0xed/0x8b0 [ 477.522027][T28581] ? copy_process+0x539/0x52f0 [ 477.526800][T28581] ? rcu_read_lock_sched_held+0x106/0x170 [ 477.532523][T28581] ? trace_kmem_cache_alloc_node+0xd7/0x130 [ 477.538425][T28581] ? kmem_cache_alloc_node+0x26c/0x290 [ 477.543890][T28581] dup_task_struct+0x4cd/0x7b0 [ 477.547148][T28579] IPVS: ftp: loaded support on port[0] = 21 [ 477.548652][T28581] ? copy_process+0x539/0x52f0 [ 477.548666][T28581] ? _raw_spin_unlock_irq+0x1f/0x80 [ 477.548681][T28581] copy_process+0x539/0x52f0 [ 477.548703][T28581] ? rcu_lock_release+0x5/0x20 [ 477.548731][T28581] _do_fork+0x134/0x650 [ 477.548747][T28581] ? ksys_write+0x1b1/0x220 [ 477.548761][T28581] __x64_sys_clone+0x21c/0x260 [ 477.548786][T28581] do_syscall_64+0xf3/0x1b0 [ 477.548798][T28581] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 477.548809][T28581] RIP: 0033:0x45c889 [ 477.548823][T28581] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 477.621182][T28581] RSP: 002b:00007f9a647e7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 477.629597][T28581] RAX: ffffffffffffffda RBX: 00007f9a647e86d4 RCX: 000000000045c889 [ 477.637570][T28581] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0c75e43cfae22dd4 [ 477.645543][T28581] RBP: 000000000076bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 477.653514][T28581] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 08:05:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = request_key(&(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0xfffffffffffffff8) keyctl$invalidate(0x15, r2) r3 = add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000280)="9d95579349a5e0bd910d39616423cbfede7a1fb919102cfe16cc610d38ba43ba5594f24889c0f76f95bb81f20696f4b0653ae95f4759dbb2ab9e6c0172bfb360b5c1be7f170b38e1045c633583ffc58e0698b70cc0bfb2af22655e258af3ad95e0a90d401ccb24507ea3eaac52507840d039418c911540da89388b677a3e4cacf6c0e1845d7d88bfcfc17749bf2c159337b8eb017d760f47b652c774582fd7acf74c92df8c0979f2e690fd1d786d98cdb22d8819e2faf014ee67", 0xba, r2) keyctl$restrict_keyring(0x1d, r3, &(0x7f00000000c0)='.dead\x00', &(0x7f0000000100)='\x00') r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r4, 0x29, 0x2f, &(0x7f0000000140)={0x80, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x2, 0x0, @remote}}}, 0x108) openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x210002, 0x0) [ 477.661487][T28581] R13: 0000000000000074 R14: 00000000004c3143 R15: 0000000000000001 08:05:49 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) write$binfmt_script(r2, &(0x7f0000000000)=ANY=[@ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES16, @ANYRES32=r3]], 0x8) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYRES64], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x4010) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = socket$netlink(0x10, 0x3, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r7 = socket$can_bcm(0x1d, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x406, r7) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r5, r4, 0x0, 0x100000002) 08:05:49 executing program 2 (fault-call:1 fault-nth:2): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400203) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x2a88, @mcast2, 0xffffffff}}, {{0xa, 0x0, 0x0, @remote, 0x2}}}, 0x108) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) sendmsg$NL80211_CMD_SET_WIPHY(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, 0x0, 0x800, 0x70bd2c, 0x25dfdbfe, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x8001}}, @NL80211_ATTR_WIPHY_DYN_ACK={0x4}, @NL80211_ATTR_WIPHY_TX_POWER_LEVEL={0x8, 0x62, 0x10001}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) [ 477.958609][T28618] FAULT_INJECTION: forcing a failure. [ 477.958609][T28618] name failslab, interval 1, probability 0, space 0, times 0 [ 478.021582][T28618] CPU: 1 PID: 28618 Comm: syz-executor.2 Not tainted 5.6.0-syzkaller #0 [ 478.029945][T28618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 478.040000][T28618] Call Trace: [ 478.043300][T28618] dump_stack+0x1e9/0x30e [ 478.047655][T28618] should_fail+0x433/0x5b0 [ 478.052080][T28618] ? kzalloc+0x1d/0x40 [ 478.056157][T28618] should_failslab+0x5/0x20 [ 478.060691][T28618] __kmalloc+0x74/0x330 [ 478.064853][T28618] ? prepare_creds+0x3d/0x590 [ 478.069553][T28618] ? rcu_read_lock_sched_held+0x106/0x170 [ 478.075289][T28618] kzalloc+0x1d/0x40 [ 478.079211][T28618] security_prepare_creds+0x46/0x220 [ 478.084509][T28618] prepare_creds+0x3dc/0x590 [ 478.089109][T28618] copy_creds+0x130/0x6b0 [ 478.093454][T28618] copy_process+0x920/0x52f0 [ 478.098101][T28618] ? rcu_lock_release+0x5/0x20 [ 478.102887][T28618] _do_fork+0x134/0x650 [ 478.107049][T28618] ? ksys_write+0x1b1/0x220 [ 478.111560][T28618] __x64_sys_clone+0x21c/0x260 [ 478.116340][T28618] do_syscall_64+0xf3/0x1b0 [ 478.120855][T28618] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 478.126747][T28618] RIP: 0033:0x45c889 [ 478.130646][T28618] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 478.150265][T28618] RSP: 002b:00007f298a8ccc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 478.158709][T28618] RAX: ffffffffffffffda RBX: 00007f298a8cd6d4 RCX: 000000000045c889 08:05:49 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) 08:05:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000280)={0x1000b77b, {{0xa, 0x0, 0x0, @empty, 0x5}}, {{0xa, 0xfffc, 0x0, @ipv4={[], [], @rand_addr=0x91}}}}, 0x108) 08:05:50 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x0, &(0x7f0000000000)={[{@allocsize={'allocsize', 0x3d, [0x36]}}]}) [ 478.166683][T28618] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0c75e43cfae22dd4 [ 478.174655][T28618] RBP: 000000000076bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 478.182624][T28618] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 478.190592][T28618] R13: 0000000000000074 R14: 00000000004c3143 R15: 0000000000000002 08:05:50 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) ioctl$FS_IOC_GETFSLABEL(r3, 0x81009431, &(0x7f0000000280)) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 478.268088][T28581] syz-executor.3: vmalloc: allocation failure: 32768 bytes, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0-1 [ 478.327939][T28581] CPU: 1 PID: 28581 Comm: syz-executor.3 Not tainted 5.6.0-syzkaller #0 [ 478.336304][T28581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 478.346360][T28581] Call Trace: [ 478.349660][T28581] dump_stack+0x1e9/0x30e [ 478.354004][T28581] warn_alloc+0x17d/0x2c0 [ 478.358338][T28581] ? __get_vm_area_node+0x1ac/0x380 [ 478.363554][T28581] ? __get_vm_area_node+0x1bf/0x380 [ 478.368790][T28581] __vmalloc_node_range+0x2ac/0x8b0 [ 478.374035][T28581] ? rcu_read_lock_sched_held+0x106/0x170 [ 478.379784][T28581] ? trace_kmem_cache_alloc_node+0xd7/0x130 [ 478.385690][T28581] ? kmem_cache_alloc_node+0x26c/0x290 [ 478.391161][T28581] dup_task_struct+0x4cd/0x7b0 [ 478.395945][T28581] ? copy_process+0x539/0x52f0 [ 478.400760][T28581] ? _raw_spin_unlock_irq+0x1f/0x80 [ 478.405970][T28581] copy_process+0x539/0x52f0 [ 478.410580][T28581] ? rcu_lock_release+0x5/0x20 [ 478.415374][T28581] _do_fork+0x134/0x650 [ 478.419543][T28581] ? ksys_write+0x1b1/0x220 [ 478.424059][T28581] __x64_sys_clone+0x21c/0x260 [ 478.428845][T28581] do_syscall_64+0xf3/0x1b0 [ 478.433355][T28581] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 478.439252][T28581] RIP: 0033:0x45c889 [ 478.443153][T28581] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 478.462943][T28581] RSP: 002b:00007f9a647e7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 478.471361][T28581] RAX: ffffffffffffffda RBX: 00007f9a647e86d4 RCX: 000000000045c889 [ 478.479343][T28581] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0c75e43cfae22dd4 [ 478.487320][T28581] RBP: 000000000076bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 478.495298][T28581] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 478.503279][T28581] R13: 0000000000000074 R14: 00000000004c3143 R15: 0000000000000001 08:05:50 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000000)={0x80, 0x6}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 478.987468][T28581] Mem-Info: [ 478.991087][T28581] active_anon:208983 inactive_anon:4131 isolated_anon:0 [ 478.991087][T28581] active_file:26973 inactive_file:119425 isolated_file:0 [ 478.991087][T28581] unevictable:1 dirty:127 writeback:0 unstable:0 [ 478.991087][T28581] slab_reclaimable:21845 slab_unreclaimable:211361 [ 478.991087][T28581] mapped:63455 shmem:4867 pagetables:2306 bounce:0 [ 478.991087][T28581] free:859966 free_pcp:973 free_cma:0 [ 479.055930][T28581] Node 0 active_anon:833464kB inactive_anon:16496kB active_file:107720kB inactive_file:477288kB unevictable:4kB isolated(anon):0kB isolated(file):0kB mapped:253820kB dirty:440kB writeback:0kB shmem:19440kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 995328kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 479.094190][T28581] Node 1 active_anon:2468kB inactive_anon:28kB active_file:172kB inactive_file:412kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:68kB writeback:0kB shmem:28kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 479.131410][T28581] Node 0 DMA free:10368kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:4kB inactive_anon:0kB active_file:0kB inactive_file:4kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:64kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 479.212176][T28581] lowmem_reserve[]: 0 2537 2537 2537 2537 [ 479.225130][T28581] Node 0 DMA32 free:52380kB min:60680kB low:69704kB high:78728kB reserved_highatomic:2048KB active_anon:833460kB inactive_anon:16496kB active_file:107720kB inactive_file:477284kB unevictable:4kB writepending:440kB present:3129332kB managed:2600764kB mlocked:0kB kernel_stack:9296kB pagetables:7560kB bounce:0kB free_pcp:1396kB local_pcp:584kB free_cma:0kB [ 479.281708][T28581] lowmem_reserve[]: 0 0 0 0 0 [ 479.286739][T28581] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 479.322757][T28581] lowmem_reserve[]: 0 0 0 0 0 [ 479.327540][T28581] Node 1 Normal free:3377056kB min:53780kB low:67224kB high:80668kB reserved_highatomic:0KB active_anon:2368kB inactive_anon:28kB active_file:172kB inactive_file:412kB unevictable:0kB writepending:68kB present:3932160kB managed:3870200kB mlocked:0kB kernel_stack:1740kB pagetables:1664kB bounce:0kB free_pcp:2428kB local_pcp:1320kB free_cma:0kB [ 479.372884][T28581] lowmem_reserve[]: 0 0 0 0 0 [ 479.381548][T28581] Node 0 DMA: 2*4kB (M) 3*8kB (U) 11*16kB (UME) 3*32kB (UM) 3*64kB (UME) 1*128kB (M) 2*256kB (ME) 4*512kB (UME) 3*1024kB (UME) 2*2048kB (UE) 0*4096kB = 10352kB [ 479.399131][T28581] Node 0 DMA32: 525*4kB (ME) 523*8kB (UMEH) 618*16kB (UMEH) 337*32kB (UMEH) 81*64kB (UMEH) 51*128kB (UMH) 23*256kB (UMEH) 12*512kB (UE) 0*1024kB 1*2048kB (U) 0*4096kB = 52748kB [ 479.417268][T28581] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 479.431032][T28581] Node 1 Normal: 431*4kB (UM) 95*8kB (ME) 141*16kB (M) 78*32kB (UME) 26*64kB (UME) 26*128kB (UME) 10*256kB (UM) 4*512kB (ME) 3*1024kB (UME) 1*2048kB (E) 819*4096kB (M) = 3376580kB [ 479.449575][T28581] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 479.459808][T28581] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 479.470104][T28581] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 479.480327][T28581] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 479.490347][T28581] 62974 total pagecache pages [ 479.495035][T28581] 0 pages in swap cache [ 479.500403][T28581] Swap cache stats: add 0, delete 0, find 0/0 [ 479.506467][T28581] Free swap = 0kB [ 479.516087][T28581] Total swap = 0kB [ 479.520515][T28581] 1965979 pages RAM [ 479.524327][T28581] 0 pages HighMem/MovableOnly 08:05:51 executing program 3: open(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:51 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400341042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000100)={0x1, 0x773, 0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x37e8f56e2d354c84}, 'batadv_slave_1\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000480)={0x9f0000, 0x7, 0x7ff, 0xffffffffffffffff, 0x0, &(0x7f0000000440)={0x990a7b, 0xffffffff, [], @value64=0xab7}}) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet(0x2, 0x80000, 0x6) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f0000000080)={r6, 0x0, 0x10}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f00000004c0)=ANY=[@ANYRES32=r6, @ANYBLOB="7b00000070e0028487ebac6185e8b47bdc092e80b2eb27ebe362d032f5de8cd7b4c8bb07d295ae4ac2da893271b169725c8d54283aab0f98e7fbc2e6e1d44eb595c283ecb4423e5d8b9c0ad37c909aff602108601fc1d2d01e8bab1fbaefa812cbad60010b4f08c231f5b098019e5038bd19c29b922c4e08fb03e732207dd7"], &(0x7f0000000580)=0x83) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f00000005c0)={0x8000, 0x200, 0x8000, 0xfffeffff, 0x800, 0x400, 0x78, 0xbde, r7}, &(0x7f0000000600)=0x20) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r8, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:05:51 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:05:51 executing program 0: syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='errors5recover,disable_sparse=yes,fmask=0']) [ 479.530246][T28581] 344262 pages reserved [ 479.534413][T28581] 0 pages cma reserved [ 499.188832][ T0] NOHZ: local_softirq_pending 08 [ 519.669386][ T0] NOHZ: local_softirq_pending 08 [ 522.240761][ T0] NOHZ: local_softirq_pending 08 [ 563.832085][ T0] NOHZ: local_softirq_pending 08 [ 582.388657][ T0] NOHZ: local_softirq_pending 08 [ 607.938073][ T320] tipc: TX() has been purged, node left! [ 608.068048][ T320] tipc: TX() has been purged, node left! [ 608.247941][ T320] tipc: TX() has been purged, node left! [ 608.427953][ T320] tipc: TX() has been purged, node left! [ 608.617981][ T320] tipc: TX() has been purged, node left! [ 608.828017][ T320] tipc: TX() has been purged, node left! [ 609.008003][ T320] tipc: TX() has been purged, node left! [ 609.188035][ T320] tipc: TX() has been purged, node left! [ 609.348009][ T320] tipc: TX() has been purged, node left! [ 609.517913][ T320] tipc: TX() has been purged, node left! [ 609.697948][ T320] tipc: TX() has been purged, node left! [ 609.877958][ T320] tipc: TX() has been purged, node left! [ 610.037986][ T320] tipc: TX() has been purged, node left! [ 610.208037][ T320] tipc: TX() has been purged, node left! [ 610.387990][ T320] tipc: TX() has been purged, node left! [ 610.608003][ T320] tipc: TX() has been purged, node left! [ 610.778801][ T320] tipc: TX() has been purged, node left! [ 610.948205][ T320] tipc: TX() has been purged, node left! [ 611.127985][ T320] tipc: TX() has been purged, node left! [ 611.337986][ T320] tipc: TX() has been purged, node left! [ 611.498057][ T320] tipc: TX() has been purged, node left! [ 611.678161][ T320] tipc: TX() has been purged, node left! [ 611.857993][ T320] tipc: TX() has been purged, node left! [ 612.038063][ T320] tipc: TX() has been purged, node left! [ 612.198014][ T320] tipc: TX() has been purged, node left! [ 612.378089][ T320] tipc: TX() has been purged, node left! [ 612.469145][ T0] NOHZ: local_softirq_pending 08 [ 612.548132][ T320] tipc: TX() has been purged, node left! [ 612.748403][ T320] tipc: TX() has been purged, node left! [ 612.938042][ T320] tipc: TX() has been purged, node left! [ 613.138056][ T320] tipc: TX() has been purged, node left! [ 613.298008][ T320] tipc: TX() has been purged, node left! [ 613.497998][ T320] tipc: TX() has been purged, node left! [ 613.677990][ T320] tipc: TX() has been purged, node left! [ 613.847999][ T320] tipc: TX() has been purged, node left! [ 614.028029][ T320] tipc: TX() has been purged, node left! [ 614.197964][ T320] tipc: TX() has been purged, node left! [ 614.438042][ T320] tipc: TX() has been purged, node left! [ 614.598032][ T320] tipc: TX() has been purged, node left! [ 614.778001][ T320] tipc: TX() has been purged, node left! [ 614.978016][ T320] tipc: TX() has been purged, node left! [ 615.158015][ T320] tipc: TX() has been purged, node left! [ 615.338013][ T320] tipc: TX() has been purged, node left! [ 615.537985][ T320] tipc: TX() has been purged, node left! [ 615.727991][ T320] tipc: TX() has been purged, node left! [ 615.908039][ T320] tipc: TX() has been purged, node left! [ 616.128035][ T320] tipc: TX() has been purged, node left! [ 616.328056][ T320] tipc: TX() has been purged, node left! [ 616.498075][ T320] tipc: TX() has been purged, node left! [ 616.718042][ T320] tipc: TX() has been purged, node left! [ 616.908430][ T320] tipc: TX() has been purged, node left! [ 617.108003][ T320] tipc: TX() has been purged, node left! [ 617.287951][ T320] tipc: TX() has been purged, node left! [ 617.468011][ T320] tipc: TX() has been purged, node left! [ 617.628028][ T320] tipc: TX() has been purged, node left! [ 617.808402][ T320] tipc: TX() has been purged, node left! [ 617.977984][ T320] tipc: TX() has been purged, node left! [ 618.148122][ T320] tipc: TX() has been purged, node left! [ 618.327993][ T320] tipc: TX() has been purged, node left! [ 618.548016][ T320] tipc: TX() has been purged, node left! [ 618.707949][ T320] tipc: TX() has been purged, node left! [ 618.869027][ T320] tipc: TX() has been purged, node left! [ 619.058051][ T320] tipc: TX() has been purged, node left! [ 619.217942][ T320] tipc: TX() has been purged, node left! [ 619.378063][ T320] tipc: TX() has been purged, node left! [ 619.557974][ T320] tipc: TX() has been purged, node left! [ 619.727933][ T320] tipc: TX() has been purged, node left! [ 619.939489][ T320] tipc: TX() has been purged, node left! [ 620.097949][ T320] tipc: TX() has been purged, node left! [ 620.288005][ T320] tipc: TX() has been purged, node left! [ 620.448003][ T320] tipc: TX() has been purged, node left! [ 620.608000][ T320] tipc: TX() has been purged, node left! [ 620.867922][ T320] tipc: TX() has been purged, node left! [ 621.028273][ T320] tipc: TX() has been purged, node left! [ 621.207953][ T320] tipc: TX() has been purged, node left! [ 621.407951][ T320] tipc: TX() has been purged, node left! [ 621.607952][ T320] tipc: TX() has been purged, node left! [ 621.777977][ T320] tipc: TX() has been purged, node left! [ 621.939521][ T320] tipc: TX() has been purged, node left! [ 622.069735][ T0] NOHZ: local_softirq_pending 08 [ 622.098065][ T320] tipc: TX() has been purged, node left! [ 622.257981][ T320] tipc: TX() has been purged, node left! [ 622.417982][ T320] tipc: TX() has been purged, node left! [ 622.608079][ T320] tipc: TX() has been purged, node left! [ 622.767974][ T320] tipc: TX() has been purged, node left! [ 622.928014][ T320] tipc: TX() has been purged, node left! [ 623.108052][ T320] tipc: TX() has been purged, node left! [ 623.268066][ T320] tipc: TX() has been purged, node left! [ 623.447999][ T320] tipc: TX() has been purged, node left! [ 623.638065][ T320] tipc: TX() has been purged, node left! [ 623.818004][ T320] tipc: TX() has been purged, node left! [ 624.018010][ T320] tipc: TX() has been purged, node left! [ 624.178012][ T320] tipc: TX() has been purged, node left! [ 624.368031][ T320] tipc: TX() has been purged, node left! [ 624.528023][ T320] tipc: TX() has been purged, node left! [ 624.748002][ T320] tipc: TX() has been purged, node left! [ 624.947990][ T320] tipc: TX() has been purged, node left! [ 625.147958][ T320] tipc: TX() has been purged, node left! [ 625.318049][ T320] tipc: TX() has been purged, node left! [ 625.498035][ T320] tipc: TX() has been purged, node left! [ 625.708141][ T320] tipc: TX() has been purged, node left! [ 625.898021][ T320] tipc: TX() has been purged, node left! [ 626.088082][ T320] tipc: TX() has been purged, node left! [ 626.318065][ T320] tipc: TX() has been purged, node left! [ 626.498054][ T320] tipc: TX() has been purged, node left! [ 626.667996][ T320] tipc: TX() has been purged, node left! [ 626.828085][ T320] tipc: TX() has been purged, node left! [ 626.998859][ T320] tipc: TX() has been purged, node left! [ 627.188198][ T320] tipc: TX() has been purged, node left! [ 627.368032][ T320] tipc: TX() has been purged, node left! [ 627.548009][ T320] tipc: TX() has been purged, node left! [ 627.727995][ T320] tipc: TX() has been purged, node left! [ 627.888009][ T320] tipc: TX() has been purged, node left! [ 628.098142][ T320] tipc: TX() has been purged, node left! [ 628.328169][ T320] tipc: TX() has been purged, node left! [ 628.538090][ T320] tipc: TX() has been purged, node left! [ 628.698110][ T320] tipc: TX() has been purged, node left! [ 628.908090][ T320] tipc: TX() has been purged, node left! [ 759.029298][ T1139] INFO: task syz-executor.4:28622 blocked for more than 143 seconds. [ 759.037455][ T1139] Not tainted 5.6.0-syzkaller #0 [ 759.043891][ T1139] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 759.052732][ T1139] syz-executor.4 D26064 28622 7478 0x80004006 [ 759.060126][ T1139] Call Trace: [ 759.063437][ T1139] ? __schedule+0x805/0xc90 [ 759.068155][ T1139] ? schedule+0x188/0x220 [ 759.072490][ T1139] ? rwsem_down_write_slowpath+0x7d0/0xd60 [ 759.078598][ T1139] ? down_write+0x125/0x130 [ 759.083123][ T1139] ? unregister_netdevice_notifier+0x30/0x380 [ 759.089271][ T1139] ? sock_close+0x94/0x260 [ 759.093695][ T1139] ? bcm_release+0x77/0x800 [ 759.098286][ T1139] ? down_write+0xcd/0x130 [ 759.102715][ T1139] ? sock_close+0xd8/0x260 [ 759.107121][ T1139] ? sock_mmap+0x90/0x90 [ 759.111461][ T1139] ? __fput+0x2ed/0x750 [ 759.115623][ T1139] ? task_work_run+0x147/0x1d0 [ 759.120485][ T1139] ? do_exit+0x5ef/0x1f80 [ 759.124834][ T1139] ? do_group_exit+0x15e/0x2c0 [ 759.129734][ T1139] ? get_signal+0x13cf/0x1d60 [ 759.134466][ T1139] ? do_signal+0x33/0x610 [ 759.139690][ T1139] ? __fd_install+0x251/0x490 [ 759.144379][ T1139] ? prepare_exit_to_usermode+0x280/0x600 [ 759.150193][ T1139] ? prepare_exit_to_usermode+0x32a/0x600 [ 759.155919][ T1139] ? syscall_return_slowpath+0xf9/0x420 [ 759.161569][ T1139] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 759.167718][ T1139] [ 759.167718][ T1139] Showing all locks held in the system: [ 759.176495][ T1139] 3 locks held by kworker/u4:6/320: [ 759.181827][ T1139] #0: ffff8880a9b79938 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x6df/0xfd0 [ 759.192162][ T1139] #1: ffffc90001f07d80 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x71e/0xfd0 [ 759.202048][ T1139] #2: ffffffff895a9330 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xac/0xb80 [ 759.211528][ T1139] 1 lock held by khungtaskd/1139: [ 759.216577][ T1139] #0: ffffffff892e6bd0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30 [ 759.226029][ T1139] 2 locks held by syz-executor.4/28622: [ 759.231680][ T1139] #0: ffff8882182a1210 (&sb->s_type->i_mutex_key#14){+.+.}-{3:3}, at: sock_close+0x94/0x260 [ 759.241914][ T1139] #1: ffffffff895a9330 (pernet_ops_rwsem){++++}-{3:3}, at: unregister_netdevice_notifier+0x30/0x380 [ 759.253374][ T1139] [ 759.255696][ T1139] ============================================= [ 759.255696][ T1139] [ 759.264186][ T1139] NMI backtrace for cpu 1 [ 759.268710][ T1139] CPU: 1 PID: 1139 Comm: khungtaskd Not tainted 5.6.0-syzkaller #0 [ 759.276594][ T1139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 759.286639][ T1139] Call Trace: [ 759.289931][ T1139] dump_stack+0x1e9/0x30e [ 759.294254][ T1139] nmi_cpu_backtrace+0x9f/0x180 [ 759.299094][ T1139] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 759.305160][ T1139] nmi_trigger_cpumask_backtrace+0x16a/0x280 [ 759.311122][ T1139] watchdog+0xd2a/0xd40 [ 759.315259][ T1139] kthread+0x353/0x380 [ 759.319314][ T1139] ? hungtask_pm_notify+0x50/0x50 [ 759.324356][ T1139] ? kthread_blkcg+0xd0/0xd0 [ 759.328933][ T1139] ret_from_fork+0x24/0x30 [ 759.333486][ T1139] Sending NMI from CPU 1 to CPUs 0: [ 759.339078][ C0] NMI backtrace for cpu 0 [ 759.339083][ C0] CPU: 0 PID: 4105 Comm: systemd-journal Not tainted 5.6.0-syzkaller #0 [ 759.339087][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 759.339090][ C0] RIP: 0010:unwind_next_frame+0x607/0x1cf0 [ 759.339097][ C0] Code: 00 00 00 00 fc ff df 43 8a 04 34 84 c0 0f 85 f2 0f 00 00 48 89 e8 48 c1 e8 03 42 8a 04 30 84 c0 0f 85 05 10 00 00 41 0f b7 07 <89> c3 83 e3 0f 66 85 db 0f 84 8c 00 00 00 8d 43 fe 83 f8 07 0f 87 [ 759.339099][ C0] RSP: 0018:ffffc90001607a08 EFLAGS: 00000246 [ 759.339105][ C0] RAX: 0000000000000015 RBX: ffffffff8981d7cc RCX: dffffc0000000000 [ 759.339109][ C0] RDX: ffffffff89e86562 RSI: ffffffff8981d7b0 RDI: ffffffff81328bbc [ 759.339112][ C0] RBP: ffffffff89e86567 R08: 0000000000000020 R09: ffffc90001607b78 [ 759.339116][ C0] R10: fffff520002c0f65 R11: 0000000000000000 R12: 1ffffffff13d0cac [ 759.339119][ C0] R13: ffffc90001607ad0 R14: dffffc0000000000 R15: ffffffff89e86566 [ 759.339122][ C0] FS: 00007f8071a2f8c0(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 759.339125][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 759.339129][ C0] CR2: 00007f806efa7000 CR3: 0000000092f27000 CR4: 00000000001406f0 [ 759.339132][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 759.339135][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 759.339137][ C0] Call Trace: [ 759.339140][ C0] ? do_mkdirat+0x3a/0x310 [ 759.339143][ C0] ? stack_trace_save+0x150/0x150 [ 759.339145][ C0] arch_stack_walk+0xb4/0xe0 [ 759.339147][ C0] ? do_mkdirat+0x3a/0x310 [ 759.339150][ C0] stack_trace_save+0xad/0x150 [ 759.339153][ C0] __kasan_kmalloc+0x114/0x160 [ 759.339155][ C0] ? __kasan_kmalloc+0x114/0x160 [ 759.339158][ C0] ? kmem_cache_alloc+0x1f5/0x2d0 [ 759.339160][ C0] ? getname_flags+0xb8/0x610 [ 759.339163][ C0] ? do_mkdirat+0x3a/0x310 [ 759.339166][ C0] ? rcu_read_lock_sched_held+0x106/0x170 [ 759.339181][ C0] ? lock_acquire+0x169/0x480 [ 759.339184][ C0] ? do_raw_spin_unlock+0x134/0x8d0 [ 759.339186][ C0] ? _raw_spin_unlock+0x24/0x40 [ 759.339189][ C0] ? cache_alloc_refill+0x3cf/0x3f0 [ 759.339192][ C0] ? kmem_cache_alloc+0x194/0x2d0 [ 759.339194][ C0] ? getname_flags+0xb8/0x610 [ 759.339197][ C0] kmem_cache_alloc+0x1f5/0x2d0 [ 759.339199][ C0] getname_flags+0xb8/0x610 [ 759.339202][ C0] ? syscall_trace_enter+0x614/0x8c0 [ 759.339204][ C0] do_mkdirat+0x3a/0x310 [ 759.339207][ C0] do_syscall_64+0xf3/0x1b0 [ 759.339210][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 759.339212][ C0] RIP: 0033:0x7f8070ceb687 [ 759.339219][ C0] Code: 00 b8 ff ff ff ff c3 0f 1f 40 00 48 8b 05 09 d8 2b 00 64 c7 00 5f 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d e1 d7 2b 00 f7 d8 64 89 01 48 [ 759.339221][ C0] RSP: 002b:00007ffd480680e8 EFLAGS: 00000293 ORIG_RAX: 0000000000000053 [ 759.339227][ C0] RAX: ffffffffffffffda RBX: 00007ffd4806b150 RCX: 00007f8070ceb687 [ 759.339231][ C0] RDX: 0000000000000000 RSI: 00000000000001ed RDI: 000055a6b24098a0 [ 759.339234][ C0] RBP: 00007ffd48068120 R08: 000055a6b08093e5 R09: 0000000000000018 [ 759.339237][ C0] R10: 0000000000000069 R11: 0000000000000293 R12: 0000000000000000 [ 759.339241][ C0] R13: 0000000000000001 R14: 000055a6b24098a0 R15: 00007ffd48068760 [ 759.659081][ T1139] Kernel panic - not syncing: hung_task: blocked tasks [ 759.665950][ T1139] CPU: 1 PID: 1139 Comm: khungtaskd Not tainted 5.6.0-syzkaller #0 [ 759.673838][ T1139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 759.683898][ T1139] Call Trace: [ 759.687207][ T1139] dump_stack+0x1e9/0x30e [ 759.691545][ T1139] panic+0x264/0x7a0 [ 759.695449][ T1139] ? nmi_trigger_cpumask_backtrace+0x206/0x280 [ 759.701611][ T1139] watchdog+0xd3d/0xd40 [ 759.705760][ T1139] kthread+0x353/0x380 [ 759.709808][ T1139] ? hungtask_pm_notify+0x50/0x50 [ 759.714833][ T1139] ? kthread_blkcg+0xd0/0xd0 [ 759.719438][ T1139] ret_from_fork+0x24/0x30 [ 759.725288][ T1139] Kernel Offset: disabled [ 759.729637][ T1139] Rebooting in 86400 seconds..