x00\x00\x00\x00\x00\x02']}], @payload_conn={{{0x1a, 0x0, 0x1, 0x0, 0x0, 0x6, 0x3, 0x2, 0x6, 0x0, 0x0, 0x4, 0x3, 0x0, 0x6, 0x80, 0x4, 0x4e20, 0x4e23}}, [0x0, 0x0]}}}}}}, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000000)={0x28, r3, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x8}]}]}]}, 0x28}}, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0xc, 0x20010, r2, 0x50c66000) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000480)="002140d13065185129ca6778bbe4c53c0a78df2fa019", 0x16}], 0x1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000140)) ioctl$SOUND_PCM_READ_BITS(r1, 0x80045005, &(0x7f0000000100)) 20:10:40 executing program 0: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000080)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2e) openat$sequencer2(0xffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x84200, 0x0) openat$sequencer(0xffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x10200, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) 20:10:40 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x32) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r1 = fcntl$getown(r0, 0x9) rt_sigqueueinfo(r1, 0x8, &(0x7f0000000040)={0x39, 0x8, 0xffff3a2d}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r2}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r0, 0x8000000) mlockall(0x1) 20:10:40 executing program 3: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff0204000000000100000000000000000000000000000205", 0x18) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=ANY=[], 0x20) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000080)={0x32, 0x0, [], [@pad1]}, 0xe397ff2cd122fa2d) sendto$inet6(r0, &(0x7f0000000600)="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", 0x569, 0x0, &(0x7f00004d4fe4)={0xa, 0x4e20, 0x0, @mcast1, 0x1}, 0x1c) openat$null(0xffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x180, 0x0) 20:10:40 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000000)={0x28, r0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x8}]}]}]}, 0x28}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000000)={0x28, r2, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x8}]}]}]}, 0x28}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r3, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000000)={0x28, r4, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x8}]}]}]}, 0x28}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000000)={0x28, r6, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x8}]}]}]}, 0x28}}, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r7, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000000)={0x28, r8, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x8}]}]}]}, 0x28}}, 0x0) r9 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000e00)=[{&(0x7f0000000000)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000002c0)="4a5bc7133ef4fbb5dddd73b1c456b254d0508613e9b1fde6c2af81504be9cd95fc9997a87221973f029575ed5f1f1931f17626fc4eaaecd4e7c78a3aea75209db4261e57f32ed9acf362dfc71c1b1b13b6bd50d7af837cd572459dd391002711dac00a9642f2a648ac49c6cfd43687cf7e1d50c6583e01c8765f50fc3dc437b3306688c1a0332b51cf657a0a2ff16a46f7b84785cc0a277d478646765ac3b5cc75cfd969e3227680713fdd48759d41e3", 0xb0}, {&(0x7f0000000100)="79883f3a", 0x4}, {&(0x7f0000000380)="384c9d64fe33e97c615e104bae18fe7da76935f3bc47324ef36103e40216eaefe9d96deaacb6248e21da7bffee57ce0c7a03574e519d5d0c57a558ab0182a67c8b8dff8739dfcaf0ec8c9e5d732f7ce5e26caad3ac48e62c", 0x58}, {&(0x7f0000000140)="78c84d5f4fee1ab6ee6abab58c947495215a9687be59346de1c31633a5cc10c6a5174dfd7841ab9b", 0x28}], 0x4, &(0x7f0000000400)=[@cred={{0x18}}], 0x18, 0x20000040}, {&(0x7f0000000440)=@abs={0x0, 0x0, 0xffffffff}, 0x6e, &(0x7f0000000600)=[{&(0x7f0000000640)="99f689e9ee35700936947ffeffafa664c73b452c78caaf02aa880bc39a2325f12271712454788347ba8960a954b1629cbadb62e57b3606decd1a1ea793e32951", 0x40}, {&(0x7f0000000500)="16", 0x1}, {&(0x7f0000000540)="8b1e25f8ac5c57d35926214848c550b2140b6347f3823e1936514ae0061b9520fe45da8dc54cd9eaad53fb67b4e16a7bf28185e6c3ee1777dd0e123a6a7b85cc627e2155972570413c58a9252f0831091e7a9e2dd9928529224ee7e6928a118f5e8dcefda45b061763cb3f630a8f0aeded940d495ad8756a8f24df27a2ee3df6abb9db2d777bf3942c7b74e30297fcc223b8dcb16fcf377d749cdd9a116644f53a81b29276a2b7d4e96679ea", 0xac}], 0x3, &(0x7f0000000800)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb8, 0x8010}, {&(0x7f00000008c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000ac0)=[{&(0x7f0000000940)="24b0d7af73e962d013c02dbca5e43d988e84206ba93aa50035377ce691d1506d847027ed699fbd2bf64c74231bd8915f213bb3e8f24002c525426fefef1efd0eb12dc5a9b5b07c89fc1625aecca78f50d0e56bc28af9448c929fc8a9d12026cea48f1f11ba262a791df6d9cbaf79519a1b3c84c463dd93a629b4d586210eece125e225be94b57ddb804116ff9940e7c623e03b90a097276ed40414e4142bd3decb868dee66d695179378", 0xaa}, {&(0x7f0000000a00)="607710e0cfd9dd345e493b55ccaeabe9d4eb0c5b318cd4d628efb4f50bcbcd03051f2b5ffe25efa8607a8c5593f6b6e905e2c3f7872bc55834a67ffe45652692807c9d0c18a26fd2b6aa262a43f942", 0x4f}, {&(0x7f0000000a80)="6b7a32ada6e053aae1610395ac1d071e69b59842fc2e5a50fe8f", 0x1a}], 0x3, &(0x7f0000000d40)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18}}, @cred={{0x18, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x18}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, r3, r5, r7, r9]}}], 0x88, 0x14}], 0x3, 0x80) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7570706572646972830e3cac21a65d5b2c776f726b6469723d2e2f66696c65312c78696e6f3d6175746f2c6c6f7765727569723d2e2f6275732c00"]) [ 417.943053][ T32] audit: type=1804 audit(1595103041.048:84): pid=10634 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/43/bus" dev="sda1" ino=15917 res=1 [ 418.081078][T10633] overlayfs: unrecognized mount option "upperdir0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x3, 0x6, @link_local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000300)="60a65f7df3048e631dc5fd2d897957fbe017a2da36df56db9714baf3", 0x1c, 0x4008891, 0x0, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x2, &(0x7f0000000200)={r3, 0x5, 0x6, @local}, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, 0x0, 0x1, 0x70bd27, 0x25dfdbfb, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r3}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000084}, 0x4000000) 20:10:42 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) fcntl$getown(r1, 0x9) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r3}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:10:42 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001180)={0x5c, r2, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast2}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}, 0x1, 0x0, 0x0, 0xc005}, 0x0) [ 419.574173][T10673] JFS: c-Qiiont is an invalid error handler 20:10:42 executing program 0: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000080)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2e) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) [ 419.734480][T10673] device lo entered promiscuous mode [ 419.753186][T10670] device lo left promiscuous mode [ 419.857737][T10673] JFS: c-Qiiont is an invalid error handler [ 419.919310][ T32] audit: type=1804 audit(1595103043.021:86): pid=10687 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/44/bus" dev="sda1" ino=15923 res=1 [ 419.945980][T10679] device lo entered promiscuous mode [ 419.993851][T10670] device lo left promiscuous mode 20:10:43 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000480)="002140d13065185129ca6778bbe4c53c0a78df2fa019", 0x16}], 0x1, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) dup2(r2, r2) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PPPIOCSMAXCID(r4, 0x40047451, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000140)={0x0, 0x40, "feadc0ac3eafd77e5159e5031a8166680a6230a2c4f17d830cedfb9443710fed94f5b7e3c2b304ddf1e4341cde3380e83144f1fda1c3611ed9243d2ccb39f47a"}, &(0x7f00000000c0)=0x48) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000001c0)=@assoc_value={r5, 0x40}, &(0x7f0000000240)=0x8) r6 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_TIMESTAMP(r8, 0x1, 0x40, &(0x7f0000000080)=0x3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0xa00, 0x20000, 0x0, {0x10, 0x0, 0x0, r10}}, 0x20}}, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r7, 0x0, 0x60, &(0x7f0000000540)={'filter\x00', 0x7, 0x4, 0x3d8, 0x10c, 0x1ec, 0x0, 0x2f8, 0x2f8, 0x2f8, 0x4, &(0x7f0000000040), {[{{@uncond, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @local, 0x4, 0x1}}}, {{@uncond, 0xbc, 0xe0}, @unspec=@CONNSECMARK={0x24, 'CONNSECMARK\x00', 0x0, {0x2}}}, {{@uncond, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @multicast2, @multicast2, 0x8}}}], {{[], 0xbc, 0xe0}, {0x24}}}}, 0x424) [ 420.102636][ T32] audit: type=1804 audit(1595103043.091:87): pid=10687 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/44/bus" dev="sda1" ino=15923 res=1 20:10:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) close(r0) io_setup(0x6, &(0x7f0000000140)=0x0) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000001a40)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x7, &(0x7f0000000000), 0x244) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r4 = dup2(r3, r3) ioctl$EVIOCGPROP(r4, 0xc004743e, &(0x7f0000000380)=""/230) ioctl$SNDRV_PCM_IOCTL_TTSTAMP(r4, 0x40044103, &(0x7f0000000040)=0x7ff) pwritev(r4, &(0x7f0000000180)=[{&(0x7f0000000480)="002140d13065185129ca6778bbe4c53c0a78df2fa019", 0x16}], 0x1, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r6 = dup2(r5, r5) ioctl$EVIOCGPROP(r6, 0xc004743e, &(0x7f0000000380)=""/230) pwritev(r6, &(0x7f0000000180)=[{&(0x7f0000000480)="002140d13065185129ca6778bbe4c53c0a78df2fa019", 0x16}], 0x1, 0x0) io_submit(r1, 0x1, &(0x7f0000000480)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0x0, 0x3ec, 0x0, 0x0, r6}]) 20:10:43 executing program 0: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) 20:10:43 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0xf7ffffff, 0x90}, 0x8e00}, 0x0, 0xfffffffb, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x5) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000180), 0x4) ftruncate(r3, 0x200004) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r1, r3, 0x0, 0x80001d00c0d0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f00000003c0)={"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"}) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)={0x3c, r5, 0x536ae464467e3e0b, 0x0, 0x0, {0x23, 0x0, 0x6c}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8}}]}, 0x3c}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000840)={0xa0, r5, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x2}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x6}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x6, 0x4, 0x1}}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4000084}, 0x4008004) 20:10:44 executing program 2: getpid() sched_setattr(0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2103, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x0, &(0x7f00000000c0)=""/147, 0x6558a7e3409167e0) open(&(0x7f0000000e00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setregs(0xd, 0x0, 0x0, 0x0) ptrace$getregset(0x4205, 0x0, 0x2, 0x0) ptrace$peeksig(0x4209, 0x0, &(0x7f0000000180)={0x4, 0x0, 0x3}, &(0x7f0000000300)=[{}, {}, {}]) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000000)={0x0, 0x5, 0x10000}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) memfd_create(&(0x7f0000000000), 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffffe) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r1) 20:10:44 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) 20:10:44 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000000)={0x28, r3, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x8}]}]}]}, 0x28}}, 0x0) sendmsg$GTP_CMD_GETPDP(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x300, 0x70bd2b, 0x25dfdbfe, {}, [@GTPA_VERSION={0x8}, @GTPA_MS_ADDRESS={0x8, 0x5, @multicast2}, @GTPA_VERSION={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0xc814}, 0x0) r4 = dup2(r1, r1) ioctl$EVIOCGPROP(r4, 0xc004743e, &(0x7f0000000380)=""/230) pwritev(r4, &(0x7f0000000180)=[{&(0x7f0000000480)="002140d13065185129ca6778bbe4c53c0a78df2fa019", 0x16}], 0x1, 0x0) ioctl$VIDIOC_S_OUTPUT(r4, 0xc004562f, &(0x7f0000000000)=0xeb0) 20:10:44 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) fcntl$getown(r1, 0x9) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r3}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:10:44 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000183a87, 0x0) dup2(r1, r1) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$VIDIOC_S_INPUT(r3, 0xc0045627, &(0x7f0000000080)=0xfff) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) dup2(r4, r4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PPPIOCSMAXCID(r6, 0x40047451, &(0x7f0000000100)) ioctl$VIDIOC_ENUMAUDIO(r6, 0xc0345641, &(0x7f0000000140)={0x4, "ffbfd1b636af0a4d2a8c12c082bfabd4f2009a694c16a64b5e66c78fab953a63", 0x3, 0x1}) connect$inet(r0, &(0x7f0000000540)={0x2, 0x0, @multicast2}, 0x10) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto(r7, &(0x7f00000000c0)="00b8f2598340", 0x6, 0x8040, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000)="0300", 0x2, 0x0, 0x0, 0x0) 20:10:45 executing program 0: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) [ 421.863704][ T32] audit: type=1804 audit(1595103044.973:88): pid=10744 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/45/bus" dev="sda1" ino=15720 res=1 [ 422.048107][ T32] audit: type=1804 audit(1595103045.013:89): pid=10744 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/45/bus" dev="sda1" ino=15720 res=1 20:10:45 executing program 2: r0 = openat$vsock(0xffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x204080, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r2 = dup2(r1, r1) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000380)=""/230) pwritev(r2, &(0x7f0000000180)=[{&(0x7f0000000480)="002140d13065185129ca6778bbe4c53c0a78df2fa019", 0x16}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r3 = openat$vcsa(0xffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x8000, 0x0) ioctl$SIOCRSACCEPT(r3, 0x89e3) socket$nl_rdma(0x10, 0x3, 0x14) 20:10:45 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, &(0x7f0000000440)='-\xe3\x11T\xf0\x9b\xbe\x16\f\x91,\x83TR\xc4\xf1\xb1\xee\xf3;\xa2\xc9\x8b/\xe2\xb2\x18\x01\x10\x806\xb6\xd2\xc2\x05%%\x10&\x884\xe9\xdav\xc7\xa4u\xc7\xe1\xe9\x19\xe1\xc5$\f N\x1e\xc0\x97V!\xad\xd9\x7f\"\xe3-*+\xc7gK\x00\x16\fQG/\xe7\xbf\x02\x94\xe3h\xd47sZFe~\xd2\xb2\xef\xd4\x00\xff\xf7\xaf\xacSH\xeej\xfc\x04\x05\x8c\x15h4.\xd1\xa2\xd9\xbb\x8f\x1ab\x10\x00\xa9#\xf7.8\xfb\xb7\xacm\xba\xe7\x8c?\x85^\x93\xc7vO\xaf\xfa\x88Z\xe4\xf4\xc8\xa4k\x13:\x04\xe9\x83X\x99\x1f<\x1ah5\x0fJ\xa6\xb50Zo\x1at\xe9\xda\xf6S\x8a\\:\xde\xeap\x92-2\x95\xec\xe7$w{\x96\xcb\xb5\x86\xd0\xc8t\x19\xcax)\x93C\x05\xc4\xa9\xe0\am.\"\xd6l\xe2\xe3C\\\xafn\x01\xda\x01\x97\xb7\xbb\xe2y\xf9\xb7\xfb\x96\xb7\x7f\xa6\xcc\xd6L\x1fh\xf3\xb0\x1c\xe1\x84\t\x93,\xceL\xb8\x1e\x99k\\66\xd1h?\"\x03t\xc6\xb8\xbd\xe9_\x03g\a\x97\x9b\x8d\x1a\xaf\xd8\x9b\xca\x87F\xe9HE\x89\n\xa6;\xa9\x03\xbc\x87\xba\xa7\x02)\xdeX\xcdd\xc0\xe2\xccj\xca\xe7\xac\r\xebFo\xc8\xd2\"\'M\x7f\xd3\x01\xa7\xacTrw,\xab\xde\x9b\xcfF\xb1!\x95\xac\x81*\xe3\x0fE\x9ez2:\xbb\xfe|lvWE\x90\xee\xea\x05\xfa\ti\xbb\xe5S+\xdb\xe6|\xccK^S\xd4\nmQ#\xdfM\xeaCRa>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x3, 0x6, @link_local}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x2, &(0x7f0000000200)={r3, 0x5, 0x6, @local}, 0x10) socketpair(0x1e, 0x800, 0xb2fe, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f0000000080)=0x10140a0, 0x4) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x200, 0x0, 0x0, {}, [@IFLA_LINK={0x8, 0x5, r3}]}, 0x28}}, 0x0) [ 422.463938][T10763] devpts: called with bogus options 20:10:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r2 = dup2(r1, r1) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000380)=""/230) pwritev(r2, &(0x7f0000000180)=[{&(0x7f0000000480)="002140d13065185129ca6778bbe4c53c0a78df2fa019", 0x16}], 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, &(0x7f0000000040)={0x0, 0x0, 0x5, 0x1, 0x3, 0x1, 0x0, 0x1, 0x2, 0x2, 0xfffffff7, 0xffff0000}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="540000001000010401000000fddbdf2500000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002c001280090001007866726d000000001c00028008020200040000000800010000000000080001000400000008000300", @ANYRES32], 0x54}}, 0x0) 20:10:45 executing program 0: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) 20:10:45 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r2 = dup2(r1, r1) pwritev(r2, &(0x7f0000000180)=[{&(0x7f0000000480)="002140d13065185129ca6778bbe4c53c0a78df2fa019", 0x16}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') socket(0x11, 0x800000003, 0x0) socket(0x11, 0x800000003, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000240)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="01000001000000040001801c0001803fd5ec08", @ANYRES32=0x0, @ANYBLOB="080003000100000008000100", @ANYRES32=0x0, @ANYBLOB], 0x34}}, 0x20048004) fsetxattr$security_selinux(r3, &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:device_t:s0\x00', 0x1e, 0x1) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) dup2(r5, r5) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PPPIOCSMAXCID(r7, 0x40047451, &(0x7f0000000100)) io_uring_register$IORING_REGISTER_EVENTFD(r7, 0x4, &(0x7f0000000080)=r7, 0x1) ioctl$KVM_SET_PIT2(r7, 0x4070aea0, &(0x7f0000000000)={[{0x8, 0x4, 0x4, 0x4, 0x4, 0x2, 0x4, 0x7f, 0x5, 0x5, 0x1, 0x5a, 0x3}, {0x6, 0xcf09, 0x8, 0x3f, 0x4, 0x40, 0x0, 0x5a, 0x8, 0x0, 0x8, 0x98, 0x5}, {0x8, 0xfffe, 0x0, 0xff, 0x9b, 0x40, 0x1, 0xff, 0x3, 0xff, 0x0, 0xa5, 0xe6}], 0xfffffffc}) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x20a927, 0x2d, 0x0, 0xffffffffffffffff}) r9 = dup(r8) mmap(&(0x7f000000a000/0x200000)=nil, 0x100000, 0x0, 0x12, r9, 0x0) 20:10:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f0000000040)={0x9d0000, 0x5162, 0x7ff, r0, 0x0, &(0x7f0000000000)={0x9a091f, 0x5, [], @ptr=0x4}}) sendmsg$NLBL_MGMT_C_REMOVE(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=0x0, @ANYRESHEX=r1], 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x20000021) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@ipv6_delrule={0x30, 0x18, 0x1, 0x0, 0x25dfdbfd, {0xa, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@FRA_DST={0x14, 0x1, @ipv4={[], [], @local}}]}, 0x30}}, 0x0) [ 423.030935][T10778] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 20:10:46 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) fcntl$getown(r1, 0x9) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r3}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) [ 423.105068][ T32] audit: type=1400 audit(1595103046.215:90): avc: denied { relabelto } for pid=10779 comm="syz-executor.4" name="NETLINK" dev="sockfs" ino=33546 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=netlink_generic_socket permissive=1 [ 423.163133][T10784] x86/PAT: syz-executor.4:10784 map pfn RAM range req write-combining for [mem 0x19a00000-0x19afffff], got write-back [ 423.251429][T10793] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 423.456276][T10784] x86/PAT: syz-executor.4:10784 map pfn RAM range req write-combining for [mem 0x18100000-0x181fffff], got write-back 20:10:46 executing program 0: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) 20:10:46 executing program 3: r0 = socket(0x10, 0x80002, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000002480)={&(0x7f0000000080)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000002440)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/229, 0xe5}, {&(0x7f0000001300)=""/23, 0x17}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/242, 0xf2}], 0x6}, 0x102) r1 = openat$autofs(0xffffff9c, &(0x7f00000024c0)='/dev/autofs\x00', 0x210003, 0x0) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f0000002500)={@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x3, [@null, @default, @null, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}) sendmsg$nl_route_sched(r0, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002940)={&(0x7f0000000000)=@newtaction={0x7c, 0x30, 0x53b, 0x0, 0x0, {}, [{0x68, 0x1, [@m_vlan={0x64, 0x1, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x38, 0x2, 0x0, 0x1, [@TCA_VLAN_PARMS={0x1c, 0x2, {{}, 0x2}}, @TCA_VLAN_PUSH_VLAN_ID={0x6}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x7c}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) execveat(r1, &(0x7f0000002640)='./file0\x00', &(0x7f0000002800)=[&(0x7f0000002680)='\x00', &(0x7f00000026c0)='\x00', &(0x7f0000002700)='&(\x00', &(0x7f0000002740)='\x00', &(0x7f0000002780)='*^/*\xbf+\x00', &(0x7f00000027c0)='ethtool\x00'], &(0x7f0000002a00)=[&(0x7f0000002840)='\x00', &(0x7f0000002880)='#!\x00', &(0x7f00000028c0)='ethtool\x00', &(0x7f0000002900)='vlan\x00', &(0x7f00000029c0)='vlan\x00'], 0x400) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000000)={0x28, r3, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x8}]}]}]}, 0x28}}, 0x0) accept4(r2, &(0x7f0000002580)=@nfc, &(0x7f0000002600)=0x80, 0x80800) [ 423.571086][ T32] audit: type=1804 audit(1595103046.686:91): pid=10801 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/46/bus" dev="sda1" ino=15719 res=1 [ 423.694697][ T32] audit: type=1804 audit(1595103046.716:92): pid=10801 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/46/bus" dev="sda1" ino=15719 res=1 20:10:46 executing program 4: r0 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x3ff, 0x80000) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB="640000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="db80833c0000000030001280080001007369740024000280080002000a01010006000d0000000000060011004e240000060008001f0000000a000100ffffffffffff000008000a00"], 0x64}}, 0x0) 20:10:47 executing program 2: r0 = creat(&(0x7f0000001800)='./file0\x00', 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r3, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000000)={0x28, r4, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x8}]}]}]}, 0x28}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$gtp(&(0x7f0000000680)='gtp\x00') sendmsg$GTP_CMD_NEWPDP(r5, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000200)={0x3c, r6, 0xc694d42685586125, 0x0, 0x0, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @GTPA_LINK={0x8}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_PEER_ADDRESS={0x8, 0x4, @multicast1}, @GTPA_I_TEI={0x8}]}, 0x3c}}, 0x0) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r8 = dup2(r7, r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000380)=""/230) pwritev(r8, &(0x7f0000000180)=[{&(0x7f0000000480)="002140d13065185129ca6778bbe4c53c0a78df2fa019", 0x16}], 0x1, 0x0) sendmsg$GTP_CMD_NEWPDP(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r6, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@GTPA_NET_NS_FD={0x8, 0x7, r8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2404c091}, 0x1) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x75, &(0x7f0000000140)={r2}, &(0x7f0000000180)=0x10) [ 424.175768][T10815] IPv6: sit1: Disabled Multicast RS 20:10:47 executing program 3: r0 = openat$sequencer2(0xffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$SOUND_OLD_MIXER_INFO(r0, 0x80304d65, &(0x7f0000000080)) syz_read_part_table(0x0, 0x5, &(0x7f0000000040)=[{&(0x7f00000000c0)="020185ffffff0a100000ff45ac000000000063000800000000000000024000ffffff82000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 20:10:47 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) 20:10:47 executing program 4: syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xab1e, 0x50001) clock_adjtime(0x0, &(0x7f0000000080)={0x9b13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}) [ 424.687675][T10827] loop3: p1 < > p2 p3 p4 [ 424.692416][T10827] loop3: partition table partially beyond EOD, truncated [ 424.700453][T10827] loop3: p1 start 4106 is beyond EOD, truncated [ 424.706848][T10827] loop3: p2 size 1073872896 extends beyond EOD, truncated 20:10:47 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) rt_sigqueueinfo(0x0, 0x8, &(0x7f0000000040)={0x39, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r3}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) [ 424.855879][T10827] loop3: p3 start 225 is beyond EOD, truncated [ 424.862262][T10827] loop3: p4 size 3657465856 extends beyond EOD, truncated 20:10:48 executing program 4: r0 = socket$inet(0x2, 0x100000000805, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000001b80)=[{&(0x7f0000000240)=@in={0x2, 0x0, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000280)="c5", 0x1}], 0x1, &(0x7f0000000000)=[@init={0x14, 0x84, 0x0, {0x5, 0x7, 0x8, 0x2}}], 0x14}], 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_RELOAD(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)={0x3c, r4, 0x536ae464467e3e0b, 0x0, 0x0, {0x23, 0x0, 0x6c}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8}}]}, 0x3c}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r2, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x128, r4, 0x4, 0x70bd28, 0x25dfdbfe, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd, 0x87, 'l2_drops\x00'}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd, 0x87, 'l2_drops\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd, 0x87, 'l2_drops\x00'}}]}, 0x128}, 0x1, 0x0, 0x0, 0x48000}, 0x8880) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000000)={0x28, r5, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x10}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0624fc6010000a400c000000051a82c137153e670902018003001700d1bd", 0x33fe0}], 0x1}, 0x0) r7 = dup(r6) sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, 0x2, 0x2, 0x405, 0x0, 0x0, {0x1}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x6f7}]}, 0x1c}}, 0x20040004) r8 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r8, 0x1, 0x0, 0x0, {{}, {}, {0x10, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}, 0x1, 0x0, 0x0, 0x8811}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r8, 0x400, 0x70bd29, 0x25dfdbfe, {}, [""]}, 0x1c}}, 0x8000) 20:10:48 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000180)={0x2, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r2 = dup2(r1, r1) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000380)=""/230) pwritev(r2, &(0x7f0000000180)=[{&(0x7f0000000480)="002140d13065185129ca6778bbe4c53c0a78df2fa019", 0x16}], 0x1, 0x0) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) [ 425.134914][ T4893] loop3: p1 < > p2 p3 p4 [ 425.139406][ T4893] loop3: partition table partially beyond EOD, truncated [ 425.147241][ T4893] loop3: p1 start 4106 is beyond EOD, truncated [ 425.153555][ T4893] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 425.244616][ T32] audit: type=1804 audit(1595103048.356:93): pid=10851 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/47/bus" dev="sda1" ino=15951 res=1 [ 425.269975][ T32] audit: type=1804 audit(1595103048.366:94): pid=10851 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/47/bus" dev="sda1" ino=15951 res=1 [ 425.271101][ T4893] loop3: p3 start 225 is beyond EOD, truncated [ 425.300938][ T4893] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 425.390251][T10845] loop3: p1 < > p2 p3 p4 [ 425.394992][T10845] loop3: partition table partially beyond EOD, truncated [ 425.402663][T10845] loop3: p1 start 4106 is beyond EOD, truncated [ 425.409660][T10845] loop3: p2 size 1073872896 extends beyond EOD, truncated 20:10:48 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) [ 425.511871][T10845] loop3: p3 start 225 is beyond EOD, truncated [ 425.518484][T10845] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 425.639147][T10862] usb usb3: check_ctrlrecip: process 10862 (syz-executor.2) requesting ep 01 but needs 81 [ 425.649592][T10862] usb usb3: usbfs: process 10862 (syz-executor.2) did not claim interface 0 before use [ 425.666792][T10860] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:10:49 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r2, 0x8983, &(0x7f0000000000)={0x8, 'nr0\x00', {'ip6erspan0\x00'}, 0x9}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0xc) r4 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_PROTOCOLS(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, r4, 0x2, 0x70bd2c, 0x25dfdbfc, {}, [@NLBL_MGMT_A_CV4DOI={0x8}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @remote}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @remote}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @local}]}, 0x4c}, 0x1, 0x0, 0x0, 0x801}, 0x800) [ 425.896981][T10862] usb usb3: check_ctrlrecip: process 10862 (syz-executor.2) requesting ep 01 but needs 81 [ 425.907385][T10862] usb usb3: usbfs: process 10862 (syz-executor.2) did not claim interface 0 before use 20:10:49 executing program 4: r0 = fsopen(&(0x7f0000000040)='cpuset\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r2 = dup2(r1, r1) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000380)=""/230) pwritev(r2, &(0x7f0000000180)=[{&(0x7f0000000480)="002140d13065185129ca6778bbe4c53c0a78df2fa019", 0x16}], 0x1, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x80000101005, 0x0) dup2(r3, r3) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PPPIOCSMAXCID(r5, 0x40047451, &(0x7f0000000100)) pidfd_getfd(r5, r2, 0x0) fsmount(r2, 0x0, 0xf0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000000)='cpuset\x00', &(0x7f0000000080)=']&/-%:\']}\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x7, 0x0, 0x0, 0x0) r6 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x1, 0x2000) ioctl$VIDIOC_G_PRIORITY(r6, 0x80045643, 0x2) 20:10:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="004e7c7c5b8a00001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r8}, [@IFLA_PROTO_DOWN={0x5, 0xa, 0x10}]}, 0x28}}, 0x8001) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x40}}, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r9, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001180)={0x5c, r10, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @remote}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="43561153b16e4489", @ANYRES16=r10, @ANYBLOB="04002bbd7000fedbdf2507000000050022000100000005001200aa00000005000d000000000006001a004e240000080009000300000006001b004e2000000500060067000000"], 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x46011) [ 426.397334][T10886] new mount options do not match the existing superblock, will be ignored [ 426.431786][T10887] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 426.594361][T10920] bond1: (slave vti0): The slave device specified does not support setting the MAC address [ 426.608533][T10920] bond1: (slave vti0): Error -95 calling set_mac_address 20:10:49 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) rt_sigqueueinfo(0x0, 0x8, &(0x7f0000000040)={0x39, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r3}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:10:50 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) [ 426.907028][T10930] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 426.968533][T10920] bond1: (slave vti0): The slave device specified does not support setting the MAC address [ 426.980545][T10920] bond1: (slave vti0): Error -95 calling set_mac_address [ 427.098292][T10886] new mount options do not match the existing superblock, will be ignored [ 427.237747][ T32] audit: type=1804 audit(1595103050.356:95): pid=10942 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/48/bus" dev="sda1" ino=15959 res=1 [ 427.262734][ T32] audit: type=1804 audit(1595103050.356:96): pid=10942 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/48/bus" dev="sda1" ino=15959 res=1 20:10:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket(0x1e, 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r3, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000000)={0x28, r4, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x8}]}]}]}, 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000280)={{{@in=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000000000)=0xe4) ioctl$sock_SIOCADDRT(r3, 0x890b, &(0x7f00000000c0)={0x0, @nl=@kern={0x10, 0x0, 0x0, 0x100}, @ipx={0x4, 0x87, 0x1, "12979bf0449b", 0xa}, @xdp={0x2c, 0x5, r5, 0x32}, 0x3ff, 0x0, 0x0, 0x0, 0x8d65, &(0x7f0000000080)='veth0_to_hsr\x00', 0xfff00000, 0x10000, 0x3}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'vcan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r6}, 0x14) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r8 = getpid() sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_VFINFO_LIST={0x4, 0x16, 0x0, 0x1, [{0x8, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x4, 0x7}]}]}, @IFLA_NET_NS_PID={0x8, 0x13, r8}]}, 0x34}}, 0x0) 20:10:50 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) pwritev(r1, &(0x7f0000000180)=[{&(0x7f00000002c0)="002140d13065185129ca6778bbe4c53c0a78df2fa019", 0x67}], 0x1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000004c0)=[@in={0x2, 0x4e21, @empty}, @in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e22, @rand_addr=0x64010101}, @in6={0xa, 0x4e20, 0x3f, @local, 0x4}, @in={0x2, 0x4e24, @private=0xa010101}, @in={0x2, 0x4e22, @rand_addr=0x64010100}, @in6={0xa, 0x1, 0x3, @dev={0xfe, 0x80, [], 0x25}, 0xfffffffd}, @in={0x2, 0x4e23, @multicast2}], 0x98) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f0000000100)=0x7) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r4, 0x403c5404, &(0x7f0000000140)={{0x3, 0x3, 0x8000, 0x0, 0x50e5}, 0xff, 0x1}) r5 = dup2(r2, r2) ioctl$EVIOCGPROP(r5, 0xc004743e, &(0x7f0000000380)=""/230) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r7) ioprio_get$uid(0x0, r7) pwritev(r5, &(0x7f0000000180)=[{&(0x7f0000000480)="002140d13065185129ca6778bbe4c53c0a78df2fa019", 0x16}], 0x1, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000380)={&(0x7f0000000180)="26fad1c880c893e702e22d76c2e83b95fe0c7d5c3ea3a90a8e921640bcd4b9b5f459a966d80ca9f17d7d55848e84e413c33d2e907da643dfdcf4544ec1f7e9f0f1ed4fc1a21ff439d2ba857f8bfb15c8ad75e6", &(0x7f0000000740)=""/143, &(0x7f00000005c0)="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", &(0x7f0000000340)="1f45ae4d743ea44254e418e443d2c336c24fab27bd3f14dca117a3968bca6216847bbe8118f9d560ad", 0x9, r5, 0x4}, 0x38) syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="050000e9a702ba88fd5441cf19f681820fb76cd26f324a"]) lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='trusted.overlay.impure\x00', &(0x7f0000000100)='size', 0x4, 0x0) [ 427.843116][T10951] A link change request failed with some changes committed already. Interface vcan0 may have been left with an inconsistent configuration, please check. [ 428.005296][T10953] A link change request failed with some changes committed already. Interface vcan0 may have been left with an inconsistent configuration, please check. 20:10:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000140)=ANY=[@ANYBLOB="288dd55e70b768000000", @ANYRES16=r1, @ANYBLOB="010000000000000000000100000004000180100002800c0001800800080000000000"], 0x28}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES16=r3, @ANYBLOB="01000000000000000000010000000400018004000300"], 0x1c}}, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc01cf509, &(0x7f0000000040)={r2, 0x6, 0x37, 0x6}) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000080)={0x6, 0x7f, 0x8}) set_mempolicy(0x4003, &(0x7f00003ccff8)=0x8000000000000000, 0x7742) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r6 = dup2(r5, r5) ioctl$EVIOCGPROP(r6, 0xc004743e, &(0x7f0000000380)=""/230) pwritev(r6, &(0x7f0000000180)=[{&(0x7f0000000480)="002140d13065185129ca6778bbe4c53c0a78df2fa019", 0x16}], 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r6, 0x6, 0x21, &(0x7f0000000000)="98bdc7ffcccdd2d10ad8f187fe3e42db", 0x10) r7 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSMAXCID(r7, 0x40047451, &(0x7f0000000100)) ioctl$KVM_X86_SETUP_MCE(r7, 0x4008ae9c, &(0x7f0000000100)={0xe, 0x2, 0x6}) r8 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x82, &(0x7f0000000380)=0x0) io_submit(r9, 0x6aa, &(0x7f0000000540)=[&(0x7f00000000c0)={0x400000000812d000, 0x9, 0x3, 0x8, 0x0, r8, &(0x7f0000000000), 0x1e}]) 20:10:51 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) 20:10:51 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x400002200006007, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = dup2(r0, r0) ioctl$LOOP_GET_STATUS64(r1, 0x401070c9, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0xd123, 0x6, &(0x7f0000001400)=[{&(0x7f0000000200)="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", 0x1000, 0x9}, {&(0x7f0000000100)="7847b02a58537b2c4561e21a79ba4f6c766be0cceced49fc7a92b2687efc2272acae42fc73078bc798b7f8c6aa3e1f7ee7ab43a4e0aa4e40f4a8670c66c4f4fcaadd688550f2aa01d2c8a618c76d8adc22571b35ca2d5b784dc5f4c98de9e7ba73e43516fe8674f28ba3066eada6962e1cf72b97c3a8058cf228140fa3d162b99a8a7bc6776fc7d14d711f617013c6c50b62bcc175d1953fdcdbe566ce10a6", 0x9f, 0x5}, {&(0x7f0000001200)="90d406b39601e4ff2b408c99f6fa5bad1564707c33bc6f2628af6452b174fffac60f1e5868907855d7f6ae28182ff77c3f232236c3001cefa2eb8a01d48533cac76b6bb8407fe18755dd4e5f6f59b2597f5d01761b21e8949153f34cfeb16f71f4bd665e78ba50a4f458462b6a8f43792a4d9b9a42ff435eae3848d5ad5d2d2787edc5268d8ec4578ec582672d7968a71185cda8d3ecf0588e0075d3916d15f816a60c54f13234b5464fbddef0d827519b3f8d146fc237d3651ac018b6332bcf8cab0245a297e445dc782fa45355408366a1cba01fa87981137c94f6b77baef5d31c882bbf", 0xe5, 0x5}, {&(0x7f0000001300)="89c2ce8e8b7c4b6f3a865d6e2b142552afd89aec8fab17223f2486d4816bcafcb1838be0f4578f60d0f1882c6a4d35b338e8f06ba1d034586e8d070dd0157319b9b97fa6c5d062d6a3160eb3d7db188468d4e6f389d165b250a9556c794bebad419d3163b371cf859d1f51d4412a83c099a8af756f9566399a6ff91a", 0x7c, 0x2}, {&(0x7f0000001380)="2d333bd2185439f9c8ba44cd07d13abfe0174260f9426258aaa283461c66b4320f2cf80734edc84dccd632bc6044a7e425d8f5a3b4148a1e48836ab9da936abec1ae70bbe07972f5a954be966d08482ba37ee1a16f2ee97c873fdb85a0e5a22175cb06", 0x63, 0x1}, {&(0x7f0000000080)="72a1c65ccb4afe59c467cae698fffb27d79b9725fd35c8c4f03825fc568a15ee5d01dab57990", 0x26, 0x1}], 0x50c06, &(0x7f0000001480)={[{@uni_xlateno='uni_xlate=0'}, {@fat=@tz_utc='tz=UTC'}, {@shortname_mixed='shortname=mixed'}, {@utf8no='utf8=0'}, {@uni_xlateno='uni_xlate=0'}, {@rodir='rodir'}, {@shortname_lower='shortname=lower'}]}) 20:10:51 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) rt_sigqueueinfo(0x0, 0x8, &(0x7f0000000040)={0x39, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r3}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:10:51 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) [ 428.910981][ T32] audit: type=1804 audit(1595103052.026:97): pid=10985 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/49/bus" dev="sda1" ino=15966 res=1 [ 429.057787][ T32] audit: type=1804 audit(1595103052.066:98): pid=10985 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/49/bus" dev="sda1" ino=15966 res=1 20:10:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_REMOTE={0x8, 0x2, @multicast2}]}}}]}, 0x3c}}, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) dup2(r1, r1) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, 0x140c, 0x200, 0x70bd29, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x6}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_RES_CQN={0x8, 0x3d, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x8811}, 0x20044001) 20:10:52 executing program 4: r0 = openat$full(0xffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x200000, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x40180, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x9, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4096, 0x1000}], 0x1, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) dup2(r1, r1) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r5 = dup2(r4, r4) ioctl$EVIOCGPROP(r5, 0xc004743e, &(0x7f0000000380)=""/230) pwritev(r5, &(0x7f0000000180)=[{&(0x7f0000000480)="002140d13065185129ca6778bbe4c53c0a78df2fa019", 0x16}], 0x1, 0x0) bind$bt_sco(r5, &(0x7f00000000c0)={0x1f, @fixed={[], 0x11}}, 0x8) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='stack\x00') preadv(r6, &(0x7f00000001c0)=[{&(0x7f0000002440)=""/102389, 0x18ff5}, {&(0x7f0000000480)=""/110, 0x6e}, {&(0x7f0000000280)=""/207, 0xcf}, {&(0x7f0000000380)=""/224, 0xe0}], 0x4, 0x1fd) 20:10:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="400000001000010400c68f4e0000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001000128008000100767469000400028008001b00000000000800290000000000"], 0x40}}, 0x0) 20:10:52 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) 20:10:53 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) dup2(r0, r0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000100)) ioctl$USBDEVFS_CLEAR_HALT(r2, 0x80045515, &(0x7f0000000040)={0x8, 0x1}) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_GET(r4, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x18, r3, 0xa23f19f29c7d7ff9, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 20:10:53 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = fcntl$getown(0xffffffffffffffff, 0x9) rt_sigqueueinfo(r1, 0x8, &(0x7f0000000040)={0x39, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r3}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, 0xffffffffffffffff, 0x8000000) mlockall(0x1) 20:10:53 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, 0x0, &(0x7f0000000180)) 20:10:53 executing program 4: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020662a, 0x0) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYRES64=r2], 0xfd14) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc020662a, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x8, 0x10001, "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", 0x1, 0x1, 0x6, 0xe1, 0x8, 0x80, 0xff}, r3}}, 0x120) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES16=r7, @ANYBLOB="21020000000000000000010000000c00990001000000000000000800010000598b77"], 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_REG(r5, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00012dbd7000fbdb5f251a0000000500920003000000087be593607db6be8b009a198e000000000008019a0001000000"], 0x34}}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506003282835f5b9e46ac000000", @ANYRES32=r8, @ANYBLOB="01000000000000001c0012000c0001006e64000000000c0007000800010006000000"], 0x3c}}, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000440)=@ipv6_deladdr={0x84, 0x15, 0x20, 0x70bd28, 0x25dfdbff, {0xa, 0x20, 0x8d}, [@IFA_CACHEINFO={0x14, 0x6, {0x9, 0xffff, 0x10000000, 0x8}}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x0, 0x4, 0x800}}, @IFA_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x12}}, @IFA_LOCAL={0x14, 0x2, @mcast1}, @IFA_ADDRESS={0x14, 0x1, @dev={0xfe, 0x80, [], 0x36}}, @IFA_FLAGS={0x8, 0x8, 0x8}]}, 0x84}}, 0x0) 20:10:53 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r2 = dup2(r1, r1) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000380)=""/230) pwritev(r2, &(0x7f0000000180)=[{&(0x7f0000000480)="002140d13065185129ca6778bbe4c53c0a78df2fa019", 0x16}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000240)={0x3, 0xae5, 0xfb3f, 0x80, 0x10}, 0x14) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x9, 0x3, 0x1d4, 0xb0, 0x0, 0x0, 0xb0, 0x0, 0x168, 0x1a8, 0x1a8, 0x168, 0x1a8, 0x3, 0x0, {[{{@ip={@broadcast, @empty}, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "3b4272585404f97920335dabc5b3abeb5f79f5865c671cba15e125d11e4e"}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20, 'TRACE\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x230) 20:10:53 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, 0x0, &(0x7f0000000180)) 20:10:53 executing program 2: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000080), 0x8) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000)={0x1}, 0x4) r1 = openat$sequencer(0xffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x2, 0x0) ioctl$SIOCAX25DELFWD(r1, 0x89eb, &(0x7f00000000c0)={@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 430.781426][T11032] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 20:10:53 executing program 3: r0 = openat$sequencer(0xffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0)='nl80211\x00') r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)={0x24, r2, 0x11, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r4}, @NL80211_ATTR_WIPHY_TX_POWER_SETTING={0x8}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_NEW_STATION(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8d8145c1f4ce9404}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r2, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NL80211_ATTR_STA_SUPPORTED_CHANNELS={0x14, 0xbd, [0x3, 0x908, 0x4, 0xee1, 0x5, 0x3, 0xf4, 0xb1]}, @NL80211_ATTR_STA_TX_POWER={0x6, 0x114, 0x7f}]}, 0x30}, 0x1, 0x0, 0x0, 0x40040c5}, 0x1) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCDELRT(r5, 0x890c, &(0x7f0000000500)={0x0, @l2tp={0x2, 0x0, @local}, @vsock={0x28, 0x0, 0x0, @hyper}, @nfc, 0x7, 0x0, 0x0, 0x0, 0x1ff, &(0x7f0000000140)='vlan1\x00'}) [ 430.945142][T11037] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 20:10:54 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, 0x0, &(0x7f0000000180)) 20:10:54 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000480)="002140d13065185129ca6778bbe4c53c0a78df2fa019", 0x16}], 0x1, 0x0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000040)={0x8, 0x5, 0x8a2, 0x3800000}) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd0008000000000003000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 20:10:54 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000000170063110e0000850000000300000095000000000000009500a50500"/48], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x74) 20:10:54 executing program 3: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c655d4ff765616d732c00f48f3aebe9691507e680a3cbaadb2bd3621ec7167cc6b584d366949a36fd3ee16a92b53d8d49c7dbbd509a36c2688aafc52f97aaabc5505df244fee2795df083a11543230a2dc23a09ff87c027cb67a5f5b6cc82f3a7dea86ae54f0e3120cb3a976f59c909"]) 20:10:54 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) [ 431.679817][T11050] loop4: p1 < > p2 p3 p4 [ 431.684397][T11050] loop4: partition table partially beyond EOD, truncated [ 431.692152][T11050] loop4: p1 start 1 is beyond EOD, truncated [ 431.698465][T11050] loop4: p2 size 1073741827 extends beyond EOD, truncated 20:10:54 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = fcntl$getown(0xffffffffffffffff, 0x9) rt_sigqueueinfo(r1, 0x8, &(0x7f0000000040)={0x39, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r3}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, 0xffffffffffffffff, 0x8000000) mlockall(0x1) [ 431.827434][T11058] xfs: Unknown parameter 'file]Oeams' [ 431.863944][T11050] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 431.884461][T11050] loop4: p4 size 32768 extends beyond EOD, truncated [ 431.914820][T11058] xfs: Unknown parameter 'file]Oeams' 20:10:55 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) dup2(r0, r0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000100)) write$P9_RXATTRWALK(r2, &(0x7f0000000000)={0xf, 0x1f, 0x2, 0xffffffff}, 0xf) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x40}}, 0x0) 20:10:55 executing program 3: r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000340)) msgctl$MSG_INFO(r0, 0xc, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) r1 = open(&(0x7f0000000080)='./file0\x00', 0x20002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0x1) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) msgsnd(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="c28000000000000008c7d8"], 0x2000, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc, 0xfffd}) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000440)=""/25) sendto$inet6(r2, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x18) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r1, 0x8983, &(0x7f00000000c0)={0x8, '\x00', {'ip6_vti0\x00'}, 0x2}) socket(0x0, 0x0, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)=[&(0x7f00000001c0)='team_slave_1\x00', 0x0, &(0x7f0000000280)='ip6_vti0\x00'], 0x0) 20:10:55 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) [ 432.226324][T11050] loop4: p1 < > p2 p3 p4 [ 432.230809][T11050] loop4: partition table partially beyond EOD, truncated [ 432.238771][T11050] loop4: p1 start 1 is beyond EOD, truncated [ 432.245202][T11050] loop4: p2 size 1073741827 extends beyond EOD, truncated [ 432.454657][T11050] loop4: p3 size 1912633224 extends beyond EOD, truncated 20:10:55 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = openat$btrfs_control(0xffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) dup2(r1, r1) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000100)={0x1, 0x0, [{0xc0000001, 0xe7b, 0x0, 0x7b, 0x2}]}) openat$vcs(0xffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x50000, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r5 = dup2(r4, r4) ioctl$EVIOCGPROP(r5, 0xc004743e, &(0x7f0000000380)=""/230) pwritev(r5, &(0x7f0000000180)=[{&(0x7f0000000480)="002140d13065185129ca6778bbe4c53c0a78df2fa019", 0x16}], 0x1, 0x0) ioctl$KVM_GET_PIT2(r5, 0x8070ae9f, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000200)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) [ 432.519382][T11050] loop4: p4 size 32768 extends beyond EOD, truncated 20:10:55 executing program 4: socket$nl_route(0x10, 0x3, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) dup2(r0, r0) r1 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000200)={r4, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000000)={r4}, 0x8) r5 = socket(0x11, 0x800000003, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f00000001c0)={r7, 0x3, 0x6, @link_local}, 0x10) setsockopt$packet_add_memb(r5, 0x107, 0x2, &(0x7f0000000200)={r7, 0x5, 0x6, @local}, 0x10) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6gre0\x00', r7, 0x2f, 0x9, 0x5, 0x5, 0x40, @rand_addr=' \x01\x00', @private1, 0x20, 0x20, 0x6, 0x3ff}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x24, r8}) 20:10:56 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) 20:10:56 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/vlan/config\x00') userfaultfd(0x0) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) socket$inet6_sctp(0xa, 0x1, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000080)) socket$inet_sctp(0x2, 0x5, 0x84) socket$packet(0x11, 0x3, 0x300) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) pipe(&(0x7f0000000100)) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f0000000100)) ioctl$SIOCRSSL2CALL(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)=ANY=[@ANYBLOB="b064d2bb33271062f9de1bfb0000935c3f6b74abfddf000000000000000000", @ANYRES32=0x0, @ANYBLOB="03c50000000000008000128009000100766c616e000000007000028006000100000000000c0002001c0000001b0000000600050088a800004c0004800c00010005000000010000000c00010001000000000000000c00010004000000040000000c00010042000000080000000c00010001040000020000000c0001007f000000800000000400038008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB], 0xb0}}, 0x810) 20:10:56 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = fcntl$getown(0xffffffffffffffff, 0x9) rt_sigqueueinfo(r1, 0x8, &(0x7f0000000040)={0x39, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r3}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, 0xffffffffffffffff, 0x8000000) mlockall(0x1) 20:10:56 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, &(0x7f0000000180)=0xc) [ 433.313845][T11120] device lo entered promiscuous mode [ 433.327261][T11119] device lo left promiscuous mode [ 433.416442][T11121] device lo entered promiscuous mode [ 433.448716][T11119] device lo left promiscuous mode 20:10:56 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r2 = dup2(r1, r1) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000380)=""/230) pwritev(r2, &(0x7f0000000180)=[{&(0x7f0000000480)="002140d13065185129ca6778bbe4c53c0a78df2fa019", 0x16}], 0x1, 0x0) getsockopt$MISDN_TIME_STAMP(r2, 0x0, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) 20:10:57 executing program 4: r0 = socket(0x1000000010, 0x6, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=ANY=[@ANYBLOB='t\x00\x00\x00,\x00\'\r\x00'/20, @ANYRES32, @ANYBLOB="0000000000000000040000000900010072"], 0x74}}, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='gretap0\x00') sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 20:10:57 executing program 2: r0 = open(&(0x7f0000000040)='./bus\x00', 0x8001145042, 0x0) ftruncate(r0, 0x2008003) remap_file_pages(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, 0xfac, 0x40) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000003, 0x50, 0xffffffffffffffff, 0xfffff000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000000)={0x28, r2, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x8}]}]}]}, 0x28}}, 0x0) write$FUSE_WRITE(r0, &(0x7f00000000c0)={0x18, 0x0, 0x5, {0x9}}, 0x18) pread64(r1, &(0x7f0000000080)=""/36, 0x24, 0x80000001) r3 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r3, 0x1, 0x2b, &(0x7f0000000000), 0x20a154cc) 20:10:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, &(0x7f0000000180)=0xc) [ 434.348981][ T32] audit: type=1800 audit(1595103057.467:99): pid=11139 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=15998 res=0 [ 434.353516][T11139] mmap: syz-executor.2 (11139) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 434.552120][ T32] audit: type=1800 audit(1595103057.667:100): pid=11139 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=15998 res=0 20:10:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, &(0x7f0000000180)=0xc) 20:10:57 executing program 4: syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=0x0, @ANYBLOB=',d/ts,gid=', @ANYRESHEX=0x0, @ANYBLOB=',nodots,dots,nodots,nodots,nodots,flush,\x00']) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PPPIOCSMAXCID(r1, 0x40047451, &(0x7f0000000100)) sendmsg$AUDIT_GET_FEATURE(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x3fb, 0x800, 0x70bd2a, 0x25dfdbfe, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000080}, 0x4008) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r3 = dup2(r2, r2) pwritev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000480)="002140d13065185129ca6778bbe4c53c0a78df2fa019", 0x16}], 0x1, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r4, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000280)=@sack_info={r6, 0x400, 0x101}, 0xc) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000380)=""/230) pwritev(r3, &(0x7f0000000180)=[{&(0x7f0000000480)="002140d13065185129ca6778bbe4c53c0a78df2fa019", 0x16}], 0x1, 0x0) ioctl$SG_SET_COMMAND_Q(r3, 0x2271, &(0x7f0000000240)=0x1) 20:10:57 executing program 2: r0 = open(&(0x7f0000000040)='./bus\x00', 0x8001145042, 0x0) ftruncate(r0, 0x2008003) remap_file_pages(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, 0xfac, 0x40) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000003, 0x50, 0xffffffffffffffff, 0xfffff000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000000)={0x28, r2, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x8}]}]}]}, 0x28}}, 0x0) write$FUSE_WRITE(r0, &(0x7f00000000c0)={0x18, 0x0, 0x5, {0x9}}, 0x18) pread64(r1, &(0x7f0000000080)=""/36, 0x24, 0x80000001) r3 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r3, 0x1, 0x2b, &(0x7f0000000000), 0x20a154cc) 20:10:57 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r2 = dup2(r1, r1) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000380)=""/230) pwritev(r2, &(0x7f0000000180)=[{&(0x7f0000000480)="002140d13065185129ca6778bbe4c53c0a78df2fa019", 0x16}], 0x1, 0x0) getsockopt$MISDN_TIME_STAMP(r2, 0x0, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 434.895934][T11155] FAT-fs (loop4): Unrecognized mount option "d/ts" or missing value 20:10:58 executing program 1: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r1 = fcntl$getown(r0, 0x9) rt_sigqueueinfo(r1, 0x8, &(0x7f0000000040)={0x39, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={0xffffffffffffffff, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r0, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r3}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r0, 0x8000000) mlockall(0x1) [ 435.164878][ T32] audit: type=1800 audit(1595103058.287:101): pid=11167 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=15942 res=0 20:10:58 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, 0x0) [ 435.208727][T11155] FAT-fs (loop4): Unrecognized mount option "d/ts" or missing value 20:10:58 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = dup(r0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) connect$vsock_stream(r2, &(0x7f0000000100), 0x10) listen(r2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) 20:10:58 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) openat$bsg(0xffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x143000, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) dup2(r0, r0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000100)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) dup2(r3, r3) r4 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r3, 0x0, r4) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) dup2(r5, r5) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r7, 0x84, 0x1c, &(0x7f00000001c0), &(0x7f0000000180)=0x1) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f00000003c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="75707065723dce2f6275732c776f726b6469723d2e2f66696c65312c6c6f7765726469723d2e2f66696c65302c00"]) umount2(&(0x7f0000000000)='./bus\x00', 0x0) 20:10:58 executing program 5: clock_gettime(0x0, &(0x7f0000002600)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f00000025c0)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/208, 0xd0}, {&(0x7f0000001180)=""/86, 0x56}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000002200)=""/218, 0xda}, {&(0x7f0000002300)=""/199, 0xc7}, {&(0x7f0000002400)=""/171, 0xab}], 0x7, &(0x7f0000002500)=""/189, 0xbd}}], 0x1, 0x10000, &(0x7f0000002640)={r0, r1+10000000}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000002680)={{0xa, 0x4e24, 0x1000, @remote, 0x2}, {0xa, 0x4e24, 0x81, @ipv4={[], [], @empty}, 0xffffffff}, 0x9, [0x0, 0x0, 0x2, 0x101, 0x8, 0x8, 0x32d, 0x44e]}, 0x5c) r3 = openat$vcs(0xffffff9c, &(0x7f0000002780)='/dev/vcs\x00', 0x100, 0x0) perf_event_open(&(0x7f0000002700)={0x3, 0x70, 0x9, 0x3, 0x7, 0x40, 0x0, 0xfffffffffffffbff, 0x8930a, 0xb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x18, 0x4, @perf_config_ext={0x5, 0xbe7}, 0xa048, 0x2, 0x7fffffff, 0xad80c53ff27a33d2, 0x100000000, 0x8000, 0x3ff}, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0x2) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f00000027c0), &(0x7f0000002800)=0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000002840)={0xf60e, 0xc940, 0x8008, 0x3ff, 0x3, 0x7fff, 0x6, 0x10000, 0x0}, &(0x7f0000002880)=0x20) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000028c0)={r4, 0xa0, "55169d57644ff75898c4c8cf87abc1e8953b09adc0ca4ca4bce276a53d468dae231ddc38ef3c760d5cc312a56b6951de1e9dfeec35ecf997fe7e058eec984fd1d49a5ba6c4e3fcf709f790552f7ad89ef52917fcb7943b10180bfc732c4e579afebe17ac57a3a7d8b1a4133a70de8f9371603446c1af777a7015d48d4e05d8f461162a14b10cdda208def4ba6e61ad07c763bf77d7101dec9146ce4aee6c313e"}, &(0x7f0000002980)=0xa8) statx(r3, &(0x7f00000029c0)='./file0\x00', 0x2000, 0x4, &(0x7f0000002a00)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = request_key(&(0x7f0000002b00)='logon\x00', &(0x7f0000002b40)={'syz', 0x3}, &(0x7f0000002b80)='/dev/vcs\x00', 0xfffffffffffffffe) keyctl$get_persistent(0x16, r5, r6) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000002bc0)={0x0, 'bridge0\x00', {0x2}, 0x3}) r7 = openat$zero(0xffffff9c, &(0x7f0000002c00)='/dev/zero\x00', 0x20080, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r7, 0x40086410, &(0x7f0000002c80)={0x2e, &(0x7f0000002c40)="aef5673d9c552e45dfde8330f4539ac6067ad95061865d13527e67e57f11d241dd9c279de3456c0afcfcdd5c7770"}) r8 = openat$proc_capi20(0xffffff9c, &(0x7f0000002cc0)='/proc/capi/capi20\x00', 0x442, 0x0) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r8, &(0x7f0000002d00)={0x40000000}) r9 = shmget(0x1, 0x1000, 0x1000, &(0x7f0000ffd000/0x1000)=nil) shmat(r9, &(0x7f0000ffd000/0x2000)=nil, 0x5000) recvmsg(0xffffffffffffffff, &(0x7f0000003040)={&(0x7f0000002d40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000002f00)=[{&(0x7f0000002dc0)=""/41, 0x29}, {&(0x7f0000002e00)=""/193, 0xc1}], 0x2, &(0x7f0000002f40)=""/226, 0xe2}, 0x1) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r10, 0x89f4, &(0x7f0000003140)={'sit0\x00', &(0x7f00000030c0)={'ip6_vti0\x00', 0x0, 0x29, 0x5, 0x3, 0x8, 0x18, @dev={0xfe, 0x80, [], 0x44}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x7, 0x7800, 0x40, 0x7f}}) 20:10:58 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000001380)=ANY=[@ANYBLOB="380000001000390400"/20, @ANYRES32=0x0, @ANYBLOB="03000000000000001800128008000100736974"], 0x38}}, 0x0) 20:10:58 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, 0x0) [ 435.883677][T11192] overlayfs: unrecognized mount option "upper=/bus" or missing value [ 435.963331][T11194] overlayfs: unrecognized mount option "upper=/bus" or missing value 20:10:59 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x200, 0x802) ioctl$USBDEVFS_RESETEP(r0, 0x8108551b, &(0x7f0000000240)={0x1}) [ 436.089897][T11198] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 20:10:59 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in=@dev, 0x0, 0x32}, 0x2, @in, 0x0, 0x1, 0x0, 0xfc}}, 0xe8) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0, 0x0, 0x0, 0x0, 0x7}}], 0x400000000000107, 0x1f4) 20:10:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x15) 20:10:59 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, 0x0) 20:10:59 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) 20:11:00 executing program 1: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r1 = fcntl$getown(r0, 0x9) rt_sigqueueinfo(r1, 0x8, &(0x7f0000000040)={0x39, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={0xffffffffffffffff, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r0, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r3}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r0, 0x8000000) mlockall(0x1) 20:11:00 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000300)=[@mask_fadd={0x58, 0x114, 0x8, {{}, 0x0, 0x0}}], 0x58}, 0x0) 20:11:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_GENEVE_REMOTE6={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}}}]}, 0x48}}, 0x0) [ 437.339074][T11215] IPVS: ftp: loaded support on port[0] = 21 20:11:00 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in=@dev, 0x0, 0x32}, 0x2, @in, 0x0, 0x1, 0x0, 0xfc}}, 0xe8) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0, 0x0, 0x0, 0x0, 0x7}}], 0x400000000000107, 0x1f4) [ 438.388661][T11215] chnl_net:caif_netlink_parms(): no params data found [ 438.721127][T11215] bridge0: port 1(bridge_slave_0) entered blocking state [ 438.730019][T11215] bridge0: port 1(bridge_slave_0) entered disabled state [ 438.776011][T11215] device bridge_slave_0 entered promiscuous mode [ 438.795231][T11215] bridge0: port 2(bridge_slave_1) entered blocking state [ 438.802717][T11215] bridge0: port 2(bridge_slave_1) entered disabled state [ 438.812477][T11215] device bridge_slave_1 entered promiscuous mode [ 438.887039][T11215] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 438.907154][T11215] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 438.979685][T11215] team0: Port device team_slave_0 added [ 439.003874][T11215] team0: Port device team_slave_1 added [ 439.067240][T11215] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 439.074717][T11215] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 439.101135][T11215] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 439.121829][T11215] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 439.129829][T11215] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 439.156006][T11215] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 439.324691][T11215] device hsr_slave_0 entered promiscuous mode [ 439.373948][T11215] device hsr_slave_1 entered promiscuous mode [ 439.422971][T11215] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 439.430630][T11215] Cannot create hsr debugfs directory [ 440.028929][T11215] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 440.096706][T11215] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 440.199646][T11215] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 440.261346][T11215] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 440.590597][T11215] 8021q: adding VLAN 0 to HW filter on device bond0 [ 440.660032][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 440.671815][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 440.696970][T11215] 8021q: adding VLAN 0 to HW filter on device team0 [ 440.728609][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 440.738624][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 440.750318][ T3822] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.757620][ T3822] bridge0: port 1(bridge_slave_0) entered forwarding state [ 440.814057][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 440.823959][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 440.833967][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 440.843345][ T3822] bridge0: port 2(bridge_slave_1) entered blocking state [ 440.850572][ T3822] bridge0: port 2(bridge_slave_1) entered forwarding state [ 440.859630][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 440.870709][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 440.881495][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 440.891998][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 441.023744][T11215] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 441.034387][T11215] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 441.138709][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 441.150768][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 441.161657][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 441.172470][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 441.182138][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 441.192697][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 441.202483][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 441.265639][T11215] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 441.293413][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 441.303092][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 441.310831][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 441.825492][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 441.836523][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 441.970122][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 441.979900][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 442.012815][T11215] device veth0_vlan entered promiscuous mode [ 442.062590][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 442.071817][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 442.133496][T11215] device veth1_vlan entered promiscuous mode [ 442.303223][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 442.313372][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 442.357556][T11215] device veth0_macvtap entered promiscuous mode [ 442.382683][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 442.393633][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 442.440476][T11215] device veth1_macvtap entered promiscuous mode [ 442.477791][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 442.487491][ T3822] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 442.576241][T11215] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 442.588981][T11215] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 442.599014][T11215] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 442.609558][T11215] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 442.619556][T11215] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 442.630123][T11215] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 442.640098][T11215] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 442.650679][T11215] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 442.660733][T11215] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 442.671335][T11215] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 442.685830][T11215] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 442.695519][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 442.706284][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 442.789462][T11215] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 442.800973][T11215] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 442.811032][T11215] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 442.821571][T11215] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 442.832103][T11215] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 442.842636][T11215] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 442.852640][T11215] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 442.863193][T11215] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 442.873178][T11215] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 442.883930][T11215] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 442.898475][T11215] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 442.912940][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 442.923219][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 20:11:08 executing program 5: syz_mount_image$hfsplus(&(0x7f00000000c0)='hfsplus\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB=',']) 20:11:08 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x15, &(0x7f00000002c0)=ANY=[], 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000000)) 20:11:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3c0000002c00270d000000000000000000000e00", @ANYRES32=r4, @ANYBLOB="0000000000000000080010000a000100726f757465"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000680)=@deltfilter={0x24, 0x2d, 0x5, 0x0, 0x0, {0xc, 0x0, 0x0, r4, {0x8100}, {}, {0x0, 0x10}}}, 0x24}}, 0x0) 20:11:08 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in=@dev, 0x4d5, 0x32}, 0x2, @in, 0x0, 0x1, 0x0, 0xfc}}, 0xe8) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0, 0x0, 0x0, 0x0, 0x7}}], 0x400000000000107, 0x1f4) 20:11:08 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x59b9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x204000, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@textreal={0x8, &(0x7f00000000c0)="ffb10c10ba4300b0c8ee660f38826f3cf30f01e80f69e866f20f38f015650f01c883dd000f0131baf80c66b87aa1cc8b66efbafc0ced", 0x36}], 0x1, 0x62, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000100)={0x40100}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000240)={[0x0, 0x0, 0x0, 0x0, 0x200000000000203, 0x1d, 0x4c6, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x7], 0x3000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:11:08 executing program 1: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r1 = fcntl$getown(r0, 0x9) rt_sigqueueinfo(r1, 0x8, &(0x7f0000000040)={0x39, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={0xffffffffffffffff, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r0, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r3}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r0, 0x8000000) mlockall(0x1) [ 445.042699][T11484] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 445.118012][T11484] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 20:11:08 executing program 2: syz_mount_image$hfsplus(&(0x7f00000000c0)='hfsplus\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[], [{@smackfsroot={'smackfsroot', 0x3d, ').!'}}, {@smackfsroot={'smackfsroot', 0x3d, 'creator'}}]}) 20:11:08 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x200, 0x802) ioctl$USBDEVFS_RESETEP(r0, 0xc0185500, &(0x7f0000000240)={0x1}) [ 445.346848][T11495] hfsplus: unable to find HFS+ superblock 20:11:08 executing program 3: [ 445.486881][T11495] hfsplus: unable to find HFS+ superblock 20:11:08 executing program 3: 20:11:08 executing program 5: [ 445.779545][T11507] usb usb2: usbfs: process 11507 (syz-executor.4) did not claim interface 0 before use 20:11:09 executing program 0: [ 445.924804][T11508] hfsplus: unable to parse mount options [ 445.975655][T11508] hfsplus: unable to parse mount options 20:11:09 executing program 2: 20:11:09 executing program 4: 20:11:09 executing program 3: 20:11:09 executing program 5: 20:11:09 executing program 1: r0 = creat(0x0, 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x39, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:11:09 executing program 0: 20:11:09 executing program 4: 20:11:09 executing program 2: 20:11:09 executing program 3: 20:11:10 executing program 5: 20:11:10 executing program 0: 20:11:10 executing program 4: 20:11:10 executing program 2: 20:11:10 executing program 3: 20:11:10 executing program 0: 20:11:10 executing program 5: 20:11:11 executing program 1: r0 = creat(0x0, 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x39, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:11:11 executing program 4: 20:11:11 executing program 2: 20:11:11 executing program 3: 20:11:11 executing program 0: 20:11:11 executing program 5: 20:11:11 executing program 4: 20:11:11 executing program 0: 20:11:11 executing program 5: 20:11:11 executing program 3: 20:11:11 executing program 2: 20:11:11 executing program 3: 20:11:12 executing program 1: r0 = creat(0x0, 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x39, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:11:12 executing program 5: 20:11:12 executing program 4: 20:11:12 executing program 0: 20:11:12 executing program 3: 20:11:12 executing program 2: 20:11:12 executing program 0: 20:11:12 executing program 5: 20:11:12 executing program 4: 20:11:12 executing program 3: 20:11:12 executing program 2: 20:11:13 executing program 5: 20:11:13 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x39, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:11:13 executing program 4: 20:11:13 executing program 0: 20:11:13 executing program 3: 20:11:13 executing program 2: 20:11:13 executing program 5: 20:11:13 executing program 3: 20:11:13 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x5}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x400000, 0x0) mq_timedsend(r1, 0x0, 0x0, 0xfffffffe, 0x0) mq_timedsend(r0, 0x0, 0x0, 0xff, 0x0) mq_timedreceive(r0, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfd53) sendmsg$SOCK_DESTROY(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1fc}}, 0x8010) sysfs$3(0x3) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@loopback, @in=@private}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xe4) socket(0x2c, 0x1, 0xffffffff) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) lseek(0xffffffffffffffff, 0x5, 0x4) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) 20:11:14 executing program 4: gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000940)=@raw={'raw\x00', 0x3c1, 0x3, 0x49c, 0x0, 0x207, 0x2f1e, 0x0, 0x200, 0x3d4, 0x2e8, 0x2e8, 0x3d4, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xac]}, @rand_addr=' \x01\x00', [], [0xff000000], 'veth1_to_bond\x00', 'wg0\x00'}, 0x0, 0x2bc, 0x2fc, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119d234605cd431e1ecef50c3234e082555f67222476147864fa03182f58f1194fed47bf78c70f605b0178fa5ea335019ac07a602061c96b724c989f1f34a214e6726401fe4b124e0f7323a587d2a1fcf0400bac2b500", 0x66}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'batadv_slave_1\x00', {0x100, 0x4812e7ac, 0x41, 0x0, 0x0, 0x6, 0x400, 0x7af28b8}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa4, 0xd8}, @common=@inet=@SET3={0x34, 'SET\x00'}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x4f8) [ 450.875766][ T32] audit: type=1804 audit(1595103073.999:102): pid=11580 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/59/bus" dev="sda1" ino=16039 res=1 20:11:14 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000940)=@raw={'raw\x00', 0x3c1, 0x3, 0x49c, 0x0, 0x207, 0x2f1e, 0x0, 0x200, 0x3d4, 0x2e8, 0x2e8, 0x3d4, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xac]}, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'wg0\x00'}, 0x0, 0x2bc, 0x2fc, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119d234605cd431e1ecef50c3234e082555f67222476147864fa03182f58f1194fed47bf78c70f605b0178fa5ea335019ac07a602061c96b724c989f1f34a214e6726401fe4b124e0f7323a587d2a1fcf0400bac2b500", 0x66}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'batadv_slave_1\x00', {0x0, 0x0, 0x41, 0x0, 0xfffffffc, 0x6, 0x400, 0x0, 0x0, 0x40}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa4, 0xd8}, @common=@inet=@SET3={0x34, 'SET\x00'}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x4f8) socket$vsock_stream(0x28, 0x1, 0x0) 20:11:14 executing program 0: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_procfs(0x0, 0x0) getsockname$packet(r3, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) [ 451.076187][ T32] audit: type=1804 audit(1595103074.029:103): pid=11580 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/59/bus" dev="sda1" ino=16039 res=1 [ 451.181794][T11584] xt_hashlimit: max too large, truncated to 1048576 [ 451.188485][T11584] xt_hashlimit: invalid rate [ 451.303142][T11590] Cannot find add_set index 0 as target [ 451.394952][T11594] Cannot find add_set index 0 as target 20:11:14 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x4, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xa4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)) 20:11:15 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x39, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:11:15 executing program 3: socket(0xa, 0x1, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) pipe(&(0x7f0000000440)) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/meminfo\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 20:11:15 executing program 0: syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000040)='./file1\x00', 0xffc00000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000001c0)=ANY=[]) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') sendfile(r0, r1, 0x0, 0x800000080004105) 20:11:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xa3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)=@newtaction={0x44, 0x30, 0xffff, 0x0, 0x0, {}, [{0x30, 0x1, [@m_nat={0x2c, 0x1, 0x0, 0x0, {{0x8, 0x1, 'nat\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x44}}, 0x0) 20:11:15 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x5}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x400000, 0x0) mq_timedsend(r1, 0x0, 0x0, 0xfffffffe, 0x0) mq_timedsend(r0, 0x0, 0x0, 0xff, 0x0) mq_timedreceive(r0, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfd53) sendmsg$SOCK_DESTROY(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1fc}}, 0x8010) sysfs$3(0x3) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@loopback, @in=@private}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xe4) socket(0x2c, 0x1, 0xffffffff) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) lseek(0xffffffffffffffff, 0x5, 0x4) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) 20:11:15 executing program 2: sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="800000000107010100000000000000000000000508000540000000000c00034000000000000000504a8742307e3384d9000003ff0340000000000000c33da12ff3a23fd74b2d659a1ffc8c23792a09001e0073797a31000000000900000000000000000000000c0002400000000000005dbbc923fddc5a63b93a3f"], 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x94}, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000940)=@raw={'raw\x00', 0x3c1, 0x3, 0x49c, 0x0, 0x207, 0x2f1e, 0x0, 0x200, 0x3d4, 0x2e8, 0x2e8, 0x3d4, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xac]}, @rand_addr=' \x01\x00', [0x0, 0x0, 0xe030000], [0xff000000], 'veth1_to_bond\x00', 'wg0\x00'}, 0x0, 0x2bc, 0x2fc, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119d234605cd431e1ecef50c3234e082555f67222476147864fa03182f58f1194fed47bf78c70f605b0178fa5ea335019ac07a602061c96b724c989f1f34a214e6726401fe4b124e0f7323a587d2a1fcf0400bac2b500", 0x66}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'batadv_slave_1\x00', {0x100, 0x4812e7ac, 0x41, 0xf90, 0xfffffffc, 0x6, 0x400, 0x7af28b8, 0x80, 0x40}, {0x8}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa4, 0xd8}, @common=@inet=@SET3={0x34, 'SET\x00'}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x4f8) semget(0x2, 0x0, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x68, 0x0, 0x300, 0x70bd29, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x7fffffff, @media='ib\x00'}}}, [""]}, 0x68}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r1, 0x300, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x1c}}, 0x8000) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r2, &(0x7f00000017c0), 0x3da, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 452.503097][T11616] xt_hashlimit: max too large, truncated to 1048576 [ 452.555304][ T32] audit: type=1804 audit(1595103075.679:104): pid=11621 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/60/bus" dev="sda1" ino=16084 res=1 20:11:15 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000940)=@raw={'raw\x00', 0x3c1, 0x3, 0x49c, 0x0, 0x207, 0x2f1e, 0x0, 0x200, 0x3d4, 0x2e8, 0x2e8, 0x3d4, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xac]}, @rand_addr=' \x01\x00', [0x0, 0x0, 0xe030000], [], 'veth1_to_bond\x00', 'wg0\x00'}, 0x0, 0x2bc, 0x2fc, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119d234605cd431e1ecef50c3234e082555f67222476147864fa03182f58f1194fed47bf78c70f605b0178fa5ea335019ac07a602061c96b724c989f1f34a214e6726401fe4b124e0f7323a587d2a1fcf0400bac2b500", 0x66}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'batadv_slave_1\x00', {0x100, 0x0, 0x41, 0x0, 0xfffffffc, 0x6, 0x400, 0x7af28b8}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa4, 0xd8}, @common=@inet=@SET3={0x34, 'SET\x00'}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x4f8) 20:11:15 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010001fff752b056800080000faff8141", @ANYRES32=0x0, @ANYBLOB="0000001f00000000280012800a00010076"], 0x3}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xa3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) 20:11:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r0, 0x0, 0x0}, 0x20) [ 452.728435][T11616] Cannot find add_set index 0 as target [ 452.740311][ T32] audit: type=1804 audit(1595103075.719:105): pid=11618 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/60/bus" dev="sda1" ino=16084 res=1 20:11:15 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x5}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x400000, 0x0) mq_timedsend(r1, 0x0, 0x0, 0xfffffffe, 0x0) mq_timedsend(r0, 0x0, 0x0, 0xff, 0x0) mq_timedreceive(r0, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfd53) sendmsg$SOCK_DESTROY(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1fc}}, 0x8010) sysfs$3(0x3) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@loopback, @in=@private}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xe4) socket(0x2c, 0x1, 0xffffffff) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) lseek(0xffffffffffffffff, 0x5, 0x4) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) [ 452.891487][T11616] xt_hashlimit: max too large, truncated to 1048576 [ 452.932148][T11616] Cannot find add_set index 0 as target 20:11:16 executing program 2: [ 453.188840][T11633] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 453.296854][T11638] xt_hashlimit: max too large, truncated to 1048576 20:11:16 executing program 4: [ 453.374538][T11638] Cannot find add_set index 0 as target [ 453.479599][T11641] xt_hashlimit: max too large, truncated to 1048576 [ 453.520564][T11641] Cannot find add_set index 0 as target 20:11:16 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x39, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:11:16 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x5}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x400000, 0x0) mq_timedsend(r1, 0x0, 0x0, 0xfffffffe, 0x0) mq_timedsend(r0, 0x0, 0x0, 0xff, 0x0) mq_timedreceive(r0, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfd53) sendmsg$SOCK_DESTROY(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1fc}}, 0x8010) sysfs$3(0x3) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@loopback, @in=@private}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xe4) socket(0x2c, 0x1, 0xffffffff) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) lseek(0xffffffffffffffff, 0x5, 0x4) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) 20:11:16 executing program 2: 20:11:16 executing program 3: 20:11:16 executing program 4: [ 454.063634][ T32] audit: type=1804 audit(1595103077.189:106): pid=11653 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/61/bus" dev="sda1" ino=16105 res=1 [ 454.088819][ T32] audit: type=1804 audit(1595103077.189:107): pid=11653 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/61/bus" dev="sda1" ino=16105 res=1 20:11:17 executing program 0: 20:11:17 executing program 4: 20:11:17 executing program 2: 20:11:17 executing program 3: 20:11:17 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x5}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x400000, 0x0) mq_timedsend(r1, 0x0, 0x0, 0xfffffffe, 0x0) mq_timedsend(r0, 0x0, 0x0, 0xff, 0x0) mq_timedreceive(r0, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfd53) sendmsg$SOCK_DESTROY(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1fc}}, 0x8010) sysfs$3(0x3) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@loopback, @in=@private}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xe4) socket(0x2c, 0x1, 0xffffffff) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) lseek(0xffffffffffffffff, 0x5, 0x4) 20:11:17 executing program 0: 20:11:17 executing program 4: 20:11:18 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(0x0, 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x39, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:11:18 executing program 2: 20:11:18 executing program 3: 20:11:18 executing program 0: 20:11:18 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x5}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x400000, 0x0) mq_timedsend(r1, 0x0, 0x0, 0xfffffffe, 0x0) mq_timedsend(r0, 0x0, 0x0, 0xff, 0x0) mq_timedreceive(r0, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfd53) sendmsg$SOCK_DESTROY(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1fc}}, 0x8010) sysfs$3(0x3) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@loopback, @in=@private}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xe4) socket(0x2c, 0x1, 0xffffffff) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) 20:11:18 executing program 4: 20:11:18 executing program 3: 20:11:18 executing program 2: 20:11:18 executing program 0: 20:11:18 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x5}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x400000, 0x0) mq_timedsend(r1, 0x0, 0x0, 0xfffffffe, 0x0) mq_timedsend(r0, 0x0, 0x0, 0xff, 0x0) mq_timedreceive(r0, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfd53) sendmsg$SOCK_DESTROY(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1fc}}, 0x8010) sysfs$3(0x3) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@loopback, @in=@private}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xe4) socket(0x2c, 0x1, 0xffffffff) 20:11:18 executing program 4: 20:11:19 executing program 3: 20:11:19 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(0x0, 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x39, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:11:19 executing program 0: 20:11:19 executing program 2: 20:11:19 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x5}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x400000, 0x0) mq_timedsend(r1, 0x0, 0x0, 0xfffffffe, 0x0) mq_timedsend(r0, 0x0, 0x0, 0xff, 0x0) mq_timedreceive(r0, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfd53) sendmsg$SOCK_DESTROY(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1fc}}, 0x8010) sysfs$3(0x3) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@loopback, @in=@private}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xe4) 20:11:19 executing program 4: 20:11:19 executing program 3: 20:11:20 executing program 4: 20:11:20 executing program 0: 20:11:20 executing program 2: 20:11:20 executing program 3: 20:11:20 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x5}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x400000, 0x0) mq_timedsend(r1, 0x0, 0x0, 0xfffffffe, 0x0) mq_timedsend(r0, 0x0, 0x0, 0xff, 0x0) mq_timedreceive(r0, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfd53) sendmsg$SOCK_DESTROY(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1fc}}, 0x8010) sysfs$3(0x3) 20:11:20 executing program 4: 20:11:21 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(0x0, 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x39, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:11:21 executing program 0: 20:11:21 executing program 2: 20:11:21 executing program 3: 20:11:21 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x5}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x400000, 0x0) mq_timedsend(r1, 0x0, 0x0, 0xfffffffe, 0x0) mq_timedsend(r0, 0x0, 0x0, 0xff, 0x0) mq_timedreceive(r0, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfd53) sendmsg$SOCK_DESTROY(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1fc}}, 0x8010) 20:11:21 executing program 4: 20:11:21 executing program 4: 20:11:21 executing program 3: 20:11:21 executing program 2: 20:11:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000240)={0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc7f5, 0x6529fa57, 0x0, 0x0, 0x4, 0x40, 0x0, 0x8000, 0x0, 0x7ff, 0x8000}) 20:11:21 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x5}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x400000, 0x0) mq_timedsend(r1, 0x0, 0x0, 0xfffffffe, 0x0) mq_timedsend(r0, 0x0, 0x0, 0xff, 0x0) mq_timedreceive(r0, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfd53) 20:11:21 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000040)=@newqdisc={0x2c, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@TCA_RATE={0x6}]}, 0x2c}}, 0x0) 20:11:22 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(0xffffffffffffffff, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x39, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:11:22 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) 20:11:22 executing program 4: perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='net/nf_conntrack\x00') preadv(r0, &(0x7f0000000500), 0x37d, 0x0) 20:11:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0xb) clone(0x8000000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x40) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000214fd4)={0xc, 0x4, 0x4, 0x234, 0x0, r0, 0x0, [0x305f, 0xa, 0x300, 0x1800, 0x6000000]}, 0x2c) sched_setscheduler(0x0, 0x5, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_DEL_MPATH(0xffffffffffffffff, 0x0, 0x4040080) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) getpid() 20:11:22 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x5}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x400000, 0x0) mq_timedsend(r1, 0x0, 0x0, 0xfffffffe, 0x0) mq_timedsend(r0, 0x0, 0x0, 0xff, 0x0) mq_timedreceive(r0, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) pipe(&(0x7f00000000c0)) 20:11:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000700)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 20:11:22 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='.\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000000)={0x28}, 0x28) 20:11:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x464, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0x2000a808) [ 459.736438][ T32] audit: type=1804 audit(1595103082.859:108): pid=11748 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/65/bus" dev="sda1" ino=16142 res=1 20:11:22 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x5}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x400000, 0x0) mq_timedsend(r1, 0x0, 0x0, 0xfffffffe, 0x0) mq_timedsend(r0, 0x0, 0x0, 0xff, 0x0) mq_timedreceive(r0, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) 20:11:23 executing program 2: inotify_init1(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) sendmsg$AUDIT_TRIM(0xffffffffffffffff, 0x0, 0x48891) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e28, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000001980), 0x8c83086635fae290, 0x2000f760) keyctl$KEYCTL_CAPABILITIES(0x1f, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) ioctl$DRM_IOCTL_MODE_GETFB(0xffffffffffffffff, 0xc01c64ad, 0x0) syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) dup(0xffffffffffffffff) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000400)={'syz0', "9d598e6370aac0c4c1b9fd02c704f6093631ffdc1d01d43b29d374a24eb0165799a91fb3d94f7290de536eafba837f762a3e8459c7a69adc63d32c352a07a3ac30d2a799705de397754a532e747c9b501e5364f9afe32d68f4c643eeafd153331e11d028a64b08917b437112b4c926db1322628485253824234e04e01d6b34f5e4e174d6c08df0b345c0e663053448576ab34182176b4423550284244afc94dcfe7eb3ada2c487416ec34e8ec402667c9b8f03a2c50437476c13307322693e32075bac0415bbdc152fd4e397b561c80e95c930fc80ee9ba77020377fbaf95366b98df8351a1020dee1c60345d93c6ab46265"}, 0xf6) sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, 0x0, 0x0) [ 459.898373][ T32] audit: type=1804 audit(1595103082.909:109): pid=11748 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/65/bus" dev="sda1" ino=16142 res=1 20:11:23 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x18d542, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='nfs\x00', 0x0, &(0x7f000000a000)) 20:11:23 executing program 3: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001700)={&(0x7f0000000140)=ANY=[@ANYBLOB="fb18ec"], 0x1c, 0x0}, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x2, 0x0) r1 = socket(0x18, 0x2, 0x0) setsockopt(r1, 0x1000000000029, 0x4, &(0x7f0000000000)="06000000", 0x4) r2 = dup2(r1, r0) sendmsg$unix(r2, &(0x7f0000001700)={0x0, 0x4, 0x0}, 0x0) [ 460.286851][ T32] audit: type=1800 audit(1595103083.409:110): pid=11761 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16151 res=0 [ 460.378473][T11761] NFS: Device name not specified 20:11:24 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(0xffffffffffffffff, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x39, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:11:24 executing program 4: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/uts\x00') fchdir(r0) 20:11:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/5, 0x5}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x103, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 20:11:24 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x5}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x400000, 0x0) mq_timedsend(r1, 0x0, 0x0, 0xfffffffe, 0x0) mq_timedsend(r0, 0x0, 0x0, 0xff, 0x0) mq_timedreceive(r0, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:11:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$key(0xf, 0x3, 0x2) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/5, 0x5}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x16b, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 20:11:24 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_DYING(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x0) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:11:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r3, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 20:11:24 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x5}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x400000, 0x0) mq_timedsend(r1, 0x0, 0x0, 0xfffffffe, 0x0) mq_timedsend(r0, 0x0, 0x0, 0xff, 0x0) mq_timedreceive(r0, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) [ 461.387962][ T32] audit: type=1804 audit(1595103084.509:111): pid=11795 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/66/bus" dev="sda1" ino=16155 res=1 20:11:24 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) preadv(r0, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/41, 0x29}], 0x1, 0x0) [ 461.497935][ T32] audit: type=1804 audit(1595103084.559:112): pid=11795 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/66/bus" dev="sda1" ino=16155 res=1 [ 461.765546][T11796] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 461.788792][T11796] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:11:25 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x5}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x400000, 0x0) mq_timedsend(r1, 0x0, 0x0, 0xfffffffe, 0x0) mq_timedsend(r0, 0x0, 0x0, 0xff, 0x0) 20:11:25 executing program 4: mknod(&(0x7f0000000ffa)='./bus\x00', 0x1000, 0x0) r0 = open(&(0x7f000054a000)='./bus\x00', 0x121d00, 0x0) r1 = epoll_create(0x9) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00003d6ff4)) creat(&(0x7f00000001c0)='./bus\x00', 0x0) 20:11:25 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x5}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x400000, 0x0) mq_timedsend(r0, 0x0, 0x0, 0xfffffffe, 0x0) [ 462.744322][T11794] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 462.759065][T11794] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:11:25 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(0xffffffffffffffff, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x39, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:11:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r3, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 20:11:25 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) readv(r0, &(0x7f00000004c0)=[{&(0x7f00000023c0)=""/4096, 0x18}], 0x3d3) write$uinput_user_dev(r0, &(0x7f0000000040)={'syz0\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) 20:11:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='cgroup\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.sched_load_balance\x00', 0x2, 0x0) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x101) [ 463.075751][T11833] input: syz1 as /devices/virtual/input/input7 [ 463.123256][ T32] audit: type=1804 audit(1595103086.249:113): pid=11836 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/67/bus" dev="sda1" ino=16168 res=1 [ 463.149939][ T32] audit: type=1804 audit(1595103086.249:114): pid=11836 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/67/bus" dev="sda1" ino=16168 res=1 [ 463.247424][T11833] input: syz1 as /devices/virtual/input/input8 20:11:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x9e, &(0x7f0000000200)={@broadcast, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x68, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b2590b1c71a8242373244ad2439adc07df0a69748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81802"}, {0x0, 0x1, "40000000000095e38bbfae5f"}]}}}}}}, 0x0) 20:11:27 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x5}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) mq_timedsend(r0, 0x0, 0x0, 0xfffffffe, 0x0) 20:11:27 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000000)="0201540000000a000000ff45ac00000000000590663d280000000000000680ffffffbf000000e100e2ff877700720030070085ffffff00000000008000da55aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 20:11:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r3, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 20:11:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x9e, &(0x7f0000000200)={@broadcast, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x68, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b2590b1c71a8242373244ad2439adc07df0a69748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81802"}, {0x0, 0x1, "40000000000095e38bbfae5f"}]}}}}}}, 0x0) 20:11:27 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) fcntl$getown(r1, 0x9) rt_sigqueueinfo(0x0, 0x8, &(0x7f0000000040)={0x39, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r3}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) [ 464.479719][ T32] audit: type=1804 audit(1595103087.599:115): pid=11865 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/68/bus" dev="sda1" ino=16174 res=1 [ 464.648696][T11872] loop4: p1[DM] p2 < > p3 p4 < p5 > [ 464.655323][T11872] loop4: partition table partially beyond EOD, truncated [ 464.663240][T11872] loop4: p1 start 10 is beyond EOD, truncated [ 464.669370][T11872] loop4: p2 start 40 is beyond EOD, truncated [ 464.675618][T11872] loop4: p3 start 4293001441 is beyond EOD, truncated [ 464.682548][T11872] loop4: p4 size 2 extends beyond EOD, truncated [ 464.746306][ T32] audit: type=1804 audit(1595103087.629:116): pid=11865 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/68/bus" dev="sda1" ino=16174 res=1 20:11:28 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x5}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) socket$inet_udp(0x2, 0x2, 0x0) mq_timedsend(r0, 0x0, 0x0, 0xfffffffe, 0x0) 20:11:28 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x200000000000011, 0x4000000000080002, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500803103000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) bind$packet(r2, &(0x7f0000000000)={0x11, 0x1, r4, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r2, &(0x7f0000000d00), 0x400004e, 0x0) 20:11:28 executing program 3: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x0, 0x0, 0x103, 0x1}, 0x20) close(r0) [ 464.971001][T11872] loop4: p5 start 10 is beyond EOD, truncated 20:11:28 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) sendmmsg(r0, &(0x7f0000006d00), 0x800000000000237, 0x1ffffffe) [ 465.204545][T11872] loop4: p1[DM] p2 < > p3 p4 < p5 > [ 465.209915][T11872] loop4: partition table partially beyond EOD, truncated [ 465.218059][T11872] loop4: p1 start 10 is beyond EOD, truncated [ 465.224389][T11872] loop4: p2 start 40 is beyond EOD, truncated [ 465.230640][T11872] loop4: p3 start 4293001441 is beyond EOD, truncated [ 465.237461][T11872] loop4: p4 size 2 extends beyond EOD, truncated [ 465.375636][T11872] loop4: p5 start 10 is beyond EOD, truncated 20:11:28 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x5}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) mq_timedsend(r0, 0x0, 0x0, 0xfffffffe, 0x0) 20:11:28 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000080)=""/44, 0xf8dce77545f3ac9f, 0x0) 20:11:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="280000002600010600"/20, @ANYRES32=0x0, @ANYBLOB="00000007540000000000004004000a"], 0x28}}, 0x0) recvmmsg(r2, &(0x7f0000005c80)=[{{0x0, 0x7ec0, 0x0}}], 0x344, 0x10122, 0x0) 20:11:29 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1000000000000277, 0x0) 20:11:29 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) fcntl$getown(r1, 0x9) rt_sigqueueinfo(0x0, 0x8, &(0x7f0000000040)={0x39, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r3}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:11:29 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x5}) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0xfffffffe, 0x0) [ 466.535294][T11915] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 466.556873][T11915] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 466.623943][ T32] audit: type=1804 audit(1595103089.749:117): pid=11919 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/69/bus" dev="sda1" ino=16190 res=1 [ 466.648925][ T32] audit: type=1804 audit(1595103089.759:118): pid=11917 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/69/bus" dev="sda1" ino=16190 res=1 20:11:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) capget(&(0x7f00000001c0)={0x19980330, r2}, &(0x7f0000000280)) close(0xffffffffffffffff) 20:11:30 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0xfffffffe, 0x0) [ 467.184807][T11922] capability: warning: `syz-executor.3' uses 32-bit capabilities (legacy support in use) 20:11:30 executing program 0: 20:11:30 executing program 3: 20:11:30 executing program 5: mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0xfffffffe, 0x0) 20:11:30 executing program 0: 20:11:31 executing program 3: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x0, 0x0, 0x103, 0x1}, 0x20) close(r0) [ 467.817872][T11933] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 20:11:31 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000001c0)="55f77db57e8174316b582b24ab79bae9b8d9d46bb9b7091b9b22c2b391fe7d5f546a044b4b9828458339d1a79b357be05ef7fb0668dccdad2ab8b4a680e98f18a740e232544b1d97db655cc7ff83f066c099b52641be475d4089280afd725e6a3beec116d93ed6858fb46905e386ce87fc82257bc544bb8f4b860b0ef9b3267ff1df2a369cddc4eb3f") ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:11:31 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) fcntl$getown(r1, 0x9) rt_sigqueueinfo(0x0, 0x8, &(0x7f0000000040)={0x39, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r3}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:11:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0x12, 0x0, 0x201ffffe, 0x0, 0x3}}) 20:11:31 executing program 5: mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 468.169178][ T32] audit: type=1804 audit(1595103091.289:119): pid=11939 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/70/bus" dev="sda1" ino=16190 res=1 20:11:31 executing program 0: [ 468.305414][ T32] audit: type=1804 audit(1595103091.329:120): pid=11939 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/70/bus" dev="sda1" ino=16190 res=1 20:11:31 executing program 3: 20:11:31 executing program 2: 20:11:31 executing program 5: mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 20:11:31 executing program 0: 20:11:32 executing program 3: 20:11:32 executing program 2: 20:11:32 executing program 5: mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 20:11:32 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000001c0)="55f77db57e8174316b582b24ab79bae9b8d9d46bb9b7091b9b22c2b391fe7d5f546a044b4b9828458339d1a79b357be05ef7fb0668dccdad2ab8b4a680e98f18a740e232544b1d97db655cc7ff83f066c099b52641be475d4089280afd725e6a3beec116d93ed6858fb46905e386ce87fc82257bc544bb8f4b860b0ef9b3267ff1df2a369cddc4eb3f") ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:11:32 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x0, &(0x7f0000000040)={0x39, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) [ 469.763043][ T32] audit: type=1804 audit(1595103092.889:121): pid=11968 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/71/bus" dev="sda1" ino=16194 res=1 20:11:32 executing program 0: 20:11:33 executing program 2: [ 469.934134][ T32] audit: type=1804 audit(1595103092.929:122): pid=11968 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/71/bus" dev="sda1" ino=16194 res=1 20:11:33 executing program 3: 20:11:33 executing program 5: 20:11:33 executing program 0: 20:11:33 executing program 2: 20:11:33 executing program 3: 20:11:33 executing program 5: 20:11:33 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000001c0)="55f77db57e8174316b582b24ab79bae9b8d9d46bb9b7091b9b22c2b391fe7d5f546a044b4b9828458339d1a79b357be05ef7fb0668dccdad2ab8b4a680e98f18a740e232544b1d97db655cc7ff83f066c099b52641be475d4089280afd725e6a3beec116d93ed6858fb46905e386ce87fc82257bc544bb8f4b860b0ef9b3267ff1df2a369cddc4eb3f") ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:11:33 executing program 0: 20:11:34 executing program 3: 20:11:34 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x0, &(0x7f0000000040)={0x39, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:11:34 executing program 2: 20:11:34 executing program 5: 20:11:34 executing program 3: 20:11:34 executing program 0: 20:11:34 executing program 5: 20:11:34 executing program 2: [ 471.442414][ T32] audit: type=1804 audit(1595103094.569:123): pid=11997 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/72/bus" dev="sda1" ino=16208 res=1 20:11:34 executing program 3: [ 471.543881][ T32] audit: type=1804 audit(1595103094.609:124): pid=11997 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/72/bus" dev="sda1" ino=16208 res=1 20:11:34 executing program 0: 20:11:34 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000001c0)="55f77db57e8174316b582b24ab79bae9b8d9d46bb9b7091b9b22c2b391fe7d5f546a044b4b9828458339d1a79b357be05ef7fb0668dccdad2ab8b4a680e98f18a740e232544b1d97db655cc7ff83f066c099b52641be475d4089280afd725e6a3beec116d93ed6858fb46905e386ce87fc82257bc544bb8f4b860b0ef9b3267ff1df2a369cddc4eb3f") ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:11:34 executing program 5: 20:11:35 executing program 2: 20:11:35 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x0, &(0x7f0000000040)={0x39, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:11:35 executing program 3: 20:11:35 executing program 0: 20:11:35 executing program 5: 20:11:35 executing program 2: [ 472.555568][ T32] audit: type=1804 audit(1595103095.679:125): pid=12011 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/73/bus" dev="sda1" ino=15793 res=1 [ 472.580662][ T32] audit: type=1804 audit(1595103095.699:126): pid=12011 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/73/bus" dev="sda1" ino=15793 res=1 20:11:35 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000001c0)="55f77db57e8174316b582b24ab79bae9b8d9d46bb9b7091b9b22c2b391fe7d5f546a044b4b9828458339d1a79b357be05ef7fb0668dccdad2ab8b4a680e98f18a740e232544b1d97db655cc7ff83f066c099b52641be475d4089280afd725e6a3beec116d93ed6858fb46905e386ce87fc82257bc544bb8f4b860b0ef9b3267ff1df2a369cddc4eb3f") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:11:35 executing program 3: 20:11:36 executing program 5: 20:11:36 executing program 0: 20:11:36 executing program 2: 20:11:36 executing program 0: 20:11:36 executing program 3: 20:11:36 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:11:36 executing program 2: 20:11:36 executing program 5: 20:11:36 executing program 3: 20:11:36 executing program 0: 20:11:37 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000001c0)="55f77db57e8174316b582b24ab79bae9b8d9d46bb9b7091b9b22c2b391fe7d5f546a044b4b9828458339d1a79b357be05ef7fb0668dccdad2ab8b4a680e98f18a740e232544b1d97db655cc7ff83f066c099b52641be475d4089280afd725e6a3beec116d93ed6858fb46905e386ce87fc82257bc544bb8f4b860b0ef9b3267ff1df2a369cddc4eb3f") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:11:37 executing program 3: 20:11:37 executing program 0: 20:11:37 executing program 2: [ 474.134346][ T32] audit: type=1804 audit(1595103097.259:127): pid=12036 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/74/bus" dev="sda1" ino=15746 res=1 [ 474.159865][ T32] audit: type=1804 audit(1595103097.279:128): pid=12036 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/74/bus" dev="sda1" ino=15746 res=1 20:11:37 executing program 5: 20:11:37 executing program 0: 20:11:37 executing program 3: 20:11:38 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:11:38 executing program 2: 20:11:38 executing program 5: 20:11:38 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="e8"]) 20:11:38 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x11c, &(0x7f0000000140)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:38 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000001c0)="55f77db57e8174316b582b24ab79bae9b8d9d46bb9b7091b9b22c2b391fe7d5f546a044b4b9828458339d1a79b357be05ef7fb0668dccdad2ab8b4a680e98f18a740e232544b1d97db655cc7ff83f066c099b52641be475d4089280afd725e6a3beec116d93ed6858fb46905e386ce87fc82257bc544bb8f4b860b0ef9b3267ff1df2a369cddc4eb3f") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:11:38 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="25bca274769e620a2734fa0095e0612687ecb86a548802a907000000000000004e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f00000018c0)=ANY=[]) 20:11:38 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x106, &(0x7f0000000140)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:38 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"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", 0x1000}}, 0x1006) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400000, 0x0) r2 = socket$inet6(0xa, 0x3, 0x5) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7, 0x1, 'fq\x00'}, {0xc, 0x2, [@TCA_FQ_FLOW_MAX_RATE={0x8}]}}]}, 0x38}}, 0x0) [ 475.622805][ T32] audit: type=1804 audit(1595103098.749:129): pid=12064 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/75/bus" dev="sda1" ino=15746 res=1 [ 475.734180][ T32] audit: type=1804 audit(1595103098.779:130): pid=12064 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/75/bus" dev="sda1" ino=15746 res=1 [ 475.970348][T12071] EXT4-fs (loop5): Unsupported filesystem blocksize 131072 (7 log_block_size) 20:11:39 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xf4, &(0x7f0000000140)="c4fe91070000000000000022addee07bee6333b5cacd891969b61832cb470c94d61f3514dca771f3321613602c22bee39d365da4a455f4c9fd98ec346760c7bae64d3d00f80a16eba967a568097aa4acd6ecd74d473ff2bdb969312256c959b23dc67ef8a112b1101ff70ba1b1ea9eccc4d20091612f4738fd8472c841a30df0ccd550f022dca8b8751665c2f3caa33b2ce49cf49a71e9469301b81c2a6f8bc4c94a0a104ab4fb3b4bc679f40402e29bbd9f8a29e27a1dea45b217db6e5ad12abff8074596b321dd7032fe5c1c6a8b13d72f7375305b4be1649ba3d6aef7fc43ac2b987862669a47075648ac11ad392824885fad"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:39 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:11:39 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"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", 0x1000}}, 0x1006) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400000, 0x0) r2 = socket$inet6(0xa, 0x3, 0x5) open(&(0x7f0000000100)='./file0\x00', 0x109902, 0x11) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7, 0x1, 'fq\x00'}, {0xc, 0x2, [@TCA_FQ_FLOW_MAX_RATE={0x8}]}}]}, 0x38}}, 0x0) 20:11:39 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:11:39 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000100)={0xfffffff8, 0x0, "3496accafa2b880e1102af566bb0844d6f56246504e24403dd39b282edf50bbb"}) [ 476.907141][ T32] audit: type=1804 audit(1595103100.029:131): pid=12096 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/76/bus" dev="sda1" ino=16247 res=1 [ 476.932187][ T32] audit: type=1804 audit(1595103100.039:132): pid=12096 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/76/bus" dev="sda1" ino=16247 res=1 20:11:40 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000100)={0xfffffff8, 0x0, "3496accafa2b880e1102af566bb0844d6f56246504e24403dd39b282edf50bbb"}) 20:11:40 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:11:41 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xf1, &(0x7f0000000140)="c4fe91070000000000000022addee07bee6333b5cacd891969b61832cb470c94d61f3514dca771f3321613602c22bee39d365da4a455f4c9fd98ec346760c7bae64d3d00f80a16eba967a568097aa4acd6ecd74d473ff2bdb969312256c959b23dc67ef8a112b1101ff70ba1b1ea9eccc4d20091612f4738fd8472c841a30df0ccd550f022dca8b8751665c2f3caa33b2ce49cf49a71e9469301b81c2a6f8bc4c94a0a104ab4fb3b4bc679f40402e29bbd9f8a29e27a1dea45b217db6e5ad12abff8074596b321dd7032fe5c1c6a8b13d72f7375305b4be1649ba3d6aef7fc43ac2b987862669a47075648ac11ad392824"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:41 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000100)={0xfffffff8, 0x0, "3496accafa2b880e1102af566bb0844d6f56246504e24403dd39b282edf50bbb"}) 20:11:41 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) [ 478.585631][ T32] audit: type=1804 audit(1595103101.709:133): pid=12115 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/77/bus" dev="sda1" ino=16247 res=1 [ 478.701028][ T32] audit: type=1804 audit(1595103101.749:134): pid=12115 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/77/bus" dev="sda1" ino=16247 res=1 20:11:41 executing program 2: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x102740, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = socket$inet(0x2, 0x3, 0x3) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r1, r0) 20:11:41 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) [ 479.068796][ T0] NOHZ: local_softirq_pending 08 20:11:42 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x5) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x30, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7, 0x1, 'fq\x00'}, {0x4}}]}, 0x30}}, 0x0) 20:11:42 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000100)={0xfffffff8, 0x0, "3496accafa2b880e1102af566bb0844d6f56246504e24403dd39b282edf50bbb"}) 20:11:42 executing program 2: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f00000000c0)={0x0, "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"}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/5, 0x5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x139, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:42 executing program 3: ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000100)={0xfffffff8, 0x0, "3496accafa2b880e1102af566bb0844d6f56246504e24403dd39b282edf50bbb"}) 20:11:42 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x0, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:11:42 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:11:43 executing program 3: ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000100)={0xfffffff8, 0x0, "3496accafa2b880e1102af566bb0844d6f56246504e24403dd39b282edf50bbb"}) [ 480.062991][ T32] audit: type=1804 audit(1595103103.189:135): pid=12149 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/78/bus" dev="sda1" ino=16269 res=1 [ 480.247003][ T32] audit: type=1804 audit(1595103103.249:136): pid=12149 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/78/bus" dev="sda1" ino=16269 res=1 20:11:44 executing program 0: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp1\x00', 0x0, 0x0) ioctl$mixer_OSS_ALSAEMULVER(r0, 0x80044df9, &(0x7f00000000c0)) 20:11:44 executing program 3: ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000100)={0xfffffff8, 0x0, "3496accafa2b880e1102af566bb0844d6f56246504e24403dd39b282edf50bbb"}) 20:11:44 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:11:45 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x0, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:11:45 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) [ 482.445345][ T32] audit: type=1804 audit(1595103105.569:137): pid=12165 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/79/bus" dev="sda1" ino=15722 res=1 [ 482.470730][ T32] audit: type=1804 audit(1595103105.569:138): pid=12165 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/79/bus" dev="sda1" ino=15722 res=1 20:11:46 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000180)={0xed73, 0x39, 0x0, 0xffffffffffffffff}) r3 = dup(r2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000001c0)={0x0, 0x0, r3}) 20:11:46 executing program 3: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000100)={0xfffffff8, 0x0, "3496accafa2b880e1102af566bb0844d6f56246504e24403dd39b282edf50bbb"}) 20:11:46 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x23}}, 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x30009, 0x0) 20:11:46 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:11:46 executing program 0: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp1\x00', 0x0, 0x0) ioctl$mixer_OSS_ALSAEMULVER(r0, 0x80044df9, &(0x7f00000000c0)) 20:11:46 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f00000000c0)) ptrace(0x10, 0x0) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, 0x0, 0x2, &(0x7f0000000180)={0x0}) 20:11:46 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x0, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:11:46 executing program 3: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000100)={0xfffffff8, 0x0, "3496accafa2b880e1102af566bb0844d6f56246504e24403dd39b282edf50bbb"}) 20:11:47 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f00000000c0)) ptrace(0x10, 0x0) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, 0x0, 0x2, &(0x7f0000000180)={0x0}) [ 484.040097][ T32] audit: type=1804 audit(1595103107.159:139): pid=12190 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/80/bus" dev="sda1" ino=16283 res=1 20:11:47 executing program 0: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp1\x00', 0x0, 0x0) ioctl$mixer_OSS_ALSAEMULVER(r0, 0x80044df9, &(0x7f00000000c0)) 20:11:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1f, &(0x7f0000000040)=""/33, &(0x7f0000000080)=0x21) [ 484.137533][ T32] audit: type=1804 audit(1595103107.199:140): pid=12190 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/80/bus" dev="sda1" ino=16283 res=1 20:11:47 executing program 3: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000100)={0xfffffff8, 0x0, "3496accafa2b880e1102af566bb0844d6f56246504e24403dd39b282edf50bbb"}) 20:11:47 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f00000000c0)) ptrace(0x10, 0x0) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, 0x0, 0x2, &(0x7f0000000180)={0x0}) 20:11:47 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) socket$isdn_base(0x22, 0x3, 0x0) 20:11:47 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xf8, &(0x7f0000000140)="c4fe91070000000000000022addee07bee6333b5cacd891969b61832cb470c94d61f3514dca771f3321613602c22bee39d365da4a455f4c9fd98ec346760c7bae64d3d00f80a16eba967a568097aa4acd6ecd74d473ff2bdb969312256c959b23dc67ef8a112b1101ff70ba1b1ea9eccc4d20091612f4738fd8472c841a30df0ccd550f022dca8b8751665c2f3caa33b2ce49cf49a71e9469301b81c2a6f8bc4c94a0a104ab4fb3b4bc679f40402e29bbd9f8a29e27a1dea45b217db6e5ad12abff8074596b321dd7032fe5c1c6a8b13d72f7375305b4be1649ba3d6aef7fc43ac2b987862669a47075648ac11ad392824885fada70eb167"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:47 executing program 3: syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000100)={0xfffffff8, 0x0, "3496accafa2b880e1102af566bb0844d6f56246504e24403dd39b282edf50bbb"}) 20:11:47 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x15, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregs(0xf, 0x0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r0, 0x2, &(0x7f0000000180)={0x0}) 20:11:48 executing program 0: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp1\x00', 0x0, 0x0) ioctl$mixer_OSS_ALSAEMULVER(r0, 0x80044df9, &(0x7f00000000c0)) 20:11:48 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:11:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @cfhsi={{0xa, 0x1, 'cfhsi\x00'}, {0x14, 0x2, 0x0, 0x1, [@__IFLA_CAIF_HSI_INACTIVITY_TOUT={0x8}, @__IFLA_CAIF_HSI_QHIGH_WATERMARK={0x8}]}}}]}, 0x44}}, 0x0) 20:11:48 executing program 3: syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000100)={0xfffffff8, 0x0, "3496accafa2b880e1102af566bb0844d6f56246504e24403dd39b282edf50bbb"}) 20:11:48 executing program 0: ioctl$mixer_OSS_ALSAEMULVER(0xffffffffffffffff, 0x80044df9, &(0x7f00000000c0)) 20:11:48 executing program 3: syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000100)={0xfffffff8, 0x0, "3496accafa2b880e1102af566bb0844d6f56246504e24403dd39b282edf50bbb"}) [ 485.733878][ T32] audit: type=1804 audit(1595103108.859:141): pid=12230 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/81/bus" dev="sda1" ino=16287 res=1 20:11:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c0000001200054b00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012800a0001"], 0x3c}}, 0x0) [ 485.851501][ T32] audit: type=1804 audit(1595103108.919:142): pid=12230 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/81/bus" dev="sda1" ino=16287 res=1 20:11:49 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x15, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregs(0xf, 0x0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r0, 0x2, &(0x7f0000000180)={0x0}) 20:11:49 executing program 0: ioctl$mixer_OSS_ALSAEMULVER(0xffffffffffffffff, 0x80044df9, &(0x7f00000000c0)) [ 486.164705][T12238] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 486.226524][T12240] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 20:11:51 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9f, 0x20982) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000200)={0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0}) 20:11:51 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, 0x0) 20:11:51 executing program 0: ioctl$mixer_OSS_ALSAEMULVER(0xffffffffffffffff, 0x80044df9, &(0x7f00000000c0)) 20:11:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @cfhsi={{0xa, 0x1, 'cfhsi\x00'}, {0x14, 0x2, 0x0, 0x1, [@__IFLA_CAIF_HSI_INACTIVITY_TOUT={0x8}, @__IFLA_CAIF_HSI_QHIGH_WATERMARK={0x8}]}}}]}, 0x44}}, 0x0) 20:11:51 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:11:51 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x15, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregs(0xf, 0x0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r0, 0x2, &(0x7f0000000180)={0x0}) [ 488.260140][ T32] audit: type=1804 audit(1595103111.379:143): pid=12263 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/82/bus" dev="sda1" ino=16309 res=1 20:11:51 executing program 0: r0 = openat$dsp1(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$mixer_OSS_ALSAEMULVER(r0, 0x80044df9, &(0x7f00000000c0)) 20:11:51 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, 0x0) [ 488.430459][ T32] audit: type=1804 audit(1595103111.439:144): pid=12263 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/82/bus" dev="sda1" ino=16309 res=1 20:11:51 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9f, 0x20982) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000200)={0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0}) 20:11:51 executing program 2: timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) vmsplice(r0, &(0x7f0000000080)=[{0x0}], 0x1, 0x0) r1 = gettid() tkill(r1, 0x1000000000016) 20:11:52 executing program 4: r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:11:52 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, 0x0) 20:11:52 executing program 0: r0 = openat$dsp1(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$mixer_OSS_ALSAEMULVER(r0, 0x80044df9, &(0x7f00000000c0)) 20:11:52 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9f, 0x20982) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000200)={0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0}) 20:11:52 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9f, 0x20982) ioctl$USBDEVFS_GET_CAPABILITIES(r0, 0x8004551a, &(0x7f0000000000)) 20:11:52 executing program 4: r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:11:52 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:11:52 executing program 0: r0 = openat$dsp1(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$mixer_OSS_ALSAEMULVER(r0, 0x80044df9, &(0x7f00000000c0)) 20:11:52 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000100)={0x0, 0x0, "3496accafa2b880e1102af566bb0844d6f56246504e24403dd39b282edf50bbb"}) 20:11:52 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9f, 0x20982) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000200)={0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0}) 20:11:53 executing program 2: r0 = memfd_create(&(0x7f0000000240)='t\bnu\x8c\xc4', 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000380)="d5", 0x1}], 0x1, 0x881806) read(r0, &(0x7f0000000000)=""/30, 0xfffffe4c) 20:11:53 executing program 0: openat$dsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp1\x00', 0x0, 0x0) ioctl$mixer_OSS_ALSAEMULVER(0xffffffffffffffff, 0x80044df9, &(0x7f00000000c0)) [ 490.166547][ T32] audit: type=1804 audit(1595103113.289:145): pid=12303 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/83/bus" dev="sda1" ino=16300 res=1 [ 490.191855][ T32] audit: type=1804 audit(1595103113.289:146): pid=12303 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/83/bus" dev="sda1" ino=16300 res=1 20:11:53 executing program 4: r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:11:53 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000100)={0x0, 0x0, "3496accafa2b880e1102af566bb0844d6f56246504e24403dd39b282edf50bbb"}) 20:11:53 executing program 5: ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000200)={0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0}) 20:11:53 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:11:54 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000100)={0x0, 0x0, "3496accafa2b880e1102af566bb0844d6f56246504e24403dd39b282edf50bbb"}) 20:11:54 executing program 5: ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000200)={0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0}) 20:11:54 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x32) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r1 = fcntl$getown(r0, 0x9) rt_sigqueueinfo(r1, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r2}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r0, 0x8000000) mlockall(0x1) 20:11:54 executing program 0: openat$dsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp1\x00', 0x0, 0x0) ioctl$mixer_OSS_ALSAEMULVER(0xffffffffffffffff, 0x80044df9, &(0x7f00000000c0)) 20:11:54 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:11:54 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x1, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x11e) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='status\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0) 20:11:54 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x11a, &(0x7f0000000140)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:54 executing program 5: ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000200)={0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0}) 20:11:55 executing program 5: r0 = syz_open_dev$usbfs(0x0, 0x1a9f, 0x20982) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000200)={0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 491.966660][ T32] audit: type=1804 audit(1595103115.089:147): pid=12342 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/84/bus" dev="sda1" ino=16329 res=1 [ 491.992210][ T32] audit: type=1804 audit(1595103115.089:148): pid=12342 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/84/bus" dev="sda1" ino=16329 res=1 20:11:55 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:11:56 executing program 5: r0 = syz_open_dev$usbfs(0x0, 0x1a9f, 0x20982) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000200)={0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0}) 20:11:56 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(0x0, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:11:56 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(0x0, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:11:56 executing program 5: r0 = syz_open_dev$usbfs(0x0, 0x1a9f, 0x20982) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000200)={0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0}) 20:11:56 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x32) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r1 = fcntl$getown(r0, 0x9) rt_sigqueueinfo(r1, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r2}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r0, 0x8000000) mlockall(0x1) [ 493.639229][ T32] audit: type=1804 audit(1595103116.759:149): pid=12369 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/85/bus" dev="sda1" ino=16320 res=1 [ 493.754905][ T32] audit: type=1804 audit(1595103116.809:150): pid=12369 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/85/bus" dev="sda1" ino=16320 res=1 20:11:57 executing program 0: openat$dsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp1\x00', 0x0, 0x0) ioctl$mixer_OSS_ALSAEMULVER(0xffffffffffffffff, 0x80044df9, &(0x7f00000000c0)) 20:11:57 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000001500)) 20:11:57 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(0x0, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:11:58 executing program 2: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) 20:11:58 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x0, 0x20982) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000200)={0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0}) 20:11:58 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, 0x0, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:11:58 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000001500)) 20:11:58 executing program 0: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp1\x00', 0x0, 0x0) ioctl$mixer_OSS_ALSAEMULVER(r0, 0x80044df9, 0x0) 20:11:58 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x32) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r1 = fcntl$getown(r0, 0x9) rt_sigqueueinfo(r1, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r2}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r0, 0x8000000) mlockall(0x1) 20:11:58 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, 0x0, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) [ 495.079351][ T32] audit: type=1804 audit(1595103118.199:151): pid=12392 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/86/bus" dev="sda1" ino=16337 res=1 20:11:58 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x0, 0x20982) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000200)={0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0}) 20:11:58 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000001500)) [ 495.269019][ T32] audit: type=1804 audit(1595103118.239:152): pid=12392 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/86/bus" dev="sda1" ino=16337 res=1 20:11:58 executing program 0: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp1\x00', 0x0, 0x0) ioctl$mixer_OSS_ALSAEMULVER(r0, 0x80044df9, 0x0) 20:11:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x58, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_MLD_VERSION={0x5}, @IFLA_BR_MCAST_QUERIER_INTVL={0xc}, @IFLA_BR_MCAST_HASH_MAX={0x8, 0x1b, 0x8}, @IFLA_BR_PRIORITY={0x6}]}}}]}, 0x58}}, 0x0) 20:11:58 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, 0x0, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:11:58 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000001500)) 20:11:58 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x0, 0x20982) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000200)={0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0}) 20:11:59 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x0, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:11:59 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x0, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:11:59 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9f, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000200)={0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0}) 20:11:59 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x32) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r1 = fcntl$getown(r0, 0x9) rt_sigqueueinfo(r1, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={0xffffffffffffffff, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r0, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r3}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r0, 0x8000000) mlockall(0x1) 20:11:59 executing program 2: syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0)='nl80211\x00') unshare(0x40000000) connect(0xffffffffffffffff, &(0x7f00000002c0)=@in={0x2, 0x0, @private=0xa010102}, 0x80) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, 0x0) pipe(0x0) 20:11:59 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000001500)) 20:11:59 executing program 0: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp1\x00', 0x0, 0x0) ioctl$mixer_OSS_ALSAEMULVER(r0, 0x80044df9, 0x0) 20:11:59 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x0, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:11:59 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9f, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000200)={0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 496.813110][T12434] IPVS: ftp: loaded support on port[0] = 21 [ 496.832344][ T32] audit: type=1804 audit(1595103119.959:153): pid=12437 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/87/bus" dev="sda1" ino=16345 res=1 20:12:00 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000001500)) 20:12:00 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, 0x0) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) [ 497.092327][ T32] audit: type=1804 audit(1595103119.989:154): pid=12437 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/87/bus" dev="sda1" ino=16345 res=1 20:12:00 executing program 2: unshare(0x40000000) socket$inet_udp(0x2, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x290542, 0x0) 20:12:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x38, 0x0, 0x1, 0x301, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x38}}, 0x0) 20:12:00 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, 0x0) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:12:00 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9f, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000200)={0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 497.433404][ T609] tipc: TX() has been purged, node left! [ 497.595554][T12471] IPVS: ftp: loaded support on port[0] = 21 [ 498.072947][T12471] IPVS: ftp: loaded support on port[0] = 21 20:12:01 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x32) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r1 = fcntl$getown(r0, 0x9) rt_sigqueueinfo(r1, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={0xffffffffffffffff, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r0, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r3}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r0, 0x8000000) mlockall(0x1) 20:12:01 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, 0x0) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:12:01 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000001500)) 20:12:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008000400", @ANYRES32=r2, @ANYBLOB="08001b"], 0x30}}, 0x0) 20:12:01 executing program 5: syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9f, 0x20982) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000200)={0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0}) 20:12:01 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0xffffffffffffffff, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) [ 498.411956][T12534] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 498.430643][T12534] IPv6: ADDRCONF(NETDEV_CHANGE): tunl0: link becomes ready [ 498.444229][T12534] IPv6: ADDRCONF(NETDEV_CHANGE): gre0: link becomes ready [ 498.459509][T12534] IPv6: ADDRCONF(NETDEV_CHANGE): gretap0: link becomes ready [ 498.475058][T12534] IPv6: ADDRCONF(NETDEV_CHANGE): erspan0: link becomes ready [ 498.488623][T12534] IPv6: ADDRCONF(NETDEV_CHANGE): ip_vti0: link becomes ready [ 498.504301][T12534] IPv6: ADDRCONF(NETDEV_CHANGE): ip6_vti0: link becomes ready 20:12:01 executing program 5: syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9f, 0x20982) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000200)={0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0}) 20:12:01 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000001500)) [ 498.708935][ T32] audit: type=1804 audit(1595103121.829:155): pid=12537 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/88/bus" dev="sda1" ino=16358 res=1 20:12:01 executing program 2: unshare(0x40000000) socket$inet_udp(0x2, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x290542, 0x0) [ 498.929089][ T32] audit: type=1804 audit(1595103121.859:156): pid=12536 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/88/bus" dev="sda1" ino=16358 res=1 20:12:02 executing program 5: syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9f, 0x20982) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000200)={0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 499.272204][T12550] IPVS: ftp: loaded support on port[0] = 21 20:12:02 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000001500)) 20:12:02 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x222000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x80, 0x4) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "00000100000000000800000000eba71a4976e200002cb18f6e2e2aba000000012e0b3836005404b0e0301a4c3ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e66f5ff1b0816f3f6db1c0001000000740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0xff55) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r0, &(0x7f0000000900)={0x2c, 0x0, r2}, 0x10) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040), 0x4) 20:12:03 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000001500)) 20:12:03 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0xffffffffffffffff, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:12:03 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x32) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r1 = fcntl$getown(r0, 0x9) rt_sigqueueinfo(r1, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={0xffffffffffffffff, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r0, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r3}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r0, 0x8000000) mlockall(0x1) 20:12:03 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[], 0x208e2a1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a4df00223100e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) 20:12:03 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9f, 0x20982) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, 0x0) 20:12:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r2, &(0x7f00000001c0)={0x0, 0xe00, &(0x7f0000000180)={&(0x7f0000000840)={0x2c, r3, 0x12fc8ad0283830c7, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x2c}, 0x1, 0xf618000000000000}, 0x0) [ 500.593682][ T32] audit: type=1804 audit(1595103123.719:157): pid=12589 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir057645357/syzkaller.BIvtCz/121/cgroup.controllers" dev="sda1" ino=16370 res=1 20:12:03 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000001500)) 20:12:03 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9f, 0x20982) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, 0x0) [ 500.812257][ T32] audit: type=1804 audit(1595103123.849:158): pid=12597 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/89/bus" dev="sda1" ino=16374 res=1 [ 500.838689][ T32] audit: type=1804 audit(1595103123.859:159): pid=12597 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/89/bus" dev="sda1" ino=16374 res=1 20:12:04 executing program 2: r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000100005070ed0b864256b1ceba6000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007e7ffff0777e0d7d774fd40ac00", @ANYRES32=r4, @ANYBLOB="00000000ffffffff01000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x87c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x8}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x84c, 0x2, [@TCA_BASIC_POLICE={0x848, 0x4, [@TCA_POLICE_PEAKRATE={0x404}, @TCA_POLICE_RATE={0x404}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x4000000}, {0x80, 0x0, 0x0, 0x0, 0x0, 0x20}}}]}]}}]}, 0x87c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 20:12:04 executing program 0: socket$inet6(0xa, 0x1, 0x0) setitimer(0x1, &(0x7f0000000000)={{}, {0x0, 0x2710}}, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000, 0x7, &(0x7f0000ffc000/0x1000)=nil) perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_emit_ethernet(0x12a1, 0x0, &(0x7f0000000140)={0x1, 0x1, [0x10a, 0xaf5, 0x1ee, 0xa27]}) r1 = gettid() prlimit64(r1, 0x0, 0x0, &(0x7f00000000c0)) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000200)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$eventfd(0xffffffffffffffff, &(0x7f0000000080)=0x825e, 0x8) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x6, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9281a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 20:12:04 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0xffffffffffffffff, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) [ 501.356858][T12607] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 20:12:04 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBLED(r0, 0x4b64, 0x0) 20:12:04 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9f, 0x20982) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, 0x0) [ 501.613937][T12614] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 20:12:05 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000140)={0x0, 0x0, 0x69c4}) r1 = dup2(r0, r0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000000)={0x2000ff16, 0x8384}, 0xff16) 20:12:05 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x0, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:12:05 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBLED(r0, 0x4b64, 0x0) 20:12:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x146, &(0x7f0000000200)={@broadcast, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x110, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b2590b1c71a8242373244ad2439adc07df0a69748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81802"}, {0x0, 0x1, "40000000000095e38bbfae5f"}, {0x3, 0x15, "8dcc2fd3fc316fd01bee9a930f51ac3aa596272dae8ae89cb1ead0996e3aa57dc4379d1b981c6cfc714d17df090afeadd5bb95f77c97064fcbb41aaf432daad94a5fb3a32b7004d2bc40fb7679af4023ebffe6ef8de80b9b3a81547cd4d61c4dbaddb40935d93add71b0fc8210e25667900917af5d6d1f3629bf7df5a4bb6735581e620600afa680dbd5003bcedff248887a9bcbcbef5dc0e9c4a09d97533782edee8b716b15"}]}}}}}}, 0x0) 20:12:05 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9f, 0x20982) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000200)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0}) 20:12:05 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, 0x0) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) [ 502.832450][T12639] IPv6: addrconf: prefix option has invalid lifetime [ 502.896799][T12639] IPv6: addrconf: prefix option has invalid lifetime [ 502.950530][ T32] audit: type=1804 audit(1595103126.069:160): pid=12643 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/90/bus" dev="sda1" ino=16384 res=1 20:12:06 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBLED(r0, 0x4b64, 0x0) 20:12:06 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9f, 0x20982) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000200)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 503.107608][ T32] audit: type=1804 audit(1595103126.109:161): pid=12643 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/90/bus" dev="sda1" ino=16384 res=1 20:12:06 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xffffff88, 0x0, 0x26}}], 0x1, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) sendmsg$NLBL_MGMT_C_LISTDEF(0xffffffffffffffff, 0x0, 0x0) sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r2, &(0x7f00000017c0), 0x315, 0x800000) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, 0x0) 20:12:06 executing program 2: 20:12:06 executing program 3: 20:12:06 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, 0x0) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:12:07 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9f, 0x20982) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000200)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 504.073353][ T609] tipc: TX() has been purged, node left! [ 504.235839][ T609] tipc: TX() has been purged, node left! 20:12:07 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x0, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:12:07 executing program 2: 20:12:07 executing program 0: 20:12:07 executing program 3: 20:12:07 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9f, 0x20982) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000200)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 504.433532][ T609] tipc: TX() has been purged, node left! [ 504.624960][ T32] audit: type=1804 audit(1595103127.749:162): pid=12667 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/91/bus" dev="sda1" ino=16368 res=1 20:12:07 executing program 3: 20:12:07 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9f, 0x20982) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000200)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 20:12:07 executing program 0: 20:12:07 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, 0x0) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:12:07 executing program 2: [ 504.826149][ T32] audit: type=1804 audit(1595103127.779:163): pid=12667 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/91/bus" dev="sda1" ino=16368 res=1 20:12:08 executing program 2: 20:12:08 executing program 3: 20:12:09 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x0, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:12:09 executing program 0: 20:12:09 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9f, 0x20982) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000200)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 20:12:09 executing program 3: 20:12:09 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:12:09 executing program 2: 20:12:09 executing program 2: 20:12:09 executing program 0: 20:12:09 executing program 3: [ 506.559503][ T32] audit: type=1804 audit(1595103129.679:164): pid=12695 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/92/bus" dev="sda1" ino=16367 res=1 [ 506.585809][ T32] audit: type=1804 audit(1595103129.689:165): pid=12695 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/92/bus" dev="sda1" ino=16367 res=1 20:12:09 executing program 5: 20:12:10 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:12:10 executing program 3: 20:12:10 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:12:10 executing program 2: 20:12:10 executing program 0: 20:12:10 executing program 5: 20:12:10 executing program 3: 20:12:11 executing program 3: 20:12:11 executing program 2: 20:12:11 executing program 0: 20:12:11 executing program 5: [ 508.219635][ T32] audit: type=1804 audit(1595103131.339:166): pid=12713 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/93/bus" dev="sda1" ino=16049 res=1 20:12:11 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:12:11 executing program 2: 20:12:11 executing program 3: 20:12:12 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:12:12 executing program 0: 20:12:12 executing program 5: 20:12:12 executing program 2: 20:12:12 executing program 3: 20:12:12 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x15, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregs(0xf, 0x0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r0, 0x2, &(0x7f0000000180)={0x0}) 20:12:12 executing program 0: 20:12:12 executing program 2: 20:12:12 executing program 3: [ 509.825100][ T32] audit: type=1804 audit(1595103132.949:167): pid=12736 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/94/bus" dev="sda1" ino=16049 res=1 20:12:13 executing program 5: [ 509.919199][ T32] audit: type=1804 audit(1595103132.979:168): pid=12736 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/94/bus" dev="sda1" ino=16049 res=1 20:12:13 executing program 2: 20:12:13 executing program 3: 20:12:14 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:12:14 executing program 0: 20:12:14 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x15, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregs(0xf, 0x0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r0, 0x2, &(0x7f0000000180)={0x0}) 20:12:14 executing program 5: 20:12:14 executing program 2: 20:12:14 executing program 3: 20:12:14 executing program 5: 20:12:14 executing program 0: 20:12:14 executing program 3: 20:12:14 executing program 2: [ 511.293661][ T32] audit: type=1804 audit(1595103134.419:169): pid=12755 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/95/bus" dev="sda1" ino=16369 res=1 [ 511.426682][ T32] audit: type=1804 audit(1595103134.459:170): pid=12755 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/95/bus" dev="sda1" ino=16369 res=1 20:12:14 executing program 0: 20:12:14 executing program 5: 20:12:15 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r3}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:12:15 executing program 3: 20:12:15 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x15, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregs(0xf, 0x0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r0, 0x2, &(0x7f0000000180)={0x0}) 20:12:15 executing program 2: 20:12:15 executing program 5: 20:12:15 executing program 0: 20:12:15 executing program 0: [ 512.589248][ T32] audit: type=1804 audit(1595103135.709:171): pid=12774 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/96/bus" dev="sda1" ino=16363 res=1 20:12:15 executing program 5: 20:12:15 executing program 2: 20:12:15 executing program 3: [ 512.757470][ T32] audit: type=1804 audit(1595103135.759:172): pid=12774 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/96/bus" dev="sda1" ino=16363 res=1 20:12:16 executing program 0: 20:12:16 executing program 5: 20:12:17 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r3}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:12:17 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, 0x0) ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:12:17 executing program 2: 20:12:17 executing program 0: 20:12:17 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x29, 0x2, 0x0) close(r1) r2 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x20004019) close(r1) 20:12:17 executing program 5: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r1 = open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)) fcntl$notify(r2, 0x402, 0xb1c661d398500c73) fcntl$setownex(r2, 0xf, &(0x7f0000000080)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r3, 0x208200) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffa) [ 514.196085][ T32] audit: type=1804 audit(1595103137.319:173): pid=12789 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/97/bus" dev="sda1" ino=15861 res=1 [ 514.221239][ T32] audit: type=1804 audit(1595103137.319:174): pid=12789 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/97/bus" dev="sda1" ino=15861 res=1 20:12:17 executing program 3: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r1 = open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)) fcntl$notify(r2, 0x402, 0xb1c661d398500c73) fcntl$setownex(r2, 0xf, &(0x7f0000000080)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r3, 0x208200) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffa) [ 514.547644][ T32] audit: type=1800 audit(1595103137.659:175): pid=12799 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=15906 res=0 20:12:17 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8000000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x40) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000214fd4)={0xc, 0x4, 0x4, 0x234, 0x0, r0, 0x0, [0x305f, 0xa, 0x300, 0x1800, 0x6000000]}, 0x2c) r1 = socket$alg(0x26, 0x5, 0x0) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, 0x0, 0x0, 0x0, 0x25dfdbfe, {}, [@NL80211_ATTR_WIPHY_NAME={0x14, 0x2, 'macsec0\x00'}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, 0x400000}, @NL80211_ATTR_WIPHY_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x48000}, 0x880) bind$alg(r1, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) r2 = syz_open_procfs(0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000200)={0x2, 0x0, [0x0, 0x0]}) 20:12:17 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x6, 0x4) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) [ 514.833328][ T32] audit: type=1800 audit(1595103137.959:176): pid=12801 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15985 res=0 20:12:18 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, 0x0) ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) [ 514.993687][ T32] audit: type=1800 audit(1595103138.069:177): pid=12799 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=15906 res=0 20:12:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="48000000100005070000000010000026a4562026", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000005c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {}, {0x4}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg(r4, &(0x7f0000000180), 0x4000000000002bc, 0x0) [ 515.192478][ T32] audit: type=1800 audit(1595103138.289:178): pid=12801 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15985 res=0 20:12:18 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "ffff00", 0x30, 0x88, 0x0, @local, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x200, {0x0, 0x6, "d66764", 0x0, 0x0, 0x0, @remote, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}}}}}, 0x0) [ 515.554340][T12818] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 515.603432][T12824] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.0'. [ 515.669498][T12825] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.0'. [ 515.727736][T12818] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 515.745475][T12824] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.0'. 20:12:18 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r3}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:12:18 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000140)=[{r0}], 0x1, 0x0) 20:12:18 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000240)={0x0, 0x0, 0x4}) 20:12:18 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) connect$nfc_llcp(r0, &(0x7f0000000700)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8e2cf1b81ac1ad87ac920a64dafdc6e29a41af04528b72595bbeb6263624954aabbb7b940a8613742c4723a1c630bead5b69b41b84cd2789192e0c6345895f", 0x12}, 0x60) 20:12:19 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000040)='proc\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = memfd_create(&(0x7f0000000000), 0x0) sendfile(r1, r0, 0x0, 0xfffffffe) 20:12:19 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, 0x0) ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) [ 516.151012][ T32] audit: type=1804 audit(1595103139.269:179): pid=12834 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/98/bus" dev="sda1" ino=16377 res=1 20:12:19 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x2, 0x6, 0x185, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}]}, 0x44}}, 0x0) [ 516.179873][ T32] audit: type=1804 audit(1595103139.299:180): pid=12834 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/98/bus" dev="sda1" ino=16377 res=1 20:12:19 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000240)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 'syz1\x00', 0x0, 0x0, [], [0x4, 0x2]}) 20:12:19 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xba, &(0x7f0000000140)="c4fe91070000000000000022addee07bee6333b5cacd891969b61832cb470c94d61f3514dca771f3321613602c22bee39d365da4a455f4c9fd98ec346760c7bae64d3d00f80a16eba967a568097aa4acd6ecd74d473ff2bdb969312256c959b23dc67ef8a112b1101ff70ba1b1ea9eccc4d20091612f4738fd8472c841a30df0ccd550f022dca8b8751665c2f3caa33b2ce49cf49a71e9469301b81c2a6f8bc4c94a0a104ab4fb3b4bc679f40402e29bbd9f8a29e27a1dea45b2"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:19 executing program 0: openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x18d542, 0x0) mknod(&(0x7f0000000240)='./bus\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = open(&(0x7f0000000600)='./bus\x00', 0x22, 0x0) pipe(0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) write$P9_RATTACH(r0, &(0x7f0000000080)={0x14}, 0xfffffff4) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000180)={0xc3ce734, {{0xa, 0x4e21, 0x0, @private2={0xfc, 0x2, [], 0x1}, 0xfffffffe}}}, 0x88) 20:12:19 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000063c0)=[{{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @private1}, 0x1c, 0x0}}], 0x1, 0x0) [ 516.852607][ T32] audit: type=1800 audit(1595103139.979:181): pid=12855 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16372 res=0 20:12:20 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x42, 0x2}, @cond}) write$evdev(r0, &(0x7f0000000040), 0x373) [ 516.948076][T12855] NFS: Device name not specified 20:12:20 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:12:20 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$tun(r0, &(0x7f0000000240)={@void, @val={0x3}, @mpls={[], @ipv4=@icmp={{0x5, 0x6, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x88, 0x0, @dev, @remote}, @timestamp}}}, 0x100c) 20:12:20 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)) ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:12:20 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x18d542, 0x0) perf_event_open(&(0x7f000000a000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) open(0x0, 0x22, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) 20:12:20 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x42, 0x2}, @cond}) write$evdev(r0, &(0x7f0000000040), 0x373) [ 517.632591][ T32] audit: type=1800 audit(1595103140.759:182): pid=12872 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16379 res=0 [ 517.689297][T12872] NFS: Device name not specified [ 517.707666][T12873] ptrace attach of "/root/syz-executor.4"[12866] was attempted by "/root/syz-executor.4"[12873] 20:12:20 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)) ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) [ 517.735647][T12874] NFS: Device name not specified [ 517.753802][ T32] audit: type=1800 audit(1595103140.849:183): pid=12872 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16379 res=0 [ 517.867858][ T32] audit: type=1804 audit(1595103140.979:184): pid=12880 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/99/bus" dev="sda1" ino=16369 res=1 20:12:21 executing program 5: openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) io_setup(0x8, &(0x7f0000000600)=0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(r0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) [ 518.077016][ T32] audit: type=1804 audit(1595103141.019:185): pid=12880 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/99/bus" dev="sda1" ino=16369 res=1 20:12:21 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x42, 0x2}, @cond}) write$evdev(r0, &(0x7f0000000040), 0x373) 20:12:22 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xfe, &(0x7f0000000140)="c4fe91070000000000000022addee07bee6333b5cacd891969b61832cb470c94d61f3514dca771f3321613602c22bee39d365da4a455f4c9fd98ec346760c7bae64d3d00f80a16eba967a568097aa4acd6ecd74d473ff2bdb969312256c959b23dc67ef8a112b1101ff70ba1b1ea9eccc4d20091612f4738fd8472c841a30df0ccd550f022dca8b8751665c2f3caa33b2ce49cf49a71e9469301b81c2a6f8bc4c94a0a104ab4fb3b4bc679f40402e29bbd9f8a29e27a1dea45b217db6e5ad12abff8074596b321dd7032fe5c1c6a8b13d72f7375305b4be1649ba3d6aef7fc43ac2b987862669a47075648ac11ad392824885fada70eb16743d405f9a890"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:22 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x42, 0x2}, @cond}) write$evdev(r0, &(0x7f0000000040), 0x373) 20:12:22 executing program 5: openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) io_setup(0x8, &(0x7f0000000600)=0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(r0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 20:12:22 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/msg\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/5, 0x5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x13a, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:22 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)) ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:12:22 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:12:23 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) write$evdev(r0, &(0x7f0000000040), 0x373) 20:12:23 executing program 5: openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) io_setup(0x8, &(0x7f0000000600)=0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(r0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 20:12:23 executing program 5: openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) io_setup(0x8, &(0x7f0000000600)=0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(r0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 20:12:23 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) write$evdev(r0, &(0x7f0000000040), 0x373) 20:12:23 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:12:24 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) write$evdev(r0, &(0x7f0000000040), 0x373) 20:12:26 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xc6, &(0x7f0000000140)="c4fe91070000000000000022addee07bee6333b5cacd891969b61832cb470c94d61f3514dca771f3321613602c22bee39d365da4a455f4c9fd98ec346760c7bae64d3d00f80a16eba967a568097aa4acd6ecd74d473ff2bdb969312256c959b23dc67ef8a112b1101ff70ba1b1ea9eccc4d20091612f4738fd8472c841a30df0ccd550f022dca8b8751665c2f3caa33b2ce49cf49a71e9469301b81c2a6f8bc4c94a0a104ab4fb3b4bc679f40402e29bbd9f8a29e27a1dea45b217db6e5ad12abff8074596b3"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:26 executing program 5: openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) io_setup(0x8, &(0x7f0000000600)=0x0) io_submit(r0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) 20:12:26 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:12:26 executing program 3: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x42, 0x2}, @cond}) write$evdev(0xffffffffffffffff, &(0x7f0000000040), 0x373) 20:12:26 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:12:26 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0xa, &(0x7f0000000080), 0x4) [ 523.067842][ T32] kauditd_printk_skb: 2 callbacks suppressed [ 523.067907][ T32] audit: type=1804 audit(1595103146.189:188): pid=12954 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/101/bus" dev="sda1" ino=16367 res=1 [ 523.099394][ T32] audit: type=1804 audit(1595103146.189:189): pid=12954 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/101/bus" dev="sda1" ino=16367 res=1 20:12:26 executing program 3: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x42, 0x2}, @cond}) write$evdev(0xffffffffffffffff, &(0x7f0000000040), 0x373) 20:12:26 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) io_setup(0x2349, &(0x7f0000000240)) io_submit(0x0, 0x0, 0x0) 20:12:26 executing program 5: openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) io_setup(0x8, &(0x7f0000000600)=0x0) io_submit(r0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) 20:12:26 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:12:27 executing program 3: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x42, 0x2}, @cond}) write$evdev(0xffffffffffffffff, &(0x7f0000000040), 0x373) 20:12:27 executing program 0: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8014, 0x0, 0x0, 0x3, 0x0, 0x100}, 0x0, 0x5, 0xffffffffffffffff, 0x14) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) connect$inet(r0, &(0x7f0000000140)={0x2, 0x2}, 0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @remote}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xa) setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0xffffffffffffffff, 0x1ee) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$EVIOCGABS2F(r2, 0x8018456f, &(0x7f0000000200)=""/190) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000040)={0x2, 0x1, 0x108000, 0x30ce}, 0x14) shutdown(r1, 0x1) 20:12:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="380000002400ffffff7f00000000400000000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000005c0)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {0xfff7}, {}, {0xe}}, [@filter_kind_options=@f_fw={{0x7, 0x1, 'fw\x00'}, {0xc, 0x2, [@TCA_FW_CLASSID={0x8, 0x1, {0x0, 0xe}}]}}]}, 0x38}}, 0x0) r5 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 20:12:29 executing program 5: openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) io_setup(0x8, &(0x7f0000000600)=0x0) io_submit(r0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) 20:12:29 executing program 3: r0 = syz_open_dev$evdev(0x0, 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x42, 0x2}, @cond}) write$evdev(r0, &(0x7f0000000040), 0x373) 20:12:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="380000002400ffffff7f00000000400000000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000005c0)=@newtfilter={0x90, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {0xfff7}, {}, {0xe}}, [@filter_kind_options=@f_fw={{0x7, 0x1, 'fw\x00'}, {0x5c, 0x2, [@TCA_FW_ACT={0x58, 0x4, [@m_simple={0x54, 0x1, 0x0, 0x0, {{0xb, 0x1, 'simple\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_DEF_DATA={0xc, 0x3, 'tcindex\x00'}, @TCA_DEF_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}]}]}}, @TCA_RATE={0x6}]}, 0x90}}, 0x0) r5 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 20:12:29 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x0, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:12:29 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af8") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:12:29 executing program 3: r0 = syz_open_dev$evdev(0x0, 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x42, 0x2}, @cond}) write$evdev(r0, &(0x7f0000000040), 0x373) [ 526.250213][T13002] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 526.311681][ T32] audit: type=1804 audit(1595103149.430:190): pid=13007 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/102/bus" dev="sda1" ino=16368 res=1 [ 526.419239][ T32] audit: type=1804 audit(1595103149.460:191): pid=13005 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/102/bus" dev="sda1" ino=16368 res=1 [ 526.469758][T13002] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 20:12:29 executing program 5: openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(0x0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 20:12:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5", 0x90}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71a", 0x36}, {&(0x7f0000000340)='J', 0x1}], 0x3}}], 0x1, 0x0) [ 526.714813][T13018] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 526.817600][T13018] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 20:12:30 executing program 3: r0 = syz_open_dev$evdev(0x0, 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x42, 0x2}, @cond}) write$evdev(r0, &(0x7f0000000040), 0x373) 20:12:30 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af8") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:12:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x1040000007, 0x1, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00') perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x44140}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:12:30 executing program 5: openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(0x0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 20:12:30 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x42, 0x2}, @cond}) write$evdev(r0, &(0x7f0000000040), 0x373) [ 527.563795][T13042] kvm [13038]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x4000001d data 0x1000000d1 20:12:30 executing program 0: [ 527.607096][T13042] kvm [13038]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000033 data 0x100000041 [ 527.674697][T13042] kvm [13038]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x4000008c data 0x10000006d [ 527.743480][T13042] kvm [13038]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x4000006f data 0x100000088 20:12:30 executing program 5: openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(0x0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 527.813573][T13042] kvm [13038]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000008 data 0x100000034 [ 527.886377][T13042] kvm [13038]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x4000005b data 0x10000004f [ 527.972986][T13042] kvm [13038]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000068 data 0x100000011 20:12:31 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x0, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) [ 528.040798][T13042] kvm [13038]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x4000001b data 0x10000005f 20:12:31 executing program 0: [ 528.102633][T13042] kvm [13038]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x4000008c data 0x10000009b 20:12:31 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x42, 0x2}, @cond}) write$evdev(r0, &(0x7f0000000040), 0x373) [ 528.174636][T13042] kvm [13038]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x4000004c data 0x1000000c1 20:12:31 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af8") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:12:31 executing program 5: io_setup(0x8, &(0x7f0000000600)=0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(r0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) [ 528.453682][ T32] audit: type=1804 audit(1595103151.571:192): pid=13066 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/103/bus" dev="sda1" ino=16367 res=1 20:12:31 executing program 2: [ 528.585375][ T32] audit: type=1804 audit(1595103151.621:193): pid=13066 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/103/bus" dev="sda1" ino=16367 res=1 20:12:31 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xffffff88, 0x0, 0x26}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) 20:12:31 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x42, 0x2}, @cond}) write$evdev(r0, &(0x7f0000000040), 0x373) 20:12:32 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x200000000000000}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) fsync(r2) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x200000008890d100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() tkill(r4, 0x3c) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x7f, 0x0, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8000000200036150, 0x800007b, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:12:32 executing program 5: io_setup(0x8, &(0x7f0000000600)=0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(r0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 20:12:32 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x200000000000000}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x3) fsync(r2) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x200000008890d100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() tkill(r4, 0x3c) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x7}, 0x0) syz_read_part_table(0x7f, 0x2, &(0x7f0000000180)=[{&(0x7f0000001380)="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"/4096, 0x1000, 0xffffffff7bffffff}, {&(0x7f00000000c0)="19b89368aafc6efddc58ad9ee50e03937c4e9f3f4f1a8795769f4925f17ba034c747224e527b0000e80000000000000000dba6", 0x33, 0x7}]) creat(&(0x7f00000001c0)='./file0\x00', 0x99) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8000000200036150, 0x800007b, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0xa2) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:12:32 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x42, 0x2}, @cond}) write$evdev(r0, &(0x7f0000000040), 0x373) 20:12:33 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x0, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:12:33 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a6") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:12:33 executing program 5: io_setup(0x8, &(0x7f0000000600)=0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(r0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 20:12:33 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x42, 0x2}, @cond}) write$evdev(r0, &(0x7f0000000040), 0x373) 20:12:33 executing program 2: 20:12:33 executing program 0: 20:12:33 executing program 2: [ 530.225340][ T32] audit: type=1804 audit(1595103153.342:194): pid=13109 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/104/bus" dev="sda1" ino=16368 res=1 20:12:33 executing program 5: openat$mice(0xffffff9c, 0x0, 0x0) io_setup(0x8, &(0x7f0000000600)=0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(r0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) [ 530.386063][ T32] audit: type=1804 audit(1595103153.372:195): pid=13109 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/104/bus" dev="sda1" ino=16368 res=1 20:12:33 executing program 0: 20:12:33 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x42, 0x2}, @cond}) write$evdev(r0, &(0x7f0000000040), 0x373) 20:12:33 executing program 2: 20:12:33 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a6") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:12:34 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x0, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:12:34 executing program 0: 20:12:34 executing program 5: openat$mice(0xffffff9c, 0x0, 0x0) io_setup(0x8, &(0x7f0000000600)=0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(r0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 20:12:34 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) write$evdev(r0, &(0x7f0000000040), 0x373) 20:12:34 executing program 2: 20:12:34 executing program 2: [ 531.602195][ T32] audit: type=1804 audit(1595103154.723:196): pid=13131 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/105/bus" dev="sda1" ino=16372 res=1 20:12:34 executing program 0: 20:12:34 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) write$evdev(r0, &(0x7f0000000040), 0x373) 20:12:34 executing program 5: openat$mice(0xffffff9c, 0x0, 0x0) io_setup(0x8, &(0x7f0000000600)=0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(r0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) [ 531.823537][ T32] audit: type=1804 audit(1595103154.793:197): pid=13131 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/105/bus" dev="sda1" ino=16372 res=1 20:12:35 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a6") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:12:35 executing program 2: 20:12:35 executing program 0: 20:12:35 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x0, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:12:35 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) write$evdev(r0, &(0x7f0000000040), 0x373) 20:12:35 executing program 5: openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) io_setup(0x0, &(0x7f0000000600)=0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(r0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 20:12:35 executing program 2: 20:12:35 executing program 0: 20:12:36 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac7") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:12:36 executing program 2: 20:12:36 executing program 0: 20:12:36 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {}, {0x42, 0x2}, @cond}) write$evdev(r0, &(0x7f0000000040), 0x373) 20:12:36 executing program 5: openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) io_setup(0x0, &(0x7f0000000600)=0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(r0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) [ 533.237118][ T32] audit: type=1804 audit(1595103156.353:198): pid=13160 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/106/bus" dev="sda1" ino=16366 res=1 [ 533.429193][ T32] audit: type=1804 audit(1595103156.423:199): pid=13160 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/106/bus" dev="sda1" ino=16366 res=1 20:12:36 executing program 0: 20:12:36 executing program 2: 20:12:37 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x0, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:12:37 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac7") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:12:37 executing program 5: openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) io_setup(0x0, &(0x7f0000000600)=0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(r0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 20:12:37 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {}, {0x42, 0x2}, @cond}) write$evdev(r0, &(0x7f0000000040), 0x373) 20:12:37 executing program 0: 20:12:37 executing program 2: [ 534.787896][ T32] audit: type=1804 audit(1595103157.914:200): pid=13186 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/107/bus" dev="sda1" ino=16355 res=1 20:12:38 executing program 0: 20:12:38 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {}, {0x42, 0x2}, @cond}) write$evdev(r0, &(0x7f0000000040), 0x373) 20:12:38 executing program 2: [ 534.956807][ T32] audit: type=1804 audit(1595103157.974:201): pid=13186 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/107/bus" dev="sda1" ino=16355 res=1 20:12:38 executing program 5: openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) io_setup(0x8, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(0x0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 20:12:38 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac7") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:12:38 executing program 2: 20:12:39 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x0, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:12:39 executing program 0: 20:12:39 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x0, 0x2}, @cond}) write$evdev(r0, &(0x7f0000000040), 0x373) 20:12:39 executing program 5: openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) io_setup(0x8, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(0x0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 20:12:39 executing program 2: 20:12:39 executing program 2: 20:12:39 executing program 0: 20:12:39 executing program 5: openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) io_setup(0x8, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(0x0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 536.346564][ T32] audit: type=1804 audit(1595103159.465:202): pid=13208 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/108/bus" dev="sda1" ino=16356 res=1 20:12:39 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x0, 0x2}, @cond}) write$evdev(r0, &(0x7f0000000040), 0x373) 20:12:39 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e2") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:12:39 executing program 0: 20:12:39 executing program 2: 20:12:40 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x0, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:12:40 executing program 5: openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) io_setup(0x8, &(0x7f0000000600)=0x0) r1 = syz_open_procfs(0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 20:12:40 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x0, 0x2}, @cond}) write$evdev(r0, &(0x7f0000000040), 0x373) 20:12:40 executing program 2: 20:12:40 executing program 0: 20:12:40 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e2") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:12:40 executing program 0: 20:12:40 executing program 2: [ 537.853479][ T32] audit: type=1804 audit(1595103160.975:203): pid=13235 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/109/bus" dev="sda1" ino=16366 res=1 20:12:41 executing program 5: openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) io_setup(0x8, &(0x7f0000000600)=0x0) r1 = syz_open_procfs(0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 20:12:41 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x42}, @cond}) write$evdev(r0, &(0x7f0000000040), 0x373) [ 538.037474][ T32] audit: type=1804 audit(1595103161.015:204): pid=13235 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/109/bus" dev="sda1" ino=16366 res=1 20:12:41 executing program 0: 20:12:41 executing program 2: 20:12:42 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x0, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:12:42 executing program 0: 20:12:42 executing program 5: openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) io_setup(0x8, &(0x7f0000000600)=0x0) r1 = syz_open_procfs(0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 20:12:42 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e2") ptrace$getregset(0x4205, r1, 0x2, &(0x7f0000000180)={0x0}) 20:12:42 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x42}, @cond}) write$evdev(r0, &(0x7f0000000040), 0x373) 20:12:42 executing program 2: 20:12:42 executing program 0: [ 539.307624][ T32] audit: type=1804 audit(1595103162.436:205): pid=13261 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/110/bus" dev="sda1" ino=16357 res=1 20:12:42 executing program 2: 20:12:42 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x42}, @cond}) write$evdev(r0, &(0x7f0000000040), 0x373) 20:12:42 executing program 5: openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) io_setup(0x8, &(0x7f0000000600)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(0x0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 539.482981][ T32] audit: type=1804 audit(1595103162.476:206): pid=13261 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/110/bus" dev="sda1" ino=16357 res=1 20:12:42 executing program 0: 20:12:43 executing program 2: 20:12:43 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:12:43 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, 0x0, 0x2, &(0x7f0000000180)={0x0}) 20:12:43 executing program 3: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x42, 0x2}, @cond}) write$evdev(0xffffffffffffffff, &(0x7f0000000040), 0x373) 20:12:43 executing program 5: openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) io_setup(0x8, &(0x7f0000000600)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(0x0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 20:12:43 executing program 2: 20:12:43 executing program 0: [ 540.820294][ T32] audit: type=1804 audit(1595103163.947:207): pid=13284 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/111/bus" dev="sda1" ino=16356 res=1 [ 540.845738][ T32] audit: type=1804 audit(1595103163.957:208): pid=13284 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/111/bus" dev="sda1" ino=16356 res=1 20:12:44 executing program 0: 20:12:44 executing program 2: 20:12:44 executing program 3: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x42, 0x2}, @cond}) write$evdev(0xffffffffffffffff, &(0x7f0000000040), 0x373) 20:12:44 executing program 5: openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) io_setup(0x8, &(0x7f0000000600)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(0x0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 20:12:44 executing program 0: 20:12:44 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, 0x0, 0x2, &(0x7f0000000180)={0x0}) 20:12:45 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:12:45 executing program 2: 20:12:45 executing program 3: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x42, 0x2}, @cond}) write$evdev(0xffffffffffffffff, &(0x7f0000000040), 0x373) 20:12:45 executing program 5: openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) io_setup(0x8, &(0x7f0000000600)=0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(r0, 0x0, 0x0) 20:12:45 executing program 0: 20:12:45 executing program 0: 20:12:45 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, 0x0, 0x2, &(0x7f0000000180)={0x0}) [ 542.746698][ T32] audit: type=1804 audit(1595103165.867:209): pid=13307 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/112/bus" dev="sda1" ino=16372 res=1 20:12:45 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa08060001080006040001000000000000ac1414bbb09884e5f808ac1414bb"], 0x0) 20:12:45 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x42, 0x2}, @cond}) write$evdev(r0, 0x0, 0x0) 20:12:46 executing program 5: openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) io_setup(0x8, &(0x7f0000000600)=0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(r0, 0x0, 0x0) [ 542.928172][ T32] audit: type=1804 audit(1595103165.927:210): pid=13307 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/112/bus" dev="sda1" ino=16372 res=1 20:12:47 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) [ 544.228335][ T32] audit: type=1804 audit(1595103167.358:211): pid=13320 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/113/bus" dev="sda1" ino=15954 res=1 20:12:47 executing program 0: pipe(0x0) socket$netlink(0x10, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000240)={0x0, 0x80000000}) [ 544.420438][ T32] audit: type=1804 audit(1595103167.408:212): pid=13320 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/113/bus" dev="sda1" ino=15954 res=1 20:12:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f00000036c0)=[{{0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000000540)="1bef6b0c4c954879fdd022b87c3d77718d6f3e0242df22a7b8d936e887", 0x1d}, {&(0x7f0000000140)="9b83ef", 0x3}], 0x2}}], 0x2, 0x0) 20:12:47 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x42, 0x2}, @cond}) write$evdev(r0, 0x0, 0x0) 20:12:47 executing program 5: openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) io_setup(0x8, &(0x7f0000000600)=0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(r0, 0x0, 0x0) 20:12:48 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x0, &(0x7f0000000180)={0x0}) 20:12:48 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000003c0)={0x18, 0x0, {0x2, @local, 'gretap0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) 20:12:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet(0x2, 0x3, 0x14) setsockopt$inet_msfilter(r1, 0x0, 0x8, &(0x7f0000000380)=ANY=[@ANYBLOB="c3"], 0x1) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=@newtfilter={0x24, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x24}}, 0x0) 20:12:48 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x42, 0x2}, @cond}) write$evdev(r0, 0x0, 0x0) 20:12:48 executing program 5: openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) io_setup(0x8, &(0x7f0000000600)=0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(r0, 0x0, &(0x7f0000000a00)) 20:12:48 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x42}, 0xbad3, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xe}, 0x0) 20:12:48 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000000)="0201540000000a000000ff45ac00000000000590663d280000000000000680ffffffbf000000e100e2ff877700720030070085ffffff00000000008000da55aa", 0x40, 0x1c0}]) 20:12:49 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:12:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r3, 0x40000000af01, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r3, 0x4008af00, &(0x7f0000000100)=0x300000000) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000280)=ANY=[]) r5 = dup(r4) ioctl$VHOST_NET_SET_BACKEND(r3, 0x4008af30, &(0x7f0000000000)={0x0, r5}) [ 545.913973][T13355] loop2: p1[DM] p2 < > p3 p4 < p5 > [ 545.919655][T13355] loop2: partition table partially beyond EOD, truncated [ 545.927684][T13355] loop2: p1 start 10 is beyond EOD, truncated [ 545.934792][T13355] loop2: p2 start 40 is beyond EOD, truncated [ 545.940948][T13355] loop2: p3 start 4293001441 is beyond EOD, truncated [ 545.947933][T13355] loop2: p4 size 2 extends beyond EOD, truncated 20:12:49 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) close(r2) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="000080003420ef72ee54853e605d1ee2792bedf138a517a914edffffffffffffffffa3587c9d3d4f18ffe62a2dec01e7d2aff47d1bc41b"], 0x3e) close(r3) clock_gettime(0x5, &(0x7f00000001c0)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = dup(0xffffffffffffffff) sendmmsg$alg(r4, 0x0, 0x0, 0x0) write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) write$FUSE_GETXATTR(r2, &(0x7f00000000c0)={0x18, 0x0, 0x8, {0x1}}, 0x18) ptrace$setopts(0x4206, r1, 0x0, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000180)=0x2, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) 20:12:49 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x0, &(0x7f0000000180)={0x0}) 20:12:49 executing program 5: openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) io_setup(0x8, &(0x7f0000000600)=0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(r0, 0x0, &(0x7f0000000a00)) [ 546.189685][ T32] audit: type=1804 audit(1595103169.319:213): pid=13363 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/114/bus" dev="sda1" ino=15858 res=1 [ 546.268763][T13355] loop2: p5 start 10 is beyond EOD, truncated [ 546.557023][T13370] ptrace attach of "/root/syz-executor.0"[13368] was attempted by "/root/syz-executor.0"[13370] 20:12:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 20:12:49 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 546.767488][T13375] ptrace attach of "/root/syz-executor.0"[13368] was attempted by "/root/syz-executor.0"[13375] 20:12:49 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000180)=0x8, 0xfffffffffffffec7) socket(0x0, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x20008840}, 0x8001) socket$nl_netfilter(0x10, 0x3, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') openat(r2, &(0x7f0000000140)='./file0/file0\x00', 0xaaf02, 0x0) ioctl$TIOCSRS485(r2, 0x542f, &(0x7f0000000100)={0x400, 0x9, 0x1f}) exit_group(0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x14c) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x7) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x2b, 'pids'}]}, 0x6) 20:12:50 executing program 5: openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) io_setup(0x8, &(0x7f0000000600)=0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(r0, 0x0, &(0x7f0000000a00)) 20:12:50 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) clone(0x208500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3, 0x4c00000000006800}, &(0x7f0000001fee)='R\x10\x9cist\xe3cusgrVid:De', 0x0) 20:12:50 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:12:50 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x0, &(0x7f0000000180)={0x0}) 20:12:51 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:12:51 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000004e2f98b579a782d257146d0e0206e73ba8f4952bedc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)) 20:12:51 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="25bca274769e620a2734fa0095e0612687ecb86a548802a902000000000000004e2f98b579a782d257146d0e0206e73ba8f4952bedc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@commit={'commit', 0x3d, 0x2000000}}]}) 20:12:51 executing program 5: openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) io_setup(0x8, &(0x7f0000000600)=0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(r0, 0x1, &(0x7f0000000a00)=[0x0]) 20:12:51 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 548.095599][T13424] EXT4-fs (loop3): Invalid commit interval 33554432, must be smaller than 21474836 [ 548.128406][T13426] EXT4-fs (loop0): bad block size 8192 [ 548.349337][ T32] audit: type=1804 audit(1595103171.479:214): pid=13440 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/115/bus" dev="sda1" ino=16382 res=1 20:12:51 executing program 3: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) rt_sigaction(0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f00000002c0)) 20:12:51 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:12:51 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) 20:12:51 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, 0x0) 20:12:51 executing program 5: openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) io_setup(0x8, &(0x7f0000000600)=0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(r0, 0x1, &(0x7f0000000a00)=[0x0]) 20:12:52 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:12:52 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f00000012c0)=[{&(0x7f0000000180)=""/183, 0xb7}], 0x1, 0x1) 20:12:53 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:12:53 executing program 5: openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) io_setup(0x8, &(0x7f0000000600)=0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(r0, 0x1, &(0x7f0000000a00)=[0x0]) 20:12:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x3}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 20:12:53 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, 0x0) [ 550.206323][T13480] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 20:12:53 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 550.335687][ T32] audit: type=1804 audit(1595103173.460:215): pid=13483 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/116/bus" dev="sda1" ino=16368 res=1 20:12:53 executing program 5: openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) io_setup(0x8, &(0x7f0000000600)=0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(r0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 20:12:54 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000040)="626417beebafafc12836f0dd3fc25a01a9ddcf07e30f72536a67e4ca25f3743c490a9cb8d61e94590e8af865c9d1e86438a638119ac748e213") ptrace$getregset(0x4205, r1, 0x2, 0x0) 20:12:54 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) 20:12:54 executing program 5: openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) io_setup(0x8, &(0x7f0000000600)=0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(r0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 20:12:54 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:12:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x3}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 20:12:55 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x10, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:12:55 executing program 4: perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='net/nf_conntrack\x00') preadv(r0, &(0x7f0000000500), 0x37d, 0x0) 20:12:55 executing program 5: openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) io_setup(0x8, &(0x7f0000000600)=0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(r0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) [ 552.238355][ T32] audit: type=1804 audit(1595103175.361:216): pid=13514 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/117/bus" dev="sda1" ino=16374 res=1 [ 552.371099][ T32] audit: type=1804 audit(1595103175.391:217): pid=13514 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/117/bus" dev="sda1" ino=16374 res=1 20:12:55 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:12:56 executing program 5: openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) io_setup(0x8, &(0x7f0000000600)=0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(r0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) 20:12:56 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8910, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) 20:12:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000440)={0x2, {{0x2, 0x0, @multicast2}}}, 0x8c) 20:12:57 executing program 5: openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) io_setup(0x8, &(0x7f0000000600)=0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(r0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) 20:12:57 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) 20:12:57 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x10, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) [ 554.134415][ T32] audit: type=1804 audit(1595103177.261:218): pid=13540 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/118/bus" dev="sda1" ino=16374 res=1 [ 554.159632][ T32] audit: type=1804 audit(1595103177.281:219): pid=13540 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/118/bus" dev="sda1" ino=16374 res=1 20:12:57 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_LIST(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = eventfd(0x0) r5 = dup3(r3, r1, 0x0) ioctl$KVM_IRQFD(r5, 0x4020ae76, &(0x7f0000000100)={r4, 0x0, 0x2, r5, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}) 20:12:57 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:12:57 executing program 5: openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) io_setup(0x8, &(0x7f0000000600)=0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(r0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) 20:12:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket(0x11, 0x800000003, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) sendmsg$DEVLINK_CMD_TRAP_SET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="a0010000", @ANYRES16, @ANYBLOB="080328bd7000fddbdf253e000000080001007063690011000200303030303a30303a31302e30000000001c008200736f757263655f6d61635f69735f6d756c7469636173740005008300000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000001c008200060000000000000061635f69735f6d756c7469636173740005008300010000000e0001006e657464657673696d0000000f0002006e657464657673696d3000001c008200736f757263"], 0x1a0}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x84) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r5, 0xae80, 0x0) r6 = dup3(r0, r1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r5, 0x4400ae8f, &(0x7f00000000c0)={0x0, 0x0, [0x4c000000, 0x0, 0x3, 0x8, 0xfdfdffff]}) dup2(r6, r5) 20:12:58 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid_for_children\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7132}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x9, 0xfffff034}, {0x6, 0x0, 0x0, 0x9ada}]}) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) [ 555.213165][T13570] kvm: vcpu 132: requested lapic timer restore with starting count register 0x390=4241646265 (4241646265 ns) > initial count (296265111 ns). Using initial count to start timer. 20:12:58 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) 20:12:58 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r2, r1, 0x2}, 0x10) socket$kcm(0xa, 0x2, 0x11) 20:12:59 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:12:59 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x17, &(0x7f0000000040)=r1, 0x52d) socket$kcm(0x2b, 0x1, 0x0) 20:12:59 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x28402) write$vhci(r0, &(0x7f00000001c0)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_qos_setup_complete={{0xd, 0x14}}}, 0x17) 20:12:59 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x10, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) [ 556.431080][ T32] audit: type=1804 audit(1595103179.562:220): pid=13622 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/119/bus" dev="sda1" ino=16384 res=1 [ 556.456467][ T32] audit: type=1804 audit(1595103179.562:221): pid=13622 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/119/bus" dev="sda1" ino=16384 res=1 20:12:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002ec0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/203, 0xcb}}], 0x1, 0x0, 0x0) socket(0x1, 0x803, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/4\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x1a2, 0x0) 20:13:00 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:00 executing program 5: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0xd, &(0x7f0000000100)=0x0) r2 = creat(&(0x7f0000000380)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) write$binfmt_elf64(r2, &(0x7f0000000140)=ANY=[], 0xfd14) fallocate(r2, 0x100000003, 0x0, 0x28120001) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x21, 0x0, 0x0, r0, 0x0}]) 20:13:00 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) pwritev(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)="8d57ec69b731336d9882498fea0c29850eaff25b88f1c9ec5e797da56cccad89735ef0d5eddb9269c88b2caa3f936c2eae27b17fd2f6a6ec5e12e5558673893f2866fff45c4cdfef85f0ecaed01057ab9f5f946e3be262995c39244273937550d8730f4c5caa422ead8bebda8548682ea79a3b4a4568c199443082f54a54e05150bd97fbeeed936f6d017d64a2821383262b07", 0x93}, {&(0x7f0000000400)="3db6189eda170a92fab0b0952f922b1e28a16dd7b5a0a26cb99e736cd175568be4558cf1a6c08999372517978a6640c72ea6dc58986d9e59e8a9baa2f367fa3525209deec9ba1fb31b90f23e5b5e11368d2315d7d38a257b546afc7a337c4323fd54a2f27ba86dcdc9a8243157bac7481060e98b9ae73519927dc3561acea6da3282a29b", 0x84}, {&(0x7f00000004c0)="2c8caa02362082d40cea43ad87bdfeae1544438466727d60d19631fea372fc6d5d1b66a82d1801b751406cf8e71f87d4c542429b3bcdef870b6c5d239771263bdcfd1d817b6c0ecdec2e95dc8772a636b2330596b7d29be878915317662a585cf1c789c32976d111114128e558a51fea8ab676fd4ade125a21782cb72b95f038e262b73be6dc702c06428da9ee2fba1144ebb229e9a26f", 0x97}, {&(0x7f0000000700)="9ad1c3b5ef2ef3a58672336927f4650f174708e1d00dc0eec56c79253d638306abab810d64edc9da7cb8619be3b0370c3b3ed59060311208be8a2d46439e672008ecfbdd49138c0ecc707e87faf21d61157b", 0x52}], 0x4, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 20:13:00 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) write$tun(r0, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) 20:13:01 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000080)=""/4, 0x4) [ 557.808970][T13636] Dev loop0: unable to read RDB block 1 [ 557.814892][T13636] loop0: unable to read partition table [ 557.821395][T13636] loop0: partition table beyond EOD, truncated [ 557.827749][T13636] loop_reread_partitions: partition scan of loop0 (JpfQT)[qZ;(q-M) failed (rc=-5) 20:13:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:01 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) [ 558.217618][T13644] Dev loop0: unable to read RDB block 1 [ 558.223815][T13644] loop0: unable to read partition table [ 558.230003][T13644] loop0: partition table beyond EOD, truncated [ 558.236521][T13644] loop_reread_partitions: partition scan of loop0 (JpfQT)[qZ;(q-M) failed (rc=-5) 20:13:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000014c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000500)=@newtfilter={0x44, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0xc}}, [@filter_kind_options=@f_rsvp={{0x9, 0x1, 'rsvp\x00'}, {0x14, 0x2, [@TCA_RSVP_DST={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, @TCA_RSVP_CLASSID={0x8}]}}]}, 0x44}}, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000200), 0x4924924924926d3, 0x0) [ 558.654105][ T32] audit: type=1804 audit(1595103181.783:222): pid=13660 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/120/bus" dev="sda1" ino=16374 res=1 [ 558.809370][T13662] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 558.865889][T13667] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 20:13:09 executing program 3: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)}], 0x1}, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000cacbf0b9c4b88449c3a926042512e17e46f7071a463143fb42c20e017feec42107f2e6ddbe1150296c6a6db4afa7c81b2636b1c5fbe24ec88317"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f5, &(0x7f0000000080)) 20:13:09 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x44182) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, r1, 0xfffffffffffffffd, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fchown(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000080)) setresgid(0x0, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r3 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) pwritev(r3, &(0x7f00000005c0)=[{&(0x7f0000000340)="8d57ec69b731336d9882498fea0c29850eaff25b88f1c9ec5e797da56cccad89735ef0d5eddb9269c88b2caa3f936c2eae27b17fd2f6a6ec5e12e5558673893f2866fff45c4cdfef85f0ecaed01057ab9f5f946e3be262995c39244273937550d8730f4c5caa422ead8bebda8548682ea79a3b4a4568c199443082f54a54e05150bd97fbeeed936f6d017d64a2821383262b07", 0x93}, {&(0x7f0000000400)="3db6189eda170a92fab0b0952f922b1e28a16dd7b5a0a26cb99e736cd175568be4558cf1a6c08999372517978a6640c72ea6dc58986d9e59e8a9baa2f367fa3525209deec9ba1fb31b90f23e5b5e11368d2315d7d38a257b546afc7a337c4323fd54a2f27ba86dcdc9a8243157bac7481060e98b9ae73519927dc3561acea6da3282a29b", 0x84}, {0x0}, {&(0x7f00000004c0)="2c8caa02362082d40cea43ad87bdfeae1544438466727d60d19631fea372fc6d5d1b66a82d1801b751406cf8e71f87d4c542429b3bcdef870b6c5d239771263bdcfd1d817b6c0ecdec2e95dc8772a636b2330596b7d29be878915317662a585cf1c789c32976d111114128e558a51fea8ab676fd4ade125a21782cb72b95f038e262b73be6dc702c06428da9ee2fba1144ebb229e9a26f", 0x97}, {&(0x7f0000000700)="9ad1c3b5ef2ef3a58672336927f4650f174708e1d00dc0eec56c79253d638306abab810d64edc9da7cb8619be3b0370c3b3ed59060311208be8a2d46439e672008ecfbdd49138c0ecc707e87faf21d61157b", 0x52}, {&(0x7f00000001c0)}], 0x6, 0x0) close(0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 20:13:09 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) write$tun(r0, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) 20:13:09 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(0xffffffffffffffff, &(0x7f0000000580), 0xefee) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:10 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:13:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x703, 0xe, 0x4d2f, &(0x7f0000000080)="1c04ff01de6da9725f90c5a06d0f9f2400844d0044a98db225a47ecb10b429441dec77009050d9560e58f2e162226d4fe467a890b6c4c556c6894acf3d4cd49c4dd5a2d05d6ce642e3abc0e0cb0a7de568fb3f30013c74eb73383ebaf4257042ec5277fa18a9b201882996c7b8de5080c75756094ac8e258ff1673c27fb2f2bffc290edbc5dec9e44b6fab8d5fcbd12ae8339b04701b316bd5eccc3961ce80", 0x0, 0xf0, 0x0, 0x0, 0xfffffffffffffe19}, 0x28) [ 567.032507][ T32] audit: type=1804 audit(1595103190.165:223): pid=13689 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/121/bus" dev="sda1" ino=16349 res=1 [ 567.113952][T13694] fuse: Bad value for 'fd' [ 567.231125][ C0] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 567.242242][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 567.252907][ C0] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 567.264044][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 567.274470][ C0] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 567.288960][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 567.304545][ C0] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 567.315658][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 567.326680][ C0] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 567.337724][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 567.346723][T13693] ldm_validate_partition_table(): Disk read failed. [ 567.372078][ C0] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 567.383142][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 567.395050][ C0] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 567.406091][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 567.422913][ C0] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 567.433991][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 567.455712][ C0] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 567.466775][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 567.475069][T13693] Dev loop0: unable to read RDB block 0 20:13:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(0xffffffffffffffff, &(0x7f0000000580), 0xefee) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 567.517354][ C0] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 567.528425][ C0] Buffer I/O error on dev loop0, logical block 0, async page read 20:13:10 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) write$tun(r0, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) 20:13:10 executing program 4: [ 567.720216][T13693] loop0: unable to read partition table [ 567.728800][T13693] loop0: partition table beyond EOD, truncated [ 567.735519][T13693] loop_reread_partitions: partition scan of loop0 (JpfQT)[qZ;(q-M) failed (rc=-5) [ 567.898330][T13708] ldm_validate_partition_table(): Disk read failed. [ 567.931977][T13708] Dev loop0: unable to read RDB block 0 [ 567.933434][T13711] fuse: Bad value for 'fd' [ 567.999713][T13708] loop0: unable to read partition table [ 568.005814][T13708] loop0: partition table beyond EOD, truncated [ 568.012057][T13708] loop_reread_partitions: partition scan of loop0 (JpfQT)[qZ;(q-M) failed (rc=-5) 20:13:11 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) 20:13:11 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(0xffffffffffffffff, &(0x7f0000000580), 0xefee) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:11 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x101, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:11 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x44182) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, r1, 0xfffffffffffffffd, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fchown(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000080)) setresgid(0x0, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r3 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) pwritev(r3, &(0x7f00000005c0)=[{&(0x7f0000000340)="8d57ec69b731336d9882498fea0c29850eaff25b88f1c9ec5e797da56cccad89735ef0d5eddb9269c88b2caa3f936c2eae27b17fd2f6a6ec5e12e5558673893f2866fff45c4cdfef85f0ecaed01057ab9f5f946e3be262995c39244273937550d8730f4c5caa422ead8bebda8548682ea79a3b4a4568c199443082f54a54e05150bd97fbeeed936f6d017d64a2821383262b07", 0x93}, {&(0x7f0000000400)="3db6189eda170a92fab0b0952f922b1e28a16dd7b5a0a26cb99e736cd175568be4558cf1a6c08999372517978a6640c72ea6dc58986d9e59e8a9baa2f367fa3525209deec9ba1fb31b90f23e5b5e11368d2315d7d38a257b546afc7a337c4323fd54a2f27ba86dcdc9a8243157bac7481060e98b9ae73519927dc3561acea6da3282a29b", 0x84}, {0x0}, {&(0x7f00000004c0)="2c8caa02362082d40cea43ad87bdfeae1544438466727d60d19631fea372fc6d5d1b66a82d1801b751406cf8e71f87d4c542429b3bcdef870b6c5d239771263bdcfd1d817b6c0ecdec2e95dc8772a636b2330596b7d29be878915317662a585cf1c789c32976d111114128e558a51fea8ab676fd4ade125a21782cb72b95f038e262b73be6dc702c06428da9ee2fba1144ebb229e9a26f", 0x97}, {&(0x7f0000000700)="9ad1c3b5ef2ef3a58672336927f4650f174708e1d00dc0eec56c79253d638306abab810d64edc9da7cb8619be3b0370c3b3ed59060311208be8a2d46439e672008ecfbdd49138c0ecc707e87faf21d61157b", 0x52}, {&(0x7f00000001c0)}], 0x6, 0x0) close(0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 20:13:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) [ 568.783187][T13737] fuse: Bad value for 'fd' 20:13:12 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) [ 568.931048][T13742] ldm_validate_partition_table(): Disk read failed. [ 568.967283][T13742] Dev loop0: unable to read RDB block 0 [ 568.982880][T13742] loop0: unable to read partition table [ 568.989561][T13742] loop0: partition table beyond EOD, truncated [ 568.996155][T13742] loop_reread_partitions: partition scan of loop0 (JpfQT)[qZ;(q-M) failed (rc=-5) 20:13:12 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:12 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:13:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:12 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) 20:13:12 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x44182) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, r1, 0xfffffffffffffffd, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fchown(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000080)) setresgid(0x0, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r3 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) pwritev(r3, &(0x7f00000005c0)=[{&(0x7f0000000340)="8d57ec69b731336d9882498fea0c29850eaff25b88f1c9ec5e797da56cccad89735ef0d5eddb9269c88b2caa3f936c2eae27b17fd2f6a6ec5e12e5558673893f2866fff45c4cdfef85f0ecaed01057ab9f5f946e3be262995c39244273937550d8730f4c5caa422ead8bebda8548682ea79a3b4a4568c199443082f54a54e05150bd97fbeeed936f6d017d64a2821383262b07", 0x93}, {&(0x7f0000000400)="3db6189eda170a92fab0b0952f922b1e28a16dd7b5a0a26cb99e736cd175568be4558cf1a6c08999372517978a6640c72ea6dc58986d9e59e8a9baa2f367fa3525209deec9ba1fb31b90f23e5b5e11368d2315d7d38a257b546afc7a337c4323fd54a2f27ba86dcdc9a8243157bac7481060e98b9ae73519927dc3561acea6da3282a29b", 0x84}, {0x0}, {&(0x7f00000004c0)="2c8caa02362082d40cea43ad87bdfeae1544438466727d60d19631fea372fc6d5d1b66a82d1801b751406cf8e71f87d4c542429b3bcdef870b6c5d239771263bdcfd1d817b6c0ecdec2e95dc8772a636b2330596b7d29be878915317662a585cf1c789c32976d111114128e558a51fea8ab676fd4ade125a21782cb72b95f038e262b73be6dc702c06428da9ee2fba1144ebb229e9a26f", 0x97}, {&(0x7f0000000700)="9ad1c3b5ef2ef3a58672336927f4650f174708e1d00dc0eec56c79253d638306abab810d64edc9da7cb8619be3b0370c3b3ed59060311208be8a2d46439e672008ecfbdd49138c0ecc707e87faf21d61157b", 0x52}, {&(0x7f00000001c0)}], 0x6, 0x0) close(0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 20:13:12 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 569.658998][ T32] audit: type=1804 audit(1595103192.796:224): pid=13767 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/122/bus" dev="sda1" ino=16338 res=1 20:13:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) [ 569.713295][T13766] ldm_validate_partition_table(): Disk read failed. [ 569.811116][T13766] Dev loop0: unable to read RDB block 0 [ 569.877139][T13766] loop0: unable to read partition table [ 569.883241][T13766] loop0: partition table beyond EOD, truncated [ 569.890716][T13766] loop_reread_partitions: partition scan of loop0 (JpfQT)[qZ;(q-M) failed (rc=-5) 20:13:13 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) 20:13:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000200)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:13:14 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:14 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x44182) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, r1, 0xfffffffffffffffd, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fchown(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000080)) setresgid(0x0, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r3 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) pwritev(r3, &(0x7f00000005c0)=[{&(0x7f0000000340)="8d57ec69b731336d9882498fea0c29850eaff25b88f1c9ec5e797da56cccad89735ef0d5eddb9269c88b2caa3f936c2eae27b17fd2f6a6ec5e12e5558673893f2866fff45c4cdfef85f0ecaed01057ab9f5f946e3be262995c39244273937550d8730f4c5caa422ead8bebda8548682ea79a3b4a4568c199443082f54a54e05150bd97fbeeed936f6d017d64a2821383262b07", 0x93}, {&(0x7f0000000400)="3db6189eda170a92fab0b0952f922b1e28a16dd7b5a0a26cb99e736cd175568be4558cf1a6c08999372517978a6640c72ea6dc58986d9e59e8a9baa2f367fa3525209deec9ba1fb31b90f23e5b5e11368d2315d7d38a257b546afc7a337c4323fd54a2f27ba86dcdc9a8243157bac7481060e98b9ae73519927dc3561acea6da3282a29b", 0x84}, {0x0}, {&(0x7f00000004c0)="2c8caa02362082d40cea43ad87bdfeae1544438466727d60d19631fea372fc6d5d1b66a82d1801b751406cf8e71f87d4c542429b3bcdef870b6c5d239771263bdcfd1d817b6c0ecdec2e95dc8772a636b2330596b7d29be878915317662a585cf1c789c32976d111114128e558a51fea8ab676fd4ade125a21782cb72b95f038e262b73be6dc702c06428da9ee2fba1144ebb229e9a26f", 0x97}, {&(0x7f0000000700)="9ad1c3b5ef2ef3a58672336927f4650f174708e1d00dc0eec56c79253d638306abab810d64edc9da7cb8619be3b0370c3b3ed59060311208be8a2d46439e672008ecfbdd49138c0ecc707e87faf21d61157b", 0x52}, {&(0x7f00000001c0)}], 0x6, 0x0) close(0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 20:13:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:14 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) 20:13:14 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) [ 571.913114][ T32] audit: type=1804 audit(1595103195.047:225): pid=13800 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/123/bus" dev="sda1" ino=16357 res=1 [ 571.964637][T13798] ldm_validate_partition_table(): Disk read failed. [ 571.991357][T13798] Dev loop0: unable to read RDB block 0 [ 572.022181][T13798] loop0: unable to read partition table [ 572.028382][T13798] loop0: partition table beyond EOD, truncated [ 572.035270][T13798] loop_reread_partitions: partition scan of loop0 (JpfQT)[qZ;(q-M) failed (rc=-5) 20:13:15 executing program 2: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r2) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) [ 572.281984][ T32] audit: type=1804 audit(1595103195.117:226): pid=13800 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/123/bus" dev="sda1" ino=16357 res=1 [ 572.325966][T13810] pit: kvm: requested 108952 ns i8254 timer period limited to 200000 ns 20:13:15 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x44182) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, r1, 0xfffffffffffffffd, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fchown(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000080)) setresgid(0x0, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r3 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) pwritev(r3, &(0x7f00000005c0)=[{&(0x7f0000000340)="8d57ec69b731336d9882498fea0c29850eaff25b88f1c9ec5e797da56cccad89735ef0d5eddb9269c88b2caa3f936c2eae27b17fd2f6a6ec5e12e5558673893f2866fff45c4cdfef85f0ecaed01057ab9f5f946e3be262995c39244273937550d8730f4c5caa422ead8bebda8548682ea79a3b4a4568c199443082f54a54e05150bd97fbeeed936f6d017d64a2821383262b07", 0x93}, {&(0x7f0000000400)="3db6189eda170a92fab0b0952f922b1e28a16dd7b5a0a26cb99e736cd175568be4558cf1a6c08999372517978a6640c72ea6dc58986d9e59e8a9baa2f367fa3525209deec9ba1fb31b90f23e5b5e11368d2315d7d38a257b546afc7a337c4323fd54a2f27ba86dcdc9a8243157bac7481060e98b9ae73519927dc3561acea6da3282a29b", 0x84}, {0x0}, {&(0x7f00000004c0)="2c8caa02362082d40cea43ad87bdfeae1544438466727d60d19631fea372fc6d5d1b66a82d1801b751406cf8e71f87d4c542429b3bcdef870b6c5d239771263bdcfd1d817b6c0ecdec2e95dc8772a636b2330596b7d29be878915317662a585cf1c789c32976d111114128e558a51fea8ab676fd4ade125a21782cb72b95f038e262b73be6dc702c06428da9ee2fba1144ebb229e9a26f", 0x97}, {&(0x7f0000000700)="9ad1c3b5ef2ef3a58672336927f4650f174708e1d00dc0eec56c79253d638306abab810d64edc9da7cb8619be3b0370c3b3ed59060311208be8a2d46439e672008ecfbdd49138c0ecc707e87faf21d61157b", 0x52}, {&(0x7f00000001c0)}], 0x6, 0x0) close(0xffffffffffffffff) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 20:13:15 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) 20:13:15 executing program 2: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 572.878279][T13810] pit: kvm: requested 39390 ns i8254 timer period limited to 200000 ns 20:13:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r2) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:16 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r1, 0x0, 0x8, &(0x7f0000000040)=ANY=[@ANYBLOB="e3"], 0x1) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000200)={0x0, @local, @local}, &(0x7f0000000080)=0xc) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001080)=@newtfilter={0x24, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x24}}, 0x0) 20:13:16 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x44182) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, r1, 0xfffffffffffffffd, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fchown(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000080)) setresgid(0x0, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r3 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) pwritev(r3, &(0x7f00000005c0)=[{&(0x7f0000000340)="8d57ec69b731336d9882498fea0c29850eaff25b88f1c9ec5e797da56cccad89735ef0d5eddb9269c88b2caa3f936c2eae27b17fd2f6a6ec5e12e5558673893f2866fff45c4cdfef85f0ecaed01057ab9f5f946e3be262995c39244273937550d8730f4c5caa422ead8bebda8548682ea79a3b4a4568c199443082f54a54e05150bd97fbeeed936f6d017d64a2821383262b07", 0x93}, {&(0x7f0000000400)="3db6189eda170a92fab0b0952f922b1e28a16dd7b5a0a26cb99e736cd175568be4558cf1a6c08999372517978a6640c72ea6dc58986d9e59e8a9baa2f367fa3525209deec9ba1fb31b90f23e5b5e11368d2315d7d38a257b546afc7a337c4323fd54a2f27ba86dcdc9a8243157bac7481060e98b9ae73519927dc3561acea6da3282a29b", 0x84}, {0x0}, {&(0x7f00000004c0)="2c8caa02362082d40cea43ad87bdfeae1544438466727d60d19631fea372fc6d5d1b66a82d1801b751406cf8e71f87d4c542429b3bcdef870b6c5d239771263bdcfd1d817b6c0ecdec2e95dc8772a636b2330596b7d29be878915317662a585cf1c789c32976d111114128e558a51fea8ab676fd4ade125a21782cb72b95f038e262b73be6dc702c06428da9ee2fba1144ebb229e9a26f", 0x97}, {&(0x7f0000000700)="9ad1c3b5ef2ef3a58672336927f4650f174708e1d00dc0eec56c79253d638306abab810d64edc9da7cb8619be3b0370c3b3ed59060311208be8a2d46439e672008ecfbdd49138c0ecc707e87faf21d61157b", 0x52}, {&(0x7f00000001c0)}], 0x6, 0x0) close(0xffffffffffffffff) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 20:13:16 executing program 2: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:16 executing program 0: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) 20:13:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:17 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:13:17 executing program 3: syz_mount_image$msdos(&(0x7f0000000200)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 20:13:17 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x44182) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, r1, 0xfffffffffffffffd, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fchown(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000080)) setresgid(0x0, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r3 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) pwritev(r3, &(0x7f00000005c0)=[{&(0x7f0000000340)="8d57ec69b731336d9882498fea0c29850eaff25b88f1c9ec5e797da56cccad89735ef0d5eddb9269c88b2caa3f936c2eae27b17fd2f6a6ec5e12e5558673893f2866fff45c4cdfef85f0ecaed01057ab9f5f946e3be262995c39244273937550d8730f4c5caa422ead8bebda8548682ea79a3b4a4568c199443082f54a54e05150bd97fbeeed936f6d017d64a2821383262b07", 0x93}, {&(0x7f0000000400)="3db6189eda170a92fab0b0952f922b1e28a16dd7b5a0a26cb99e736cd175568be4558cf1a6c08999372517978a6640c72ea6dc58986d9e59e8a9baa2f367fa3525209deec9ba1fb31b90f23e5b5e11368d2315d7d38a257b546afc7a337c4323fd54a2f27ba86dcdc9a8243157bac7481060e98b9ae73519927dc3561acea6da3282a29b", 0x84}, {0x0}, {&(0x7f00000004c0)="2c8caa02362082d40cea43ad87bdfeae1544438466727d60d19631fea372fc6d5d1b66a82d1801b751406cf8e71f87d4c542429b3bcdef870b6c5d239771263bdcfd1d817b6c0ecdec2e95dc8772a636b2330596b7d29be878915317662a585cf1c789c32976d111114128e558a51fea8ab676fd4ade125a21782cb72b95f038e262b73be6dc702c06428da9ee2fba1144ebb229e9a26f", 0x97}, {&(0x7f0000000700)="9ad1c3b5ef2ef3a58672336927f4650f174708e1d00dc0eec56c79253d638306abab810d64edc9da7cb8619be3b0370c3b3ed59060311208be8a2d46439e672008ecfbdd49138c0ecc707e87faf21d61157b", 0x52}, {&(0x7f00000001c0)}], 0x6, 0x0) close(0xffffffffffffffff) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 20:13:17 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) [ 574.208693][T13858] FAT-fs (loop3): bogus number of reserved sectors [ 574.215552][T13858] FAT-fs (loop3): This doesn't look like a DOS 1.x volume; no bootstrapping code [ 574.224931][T13858] FAT-fs (loop3): Can't find a valid FAT filesystem [ 574.235240][T13860] fuse: Bad value for 'fd' 20:13:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) [ 574.397939][ T32] audit: type=1804 audit(1595103197.537:227): pid=13868 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/124/bus" dev="sda1" ino=15986 res=1 20:13:17 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:17 executing program 0: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) [ 574.535642][T13858] FAT-fs (loop3): bogus number of reserved sectors [ 574.543645][T13858] FAT-fs (loop3): This doesn't look like a DOS 1.x volume; no bootstrapping code [ 574.552949][T13858] FAT-fs (loop3): Can't find a valid FAT filesystem [ 574.569401][ T32] audit: type=1804 audit(1595103197.567:228): pid=13868 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/124/bus" dev="sda1" ino=15986 res=1 20:13:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:17 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x44182) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, r1, 0xfffffffffffffffd, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fchown(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000080)) setresgid(0x0, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r3 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) pwritev(r3, &(0x7f00000005c0)=[{&(0x7f0000000340)="8d57ec69b731336d9882498fea0c29850eaff25b88f1c9ec5e797da56cccad89735ef0d5eddb9269c88b2caa3f936c2eae27b17fd2f6a6ec5e12e5558673893f2866fff45c4cdfef85f0ecaed01057ab9f5f946e3be262995c39244273937550d8730f4c5caa422ead8bebda8548682ea79a3b4a4568c199443082f54a54e05150bd97fbeeed936f6d017d64a2821383262b07", 0x93}, {&(0x7f0000000400)="3db6189eda170a92fab0b0952f922b1e28a16dd7b5a0a26cb99e736cd175568be4558cf1a6c08999372517978a6640c72ea6dc58986d9e59e8a9baa2f367fa3525209deec9ba1fb31b90f23e5b5e11368d2315d7d38a257b546afc7a337c4323fd54a2f27ba86dcdc9a8243157bac7481060e98b9ae73519927dc3561acea6da3282a29b", 0x84}, {0x0}, {&(0x7f00000004c0)="2c8caa02362082d40cea43ad87bdfeae1544438466727d60d19631fea372fc6d5d1b66a82d1801b751406cf8e71f87d4c542429b3bcdef870b6c5d239771263bdcfd1d817b6c0ecdec2e95dc8772a636b2330596b7d29be878915317662a585cf1c789c32976d111114128e558a51fea8ab676fd4ade125a21782cb72b95f038e262b73be6dc702c06428da9ee2fba1144ebb229e9a26f", 0x97}, {&(0x7f0000000700)="9ad1c3b5ef2ef3a58672336927f4650f174708e1d00dc0eec56c79253d638306abab810d64edc9da7cb8619be3b0370c3b3ed59060311208be8a2d46439e672008ecfbdd49138c0ecc707e87faf21d61157b", 0x52}, {&(0x7f00000001c0)}], 0x6, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 20:13:18 executing program 0: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) 20:13:18 executing program 3: [ 575.029427][T13879] fuse: Bad value for 'fd' [ 575.306250][ C0] print_req_error: 55 callbacks suppressed [ 575.306302][ C0] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 575.323490][ C0] buffer_io_error: 55 callbacks suppressed [ 575.323516][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 575.342939][ C0] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 575.353981][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 575.364203][ C0] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 575.375249][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 575.403981][ C0] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 575.415110][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 575.492306][ C0] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 575.503446][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 575.511851][T13885] ldm_validate_partition_table(): Disk read failed. [ 575.593378][ C0] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 575.604527][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 575.714956][ C0] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 575.726025][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 575.802489][ C0] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 575.813550][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 575.862140][ C0] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 575.873195][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 575.881440][T13885] Dev loop0: unable to read RDB block 0 [ 575.931451][ C0] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 575.942623][ C0] Buffer I/O error on dev loop0, logical block 0, async page read 20:13:19 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:13:19 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:19 executing program 3: 20:13:19 executing program 0: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) [ 576.015859][T13885] loop0: unable to read partition table [ 576.022076][T13885] loop0: partition table beyond EOD, truncated [ 576.028489][T13885] loop_reread_partitions: partition scan of loop0 (JpfQT)[qZ;(q-M) failed (rc=-5) [ 576.139656][T13896] fuse: Bad value for 'fd' 20:13:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:19 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:19 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x44182) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, r1, 0xfffffffffffffffd, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fchown(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000080)) setresgid(0x0, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r3 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) pwritev(r3, &(0x7f00000005c0)=[{&(0x7f0000000340)="8d57ec69b731336d9882498fea0c29850eaff25b88f1c9ec5e797da56cccad89735ef0d5eddb9269c88b2caa3f936c2eae27b17fd2f6a6ec5e12e5558673893f2866fff45c4cdfef85f0ecaed01057ab9f5f946e3be262995c39244273937550d8730f4c5caa422ead8bebda8548682ea79a3b4a4568c199443082f54a54e05150bd97fbeeed936f6d017d64a2821383262b07", 0x93}, {&(0x7f0000000400)="3db6189eda170a92fab0b0952f922b1e28a16dd7b5a0a26cb99e736cd175568be4558cf1a6c08999372517978a6640c72ea6dc58986d9e59e8a9baa2f367fa3525209deec9ba1fb31b90f23e5b5e11368d2315d7d38a257b546afc7a337c4323fd54a2f27ba86dcdc9a8243157bac7481060e98b9ae73519927dc3561acea6da3282a29b", 0x84}, {0x0}, {&(0x7f00000004c0)="2c8caa02362082d40cea43ad87bdfeae1544438466727d60d19631fea372fc6d5d1b66a82d1801b751406cf8e71f87d4c542429b3bcdef870b6c5d239771263bdcfd1d817b6c0ecdec2e95dc8772a636b2330596b7d29be878915317662a585cf1c789c32976d111114128e558a51fea8ab676fd4ade125a21782cb72b95f038e262b73be6dc702c06428da9ee2fba1144ebb229e9a26f", 0x97}, {&(0x7f0000000700)="9ad1c3b5ef2ef3a58672336927f4650f174708e1d00dc0eec56c79253d638306abab810d64edc9da7cb8619be3b0370c3b3ed59060311208be8a2d46439e672008ecfbdd49138c0ecc707e87faf21d61157b", 0x52}, {&(0x7f00000001c0)}], 0x6, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 20:13:19 executing program 3: [ 576.502301][ T32] audit: type=1804 audit(1595103199.638:229): pid=13906 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/125/bus" dev="sda1" ino=15784 res=1 [ 576.527260][ T32] audit: type=1804 audit(1595103199.658:230): pid=13906 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/125/bus" dev="sda1" ino=15784 res=1 20:13:20 executing program 0: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) [ 576.999622][T13913] ldm_validate_partition_table(): Disk read failed. 20:13:20 executing program 3: [ 577.110807][T13913] Dev loop0: unable to read RDB block 0 [ 577.144509][T13913] loop0: unable to read partition table [ 577.151460][T13913] loop0: partition table beyond EOD, truncated 20:13:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) [ 577.158213][T13913] loop_reread_partitions: partition scan of loop0 (JpfQT)[qZ;(q-M) failed (rc=-5) 20:13:20 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:13:20 executing program 0: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) 20:13:20 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:20 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x44182) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, r1, 0xfffffffffffffffd, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fchown(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000080)) setresgid(0x0, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r3 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 20:13:20 executing program 3: 20:13:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:21 executing program 3: 20:13:21 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 578.098814][ T32] audit: type=1804 audit(1595103201.238:231): pid=13944 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/126/bus" dev="sda1" ino=16211 res=1 [ 578.123945][ T32] audit: type=1804 audit(1595103201.248:232): pid=13944 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/126/bus" dev="sda1" ino=16211 res=1 20:13:21 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x44182) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, r1, 0xfffffffffffffffd, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fchown(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000080)) setresgid(0x0, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 20:13:21 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) 20:13:21 executing program 3: 20:13:22 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:13:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:22 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x44182) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, r1, 0xfffffffffffffffd, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fchown(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000080)) setresgid(0x0, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 20:13:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:22 executing program 3: 20:13:22 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) 20:13:22 executing program 3: 20:13:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:22 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x44182) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, r1, 0xfffffffffffffffd, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fchown(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000080)) setresgid(0x0, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) [ 579.756598][ T32] audit: type=1804 audit(1595103202.899:233): pid=13973 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/127/bus" dev="sda1" ino=16099 res=1 20:13:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 579.885964][ T32] audit: type=1804 audit(1595103202.939:234): pid=13973 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/127/bus" dev="sda1" ino=16099 res=1 20:13:23 executing program 3: 20:13:23 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$sock(r0, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:24 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:13:24 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:24 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x44182) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, r1, 0xfffffffffffffffd, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fchown(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000080)) setresgid(0x0, 0x0, 0x0) r3 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 20:13:24 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$sock(r0, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:24 executing program 3: 20:13:24 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) 20:13:24 executing program 3: [ 581.375917][ T32] audit: type=1804 audit(1595103204.519:235): pid=14002 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/128/bus" dev="sda1" ino=16367 res=1 20:13:24 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$sock(r0, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:24 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 581.617385][ T32] audit: type=1804 audit(1595103204.559:236): pid=14002 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/128/bus" dev="sda1" ino=16367 res=1 20:13:24 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x44182) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, r1, 0xfffffffffffffffd, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fchown(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000080)) r3 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 20:13:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:25 executing program 3: 20:13:25 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x44182) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, r1, 0xfffffffffffffffd, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fchown(0xffffffffffffffff, 0x0, 0x0) r3 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 20:13:25 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:25 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, 0x0, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:13:25 executing program 3: 20:13:25 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) 20:13:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:26 executing program 3: 20:13:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) [ 583.237923][ T32] audit: type=1804 audit(1595103206.380:237): pid=14041 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/129/bus" dev="sda1" ino=16383 res=1 20:13:26 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x44182) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, r1, 0xfffffffffffffffd, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 20:13:26 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) [ 583.379111][ T32] audit: type=1804 audit(1595103206.410:238): pid=14041 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/129/bus" dev="sda1" ino=16383 res=1 20:13:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=']) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:27 executing program 3: [ 584.074796][T14060] fuse: Bad value for 'group_id' 20:13:27 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, 0x0, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:13:27 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x44182) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, r1, 0xfffffffffffffffd, 0x0) r3 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 20:13:27 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) 20:13:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=']) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:27 executing program 3: [ 584.573980][T14067] fuse: Bad value for 'group_id' 20:13:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=']) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:28 executing program 3: [ 584.884638][ T32] audit: type=1804 audit(1595103208.020:239): pid=14080 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/130/bus" dev="sda1" ino=16383 res=1 [ 584.909630][ T32] audit: type=1804 audit(1595103208.030:240): pid=14080 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/130/bus" dev="sda1" ino=16383 res=1 20:13:28 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x44182) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) [ 585.065667][T14082] fuse: Bad value for 'group_id' 20:13:28 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) 20:13:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:29 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, 0x0, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:13:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:29 executing program 3: 20:13:29 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x44182) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 20:13:29 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) 20:13:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:29 executing program 3: [ 586.492742][ T32] audit: type=1804 audit(1595103209.630:241): pid=14116 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/131/bus" dev="sda1" ino=16347 res=1 [ 586.517950][ T32] audit: type=1804 audit(1595103209.640:242): pid=14116 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/131/bus" dev="sda1" ino=16347 res=1 20:13:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:29 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x44182) r1 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 20:13:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:29 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) 20:13:30 executing program 3: 20:13:31 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180), &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:13:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:31 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:31 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 20:13:31 executing program 3: 20:13:31 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) 20:13:31 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 20:13:31 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:31 executing program 3: [ 588.435999][ T32] audit: type=1804 audit(1595103211.571:243): pid=14149 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/132/bus" dev="sda1" ino=16352 res=1 [ 588.569321][ T32] audit: type=1804 audit(1595103211.611:244): pid=14148 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/132/bus" dev="sda1" ino=16352 res=1 20:13:31 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) 20:13:32 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 20:13:32 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180), &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:13:32 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:32 executing program 3: 20:13:32 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) 20:13:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x44182) r1 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 20:13:32 executing program 3: 20:13:33 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0x44182) r1 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 20:13:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440), 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:33 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 590.197006][ T32] audit: type=1804 audit(1595103213.331:245): pid=14185 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/133/bus" dev="sda1" ino=16353 res=1 20:13:33 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) 20:13:33 executing program 3: 20:13:34 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180), &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:13:34 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0x44182) r1 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 20:13:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440), 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:34 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:34 executing program 3: 20:13:34 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) [ 591.447192][T14210] fuse: Unknown parameter 'grou00000000000000000000' 20:13:34 executing program 3: 20:13:34 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0x44182) r1 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 20:13:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440), 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) [ 591.655734][ T32] audit: type=1804 audit(1595103214.791:246): pid=14216 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/134/bus" dev="sda1" ino=16352 res=1 20:13:34 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:34 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) [ 591.831748][ T32] audit: type=1804 audit(1595103214.861:247): pid=14216 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/134/bus" dev="sda1" ino=16352 res=1 20:13:35 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) [ 592.183929][T14231] fuse: Unknown parameter 'grou00000000000000000000' 20:13:35 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, 0x0, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:13:35 executing program 3: 20:13:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b", 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:35 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, 0x0) write$tun(r0, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) 20:13:35 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:35 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) [ 592.845786][T14243] fuse: Unknown parameter 'grou00000000000000000000' [ 593.043900][ T32] audit: type=1804 audit(1595103216.182:248): pid=14251 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/135/bus" dev="sda1" ino=16378 res=1 [ 593.069029][ T32] audit: type=1804 audit(1595103216.182:249): pid=14251 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/135/bus" dev="sda1" ino=16378 res=1 20:13:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b", 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:36 executing program 3: 20:13:36 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, 0x0) write$tun(r0, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) 20:13:36 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:36 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) [ 593.568504][T14261] fuse: Unknown parameter 'group_i00000000000000000000' 20:13:36 executing program 3: 20:13:37 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, 0x0, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:13:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b", 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:37 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 20:13:37 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:37 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, 0x0) write$tun(r0, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) 20:13:37 executing program 3: [ 594.384453][T14280] fuse: Unknown parameter 'group_i00000000000000000000' [ 594.535726][ T32] audit: type=1804 audit(1595103217.672:250): pid=14289 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/136/bus" dev="sda1" ino=16338 res=1 20:13:37 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 20:13:37 executing program 3: 20:13:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac", 0xc) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:37 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:37 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) [ 594.758431][ T32] audit: type=1804 audit(1595103217.712:251): pid=14289 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/136/bus" dev="sda1" ino=16338 res=1 [ 595.099585][T14297] fuse: Unknown parameter 'group_i00000000000000000000' 20:13:38 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 20:13:39 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, 0x0, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:13:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac", 0xc) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:39 executing program 3: 20:13:39 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:39 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) [ 596.548522][ T32] audit: type=1804 audit(1595103219.692:252): pid=14315 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/137/bus" dev="sda1" ino=16366 res=1 [ 596.591393][T14316] fuse: Unknown parameter 'group_id00000000000000000000' [ 596.678974][ T32] audit: type=1804 audit(1595103219.742:253): pid=14315 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/137/bus" dev="sda1" ino=16366 res=1 20:13:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac", 0xc) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:40 executing program 3: 20:13:40 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) [ 597.354451][T14332] fuse: Unknown parameter 'group_id00000000000000000000' 20:13:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca3", 0xe) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:40 executing program 3: 20:13:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 20:13:41 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:13:41 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:41 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x402c542c, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "00173d5e0800000082554be673507d00"}) 20:13:41 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 20:13:41 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x8, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) 20:13:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca3", 0xe) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) [ 598.407045][T14349] fuse: Unknown parameter 'group_id00000000000000000000' 20:13:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca3", 0xe) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:41 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 20:13:41 executing program 3: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0xffdbc2ca) lseek(r0, 0x0, 0x0) [ 598.636134][ T32] audit: type=1804 audit(1595103221.773:254): pid=14355 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/138/bus" dev="sda1" ino=16338 res=1 20:13:41 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 598.886164][ T32] audit: type=1804 audit(1595103221.813:255): pid=14355 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/138/bus" dev="sda1" ino=16338 res=1 [ 599.125626][T14367] fuse: Bad value for 'user_id' 20:13:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 20:13:42 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 599.759494][T14375] fuse: Bad value for 'user_id' 20:13:43 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:13:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c", 0xf) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:43 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, 0x0, 0x0) 20:13:43 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 20:13:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:43 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b6e61bd62a4f407d66fcc7c49f834885d8c03b1c3992098104619855cb7763a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) [ 600.270211][T14390] fuse: Bad value for 'user_id' 20:13:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c", 0xf) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) [ 600.440985][T14395] libceph: resolve 'nabo|I4' (ret=-3): failed [ 600.448529][T14395] libceph: Failed to parse monitor IPs: -3 20:13:43 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) [ 600.590523][ T32] audit: type=1804 audit(1595103223.733:256): pid=14402 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/139/bus" dev="sda1" ino=16367 res=1 20:13:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='statm\x00') r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x5, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000800000e93f00"}) r4 = syz_open_pts(r3, 0x4000000000000002) r5 = dup3(r4, r2, 0x0) ioctl$TCXONC(r5, 0x540a, 0x0) write$binfmt_script(r3, &(0x7f0000000280)=ANY=[], 0x17) write$P9_RATTACH(r2, &(0x7f00000001c0)={0x14}, 0xffffffde) fcntl$setstatus(r2, 0x4, 0x40800) ioctl$TCXONC(r5, 0x540a, 0x1) [ 600.767826][ T32] audit: type=1804 audit(1595103223.793:257): pid=14402 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/139/bus" dev="sda1" ino=16367 res=1 [ 600.941172][T14409] fuse: Bad value for 'fd' 20:13:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c", 0xf) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:44 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 601.446965][T14417] fuse: Bad value for 'fd' 20:13:45 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:13:45 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) 20:13:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r2, 0x8916, &(0x7f0000000000)) r3 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r2, 0x8936, &(0x7f0000000000)) setsockopt$inet6_group_source_req(r3, 0x29, 0x4c, 0x0, 0x4) 20:13:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:45 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, 0x0, 0x0) [ 602.141549][T14427] fuse: Bad value for 'fd' 20:13:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:45 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) [ 602.621563][ T32] audit: type=1804 audit(1595103225.764:258): pid=14443 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/140/bus" dev="sda1" ino=16366 res=1 20:13:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) [ 602.647707][ T32] audit: type=1804 audit(1595103225.764:259): pid=14443 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/140/bus" dev="sda1" ino=16366 res=1 20:13:45 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000600)='statm\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x5, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000800000e93f00"}) r4 = syz_open_pts(r1, 0x4000000000000002) r5 = dup3(r4, r0, 0x0) ioctl$TCXONC(r5, 0x540a, 0x0) write$binfmt_script(r1, &(0x7f0000000280)=ANY=[], 0x17) write$P9_RATTACH(r0, &(0x7f00000001c0)={0x14}, 0xffffffde) fcntl$setstatus(r0, 0x4, 0x40800) ioctl$TCXONC(r5, 0x540a, 0x1) [ 602.983473][T14447] fuse: Bad value for 'fd' 20:13:46 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) 20:13:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 603.673070][T14460] fuse: Bad value for 'fd' 20:13:47 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:13:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:47 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000600)='statm\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x5, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000800000e93f00"}) r4 = syz_open_pts(r1, 0x4000000000000002) r5 = dup3(r4, r0, 0x0) ioctl$TCXONC(r5, 0x540a, 0x0) write$binfmt_script(r1, &(0x7f0000000280)=ANY=[], 0x17) write$P9_RATTACH(r0, &(0x7f00000001c0)={0x14}, 0xffffffde) fcntl$setstatus(r0, 0x4, 0x40800) ioctl$TCXONC(r5, 0x540a, 0x1) 20:13:47 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, 0x0, 0x0) 20:13:47 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 20:13:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 604.044478][T14465] fuse: Bad value for 'fd' 20:13:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) [ 604.302377][ T32] audit: type=1804 audit(1595103227.444:260): pid=14481 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/141/bus" dev="sda1" ino=15891 res=1 [ 604.327652][ T32] audit: type=1804 audit(1595103227.444:261): pid=14481 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/141/bus" dev="sda1" ino=15891 res=1 20:13:47 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) [ 604.479240][T14483] fuse: Invalid rootmode 20:13:47 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)="57f6479eeb3cf4634839862d73396a51ad537ad09836f6f94a9c1c4f78139770c79e7c8b0871f06a29dde9014252f08038f4cdcd0a8c798ffbc31e3a0d91dbd33d8ef93d543eeabb4e074da94bc9d676a0e4a46eefc9e0740074ae4929431be42b", 0x61}, {&(0x7f0000000fc0)="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", 0xc00}, {&(0x7f0000000100)="9bc16c8edf977870b03482a476dbffacde5ede76c39cc55ccba002579f561e3bc98b6f007e6a69ec", 0x28}, {&(0x7f00000002c0)="912b5423ab5226457f7c6deab27d259ccf43690541759fc90245083294a7eb7993b9004e4745d56192cac91beee6cd730e8d87781d47f745b307fa97c8868f84fb508bfc391c932760ad8e75622fea8c8af9660739784af55e18af5a84514213f6934dd326a38c618861c9397a63fd6818c2b981598cccb45e6c5ba9e6a8fd0acc8f1b764c38a2bbc7495fb671274fb1cddeef085748eb19e4e7eff2adf0dc7b5578697207e5ab6e0c830d63a8043846d4b1edd8809ca29b", 0xb8}, {&(0x7f0000000480)="05e9ec6f25950f29f0487ee026ff679b552ee7119f8f7700a9a22ac924029f65a174c23da9183f0bce0d2d7d1b04838b768494b60d82e05b5675666d4ef24977785059cd206bbf9ffd8a03039b285a84becdc468caee52ccbd150d808f5935ee5ac57c4b6dbab3", 0x67}, {&(0x7f0000001fc0)="899b64d017dcaf6ec0bc7f06de84456f70c9260609ae3f1d9b7f36d74fee46fd0f3239f08439c9bca47433c7aace635c1ebebd186b4f7524b61f7c9339015f73ec1c839a2ce1414c49e350b9e3fe701f818c2673524106615db8185c263f8d62332b9e495654ba10bdd02b42c220831e0f100a6b6ff751e2e9a75122fc886c607cf19b6c000d2eaaf72b204de5cc7caf19c763b555701b77a7df46982470854b951f6e24c1e54e2cde795950114c5931412c9831646f2fe208b9eb07fd38dd25aa679f5fa88f444adb13535edbe7f818c3a6c4d85d6c6d4ab5da45526fcee7814a70ee4a3200ff2852880d1e74e58e658586df2e7dc37dfb41b204958f071c8ffc05720c1e09b6cc419ba043a32527ac2c191f5f21a2d9e98b53e4e0b46cfaa79f5b56b0ff70b67996e67495efff49cb4e51453083d10def6030d5bc297307dec01b27d6db25d1cfb082d3dbff95aa451cea26502a47588e85eb9e170242b5e247d13df35242495ea948d1fd4416313b520fa6f3c2c0c6c2f6683f38c5cf842c234856de1c5cd0d17f8c43c510ca8d554deb17307c2afe7728d85120b58021ab972a66f22c561abda2710448378a12fa0dd2c88663ccb35b5a5b945ed49cc2dec6f7391b11bfc6a4487607dd5174b12e7e77880a1f488dce4ddeae7bb860a6c5dd2c71b22a2929825836699f885e28adfd95dda8fd9e72eaa20b21e9c671a31687dceba37e01edc023ade9e0a713b02c8f058fc687dc75c9a1360d9ca1bab6a2b7724b37a9c0068ce95e4745dd833945fa1a4aedabe74c9fbdb11551f1bfdde331e916095e37cee99263f613bdca8a3eddbdada9148a1f7429401ffe6be33b34e180ba3d2dd9b6194b05f27c9b48b225ab6ed847a29260e5dde01f21eb8a13406d8cff2b2d8b7d6b362a30e906292ba2eae160c22e928087f0fc1f7dc76f3d7971d1864312be76475a7891351f25a0a337be9eb93433b77776bacd2b87c5ec4525ac1c1fdb1edd702b859e567f58bbd2eed163a81363a2af4c99980365bdd52d1f1ae489184df284fa6e2b93473510bf8d41e1c72345a1d1629ece8e100ea9becc6bb99f8e4bcb5063fc5c323520a3e542200e5013ade4f6790eb5e71885385a942e643755cb2750dcf494e98399d27a497b4aa8a3160bbc672fb1b714c40483b5e8657dedaa0f9e28cbd089368025636a111794ccdc33109b97f8851bd95a864450c9cbb3cb56610fca83c223928f674d00dfdbdf06c3416d30e5a6e995f05281011fd7b7580bf6cc52750f2034556292b3bd83fc3a7bde9c0ce6595d0d08ebbe12b73be70061310ac4d71e1272b459639721b08b6a4cfb33f98f9478d407e77574b2f0fb7e9260bf47b81141b8003f54cc9fdee0a1e0d4d96bbe64260384df1a45af7f05e335213b905fa8cef3122219374a61b317c51a5c4b8fe11469e0a7eaf3340e1d3d03434267e706182208b79195f21d6b42a725acf75a31cff8fe6adc7b3b200fd9522c6c81ec065bc9b4b7d21c398380e29a752f8a704d4a295fb0a6ba2e75d2cc9963f2d1cf3a153d7101199391631c6094b2aa49b596fbda96ac4056b49695ba9c56bd8577a099cc06e98cd31651a72894f7971d66247dda3447da9938899be593ada0b475c32923dbea6dcceecabe04f8c9a8e2a466cefe18864ba9bd1cbbcb230e429220a324e74ce5a96bbbccc506748b7129c243024ea695da1ed44f8a4183980025752bdc2afab2564dbb54825b637041de69a39b55f96ecc54f7cc6a5e0d17fe0a54c48e52a66fc07b07de12866b261d5a0d26180b6c83f3a07a5c1f295e1f93ed81ae06b40d176688ad6842d4b479fe0f926ecb05682e63aeb4cd3b49b2d3ab4b4ed9898bcbec3b3f244f83b2889fc6048552c330f7d3d1b7a552d1726794e35b1eb8825ae9ecf2888152ba739dfc02c15fe048befb3e6dd2331fafe7b1f7ae077cebb69fc0d8cd4ea6c74479b01665726c8f26d2279a17f00b6c1ccf7971ec2c07eabe4f547dc32541db9fa7a1fbdc516b8a872da691d2d24adc74cea22094786bdae7f4618298633d89f8eedbbea53b173c7d7e6e903673366e971c688456f4ece6d592b5f496bafab3564d83f0c8e6cc5fc1cc7d7bb4752573ad8d5230c3b6ed8ad8f1b78c2289d8f407e63ca923e463b2d1963e658278b7eede74b775ebf5792099cd65d01b155005c76c2591182282f9820e9c828c1879a8e6d43573c1b621d427cc44bdfb038d956f1c1d8c3e69af75dd0e6ae532ebbf2932b9d3c32f25ad5345d653110a1c185869968cc3e0733c32226202d4e026969f90beb6e063e9c8780351758dd35ff09f61560c5def09384ce3b5099c53096eb6a096a61c975279c759da8af9b651748b4eb644a8fc5d7951141d00fb38f29a14a7390a94ccac8c80c7f92fc0246435663c09804d6a490f67b57da1a1d94cfad243944598441cdbb1088367fa644dc4de962c14ffa2bc1969c10ad9908dce439699eafb23a53ea9f6829cb6ea48a33fe477a557fb12671dbc88f0780335dfa594bf2af47f3c4488889a1e7ce7d03d457df553ff299fae387b6e3f633feeef65db464b0426b78e4e5e247cc1f2cf486cfb044a4577522a59bd29213b1011f2d0f7f37c331b96932d3dc7837e2b603acad1af9de0f11e3c4cc55eb25a47b185793782c7b520b1612143e72f7a685c8d8ed8734437b4eff657947d6b7fd83b882c2ce81429b7a83ee2c2d8afa145dc7758f26829356c201ca43df850ae5cb15ca345fdb54b28041a15fbacfd0af283ba44548745350c562b8cd43ec2389c935783e44dee012f55e734c60675556ef07f133e4cf3aaaa0bb0ac02832f1e7feb6fb9e1ad109e002ba9a7d7b916889db5cfaae33d3be5d77510c83123292d89bc9280b3b21ac5eb737e4204b0e973106672699d829ae999ba5380050708aeb25b07abdd995ed7551d8c940e0e2433f9fae8a3bb29ca3ccd0c83ee0f2ba1f87567f5bb1989577a082d3fb431aee1ad5d99eae7d7dd30265700fa45ffd405e800a41828a8466713cbe7975ce592c482755c018a41a3a759ce42335aa35183b20780d53674ada9b8f96b10ca7f60c2287adbc81e9c4806a1672058b3c0d04294d4309ba18bab3ced6592cd6fea134b61b978c9b40cdb8a792b9b414d385eaed1ea181959d4133e2598f51ea48f25b4500cfb83f6e53b5a4bf0388e33187b1012a8785e36b4d4f21042fc857805dc0d29d4d15ffb0898f2b99a5ea5fbbbf5ba11c18f4fe3511c47cfb18401908f2a52e952edf2f8bcbd3367303583e5f881518b4c5c6045ac32c8332db5960589896e0313ff20e6420aad5d7a1237f55619e7b4c1c83d7e3da624ede10bb67970abe28b4018a7d932bfe0528d704bfc3d2226e4e33d3f7ea702d2af629b8882e01d51edb93de9951efb4590b2792013cb25f5047065c2dcd08ca8ce105d91927e1f1276824fedd13bbff2200b24c4cdf4a09bd23a6dabc011197b2237fa4e967b444e6ef50efb6d51288b2e0ba1de93ce9c6d92123ef20137d491aa2a8cbc843467d9172e78a7f2cd194af3158f4db221faa48d8c9428afdffa6411f42f1b500bc71d55ee20d0519fdd0a5f315ea1c270568a69db3174a4f8bee31abdb574a1a8b9ffad957bd4a46b97515425dd10d6cf5263ef7ca971d745abbe63bd176a4aeb6dd6c07bcc709f92a0dc723fde629888b9a7eeee82b9029452a8ae8924ba0faf6ca18569907220bb788bfc63f2d3e79d9ad86b48d2985b8c4c85ccc60bb250ac2795364b56a6dc0041eb6b6ab61c8e89e8cc0449c1e9c72f7cd39bae3e0e2e21ef59effe59097e059ac975db944ba0bd201887de770a075a9239fb4e4bd9f67cd54ef96c2454839e423fd22232404d6b812d4e130d37a3b3b83b5715a2fec426921ee3ef14c833a5de2d60ed5ee65fd5b81ae09804ae1ca077d2445e2659cc13e3231f6955b2c4f7e59bcc324de3dc204e5cf1868ac25bfddcca6ff1ffcd8cd5bcb844e2a4e5818083370eb5fe02acff578beac6afd5a8b7a9bdea494481a0fb84a26fea00a057129ff6af9c4b4a83c6fc807f38da02247485b11e6fc456677496e37bc04d7dc19a860b430d2f2075046a7e6214b973c43d03483d8065836312f0842a593aca5518c0b4b50249f1aad2feb2e193ac9b530ec975192100bba617f8ecdf046aa72bd1dcda4daee534644709a31ab83bd846242a88aa80910ebc4b9fab58a085513cc63be4c76c99471618a2b93136aca2fb8570f2a26eabb5206bbc6fe78bfca3559ff949eed035b5c9e91c978f49b2f199bf4dad3ebd7ef0657fe72e9c3085d5e9db9397dd6923f44e6dafb65d8c1515c4de7307d3c781e35f206ebd52ff81f81384890ad611d0929c28434fca82d4a61c56112e629b72823714d96eba626da1a2c2029cd27997f6a29ba0112f0313af805176b1ebdeb89b564be3516fa0082ba2027ee4e27d1186c7bdffffbead35f2767f7da1c9f881d0c82f041713dee85dde5c8e576d1a913b53b575df01d4ca111000d62471cd6c94dd18a8be2ead034b2df4eb3bb4f88398445fbee7da62bd6c3c7e798b647268f5e3d1e98e0daa2b5c94bfb026ec9c5479ab56240af32a39e0dd894b07abd31eeaf43dadd90487dd88a33d71db5c598a393f0937c0b8a874c4d2d27395f72cde64d7b8420b95e95230f73488c288d2081fad85976f0c133a8c307c158ee62842197023bba82381e198b4061d462a0507cf4ee04dbdd05f3624acccc0e020780f94b82f47273edf4b074bfb84721bc082d258ef2eb906be118942199446fbf8d3630986bec07b84b6d8a765ed43e438c294bca5a7d5d7f96264287ecdeed6e14b9d5c837543e16392b672f9b78b56c8fb2ecf1fbaefddc2b39114881979a1b19b3137d758e4ca01752124aff785c0bd17f05ad99828f709b028bfb2a50aab784eea0dda423aa828e07e06c38abd989392ddfa4e4f4ca3c61ef0999707eda65120b78c9bdb4e642ef58ff89e3d010af4c4c9bcf2f08f6db12330976cb38bfd5d153050", 0xdeb}, {&(0x7f0000000200)="ca8e53e0", 0x4}, {&(0x7f0000002fc0)="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", 0xd70}], 0x8}}], 0x1, 0x0) 20:13:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 605.174534][T14499] fuse: Invalid rootmode 20:13:48 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:13:48 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 20:13:48 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) 20:13:48 executing program 3: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) sendto$inet6(r0, &(0x7f00000002c0)='g', 0x324, 0x4004000, 0x0, 0x185) 20:13:48 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)="98", 0x1}, {&(0x7f00000005c0)='d', 0x1}, {&(0x7f0000000640)='D', 0x1}, {&(0x7f00000006c0)='<', 0x1}], 0x4, &(0x7f0000000a40)=[@txtime={{0x18}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 20:13:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, 0x0, 0x0, 0x0) 20:13:49 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721540001a381", @ANYRES32=0x0, @ANYBLOB="7fff0002810300001c0012000b0001006d616373656300e10b00020006c9edae000300000a0005c0100000000000000008000a0009d35b4f000000b0b9cad4a1"], 0x50}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0x4924924924924cb, 0x4800) 20:13:49 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 606.047962][ T32] audit: type=1804 audit(1595103229.194:262): pid=14524 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/142/bus" dev="sda1" ino=15906 res=1 20:13:49 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0x0, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) [ 606.208730][ T32] audit: type=1804 audit(1595103229.234:263): pid=14523 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/142/bus" dev="sda1" ino=15906 res=1 [ 606.359398][T14530] fuse: Bad value for 'rootmode' 20:13:49 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 606.632478][T14528] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 606.640977][T14528] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.3'. [ 606.659343][T14528] device team_slave_0 entered promiscuous mode [ 606.665717][T14528] device team_slave_1 entered promiscuous mode [ 606.672052][T14528] device macsec1 entered promiscuous mode [ 606.677992][T14528] device team0 entered promiscuous mode 20:13:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, 0x0, 0x0, 0x0) [ 606.859174][T14540] fuse: Bad value for 'rootmode' [ 606.971307][T14528] device team0 left promiscuous mode [ 606.978751][T14528] device team_slave_0 left promiscuous mode [ 606.984756][T14528] device team_slave_1 left promiscuous mode [ 607.519286][T14544] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 607.527770][T14544] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.3'. [ 607.546821][T14544] device team_slave_0 entered promiscuous mode [ 607.553242][T14544] device team_slave_1 entered promiscuous mode [ 607.559954][T14544] device macsec1 entered promiscuous mode 20:13:50 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x1) 20:13:50 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000240)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x0, 0x0, 0xfffffffd, 0x0, 'syz1\x00'}, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 607.565852][T14544] device team0 entered promiscuous mode 20:13:50 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) 20:13:50 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, 0x0, 0x0, 0x0) [ 607.753258][T14555] fuse: Bad value for 'rootmode' [ 607.771081][T14544] device team0 left promiscuous mode [ 607.778755][T14544] device team_slave_0 left promiscuous mode [ 607.785054][T14544] device team_slave_1 left promiscuous mode [ 607.848062][ T32] audit: type=1804 audit(1595103230.994:264): pid=14558 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/143/bus" dev="sda1" ino=16244 res=1 20:13:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x64, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x44, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x19}, {0x8, 0x16}, {0x8, 0x1a}, {0x8}, {0x8}, {0x8}]}}]}]}, 0x64}}, 0x0) r1 = openat$vcs(0xffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@delchain={0x6c, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x900}, {0x0, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x3c, 0x2, [@TCA_CGROUP_ACT={0x38, 0x1, [@m_xt={0x34, 0x0, 0x0, 0x0, {{0x7, 0x1, 'xt\x00'}, {0x4}, {0x9, 0x6, "2fafb9e9cf"}, {0xc}, {0xc}}}]}]}}]}, 0x6c}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@ipv4_getaddr={0x58, 0x16, 0x2, 0x70bd27, 0x25dfdbfb, {0x2, 0x3f, 0x26}, [@IFA_FLAGS={0x8, 0x8, 0x4c0}, @IFA_ADDRESS={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x30}}, @IFA_CACHEINFO={0x14, 0x6, {0x6, 0x905, 0x6923}}, @IFA_ADDRESS={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x3d}}, @IFA_CACHEINFO={0x14, 0x6, {0x4, 0x9, 0x0, 0x81}}]}, 0x58}, 0x1, 0x0, 0x0, 0x4040}, 0x80) 20:13:51 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,use', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 608.027457][ T32] audit: type=1804 audit(1595103231.025:265): pid=14558 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/143/bus" dev="sda1" ino=16244 res=1 [ 608.400529][T14567] fuse: Unknown parameter 'use00000000000000000000' [ 608.676138][T14570] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 608.744262][T14575] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 20:13:52 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000240)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x1000000, 'syz1\x00'}, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 20:13:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294fbdfd6ffad7d6bb57a6f7a1deece1b24f1c039fc1e270659d14dee0a632affb146654e34bfac4a5527b0e066d50fc5bf6382f46aecc9ca6f5813d1075762a31c6e4", 0x82}], 0x4}}], 0x1, 0x0) 20:13:52 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,use', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 609.002693][T14588] fuse: Unknown parameter 'use00000000000000000000' 20:13:52 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,use', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:52 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x101782) mmap(&(0x7f00000ee000/0x4000)=nil, 0x4000, 0x3fbcbab16c80fab, 0x2013, r0, 0x0) [ 609.481620][T14597] fuse: Unknown parameter 'use00000000000000000000' 20:13:52 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x0, 0x2010, r1, 0x8000000) mlockall(0x1) 20:13:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0), 0x0, 0x0) 20:13:52 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000280)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) sendmsg$NFNL_MSG_ACCT_DEL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xa4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) readv(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x1c}], 0x1) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 20:13:52 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000140)={@void, @void, @eth={@broadcast, @local, @val={@val={0x9153}, {0x6558}}, {@ipv4={0x8100, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty=0x86ddffff, @empty}}}}}}, 0xfdef) 20:13:52 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000200)='./file0/bus\x00', 0x81000400) umount2(&(0x7f0000000080)='./file0\x00', 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="f41c2d533d335f55f918a5b598dadd027cdf56b53368611ede44fe66d0c87818b64d569d8c49f2cd5d28773090dd082fb1d06ca06b937ec19c365b42a70cc0b8707e72b89991b73914643865a0a7650f4411135caf2ef329632a776c2a76edae0d6b2d", @ANYRES16=r1, @ANYBLOB], 0x14}}, 0x800) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000080}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) setresuid(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x6, &(0x7f00000005c0)=[{&(0x7f00000002c0)="c89d1be68db894efe52a733f9fcd3d371e1701d74110931371", 0x19, 0x5}, {0x0, 0x0, 0x398}, {&(0x7f0000000340)="4b4f0b48731970fe33d16c6e405e03593a2396d192050c1d80299d45e28d95848099f8f729b2e11a9394b254d180d12e625b86a4c37c409b2adeb3277340d459", 0x40, 0x3000}, {&(0x7f0000000400)="2755fe307c1e3fe74ab1aa3070aebc452cc53d66eff22265958cecf64b20a1f2be233f8d25aea1a951e9181643f4782d9cbe5af6cabb150cb75447cad10b219cbf0d59de130e1857dd0a10ce55c5149c58ffd22319acf78bec06a42f5c23ec82592f83d8b06c7b85572d8538fcb2c36e6d418c84ba85dd217e29b51f35f16e297535c1265219547eeb2cd9bfe6941ef2fdb067f89ddba3a6c9ca84e6008a6450bddc2e2fa6da8594b6d84ac27f8ce4f1d32ef1d5263ef29ad90ebda7f8b5a8a4fb", 0xc1, 0x2}, {&(0x7f0000000500)="8a1e843531", 0x5, 0x3}, {&(0x7f0000000540)="a3271f3a3a3cbd34be279bd8cc4404332a0bff2d0a126e73703af37305816834614bf7e66fb7aee396ad46a962dd128634b3544c20cabc12fe8251a429ee4df8e81f0da0aead", 0x46, 0x8}], 0x46800, &(0x7f0000000640)={[{@barrier='barrier'}, {@minixdf='minixdf'}, {@dioread_lock='dioread_lock'}, {@block_validity='block_validity'}, {@init_itable_val={'init_itable', 0x3d, 0x40}}, {@noacl='noacl'}, {@auto_da_alloc='auto_da_alloc'}], [{@subj_role={'subj_role', 0x3d, '/@]+$$*('}}, {@uid_lt={'uid<'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x31}}]}) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x80104592, &(0x7f0000000080)={0x700, 0x0, 0x0}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/crypto\x00', 0x0, 0x0) 20:13:52 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_i', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 609.990003][T14614] fuse: Unknown parameter 'user_i00000000000000000000' 20:13:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0), 0x0, 0x0) [ 610.149256][ T32] audit: type=1804 audit(1595103233.295:266): pid=14619 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/144/bus" dev="sda1" ino=15722 res=1 [ 610.340574][ T32] audit: type=1804 audit(1595103233.345:267): pid=14619 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/144/bus" dev="sda1" ino=15722 res=1 20:13:53 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_i', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:53 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000280)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xa4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) readv(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x1c}], 0x1) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) [ 610.722890][T14626] fuse: Unknown parameter 'user_i00000000000000000000' 20:13:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0), 0x0, 0x0) 20:13:54 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_i', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 611.287464][T14636] fuse: Unknown parameter 'user_i00000000000000000000' 20:13:55 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x0, 0x2010, r1, 0x8000000) mlockall(0x1) 20:13:55 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb", 0x1}], 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') read$alg(r0, 0x0, 0x0) [ 612.110613][ T32] audit: type=1804 audit(1595103235.255:268): pid=14649 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/145/bus" dev="sda1" ino=16367 res=1 20:13:57 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000280)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) sendmsg$NFNL_MSG_ACCT_DEL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xa4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) readv(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x1c}], 0x1) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 20:13:57 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 20:13:57 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x169a01) ioctl$LOOP_SET_STATUS64(r0, 0x127f, &(0x7f00000005c0)={0xa00, 0x60000, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "b4700382000000a9d205dbb3dff500fffe7f3bf7f4b83d586c6513e4f21200000000000040010000804d000060554f9f5bb5d991883500", "d31e99c600575a02b8af7e00000000000b870100f5ff0008c18881dabbb8480504400000006fffdd8f699600101483812a4f96603838ec03e4ccb100", "1dd1000000000000f321d5245dc9405400000000000000000000000000002000"}) 20:13:57 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x0, 0x2010, r1, 0x8000000) mlockall(0x1) [ 614.208303][T14666] fuse: Unknown parameter 'user_id00000000000000000000' [ 614.216380][ T32] audit: type=1804 audit(1595103237.356:269): pid=14665 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/146/bus" dev="sda1" ino=16353 res=1 [ 614.241629][ T32] audit: type=1804 audit(1595103237.366:270): pid=14665 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/146/bus" dev="sda1" ino=16353 res=1 20:13:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 20:13:58 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x5412, &(0x7f0000000000)={0x3}) 20:13:58 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000040)=0x1, 0x4) sendmmsg$inet6(r0, &(0x7f0000003dc0)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f0000000680)={0xa, 0x4e24, 0x7f, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c, 0x0}}], 0x2, 0x0) 20:13:58 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}], 0x3}}], 0x1, 0x0) [ 615.052434][T14676] fuse: Unknown parameter 'user_id00000000000000000000' 20:13:58 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@struct={0x8, 0x0, 0x0, 0xc}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000300)=""/250, 0x2d, 0xfa, 0x8}, 0x20) 20:13:58 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 615.654994][T14689] fuse: Unknown parameter 'user_id00000000000000000000' [ 615.659370][T14687] BPF:[1] FUNC [ 615.665818][T14687] BPF:type_id=0 [ 615.669326][T14687] BPF: [ 615.672132][T14687] BPF:Invalid name [ 615.676281][T14687] BPF: [ 615.676281][T14687] [ 615.761269][T14691] BPF:[1] FUNC [ 615.765252][T14691] BPF:type_id=0 [ 615.768781][T14691] BPF: [ 615.771585][T14691] BPF:Invalid name [ 615.775541][T14691] BPF: [ 615.775541][T14691] 20:13:59 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000280)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) sendmsg$NFNL_MSG_ACCT_DEL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xa4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) readv(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x1c}], 0x1) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 20:13:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}], 0x3}}], 0x1, 0x0) 20:13:59 executing program 3: rt_sigprocmask(0x0, &(0x7f000078b000)={[0xfffffffffffffffd]}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0xc, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x77359400}, {0x77359400}}, 0x0) rt_sigtimedwait(&(0x7f0000000000)={[0xffff]}, 0x0, 0x0, 0x8) 20:13:59 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:13:59 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$TIOCL_SETSEL(r0, 0x5412, &(0x7f0000000000)={0x3}) 20:13:59 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x10, r1, 0x8000000) mlockall(0x1) [ 616.921289][ T32] audit: type=1804 audit(1595103240.066:271): pid=14704 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/147/bus" dev="sda1" ino=16366 res=1 [ 616.947811][ T32] audit: type=1804 audit(1595103240.066:272): pid=14704 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/147/bus" dev="sda1" ino=16366 res=1 [ 617.025230][T14709] fuse: Bad value for 'fd' 20:14:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}], 0x3}}], 0x1, 0x0) 20:14:00 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x5412, &(0x7f0000000000)={0x3}) 20:14:00 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="850000006d00000025000000000000009500000000000000afcd48d6494d614dcc6fab5335ec470db2c61612ba392176dd2963228e1d69ba7ea94c500dc4ef2fad96ed406f21caf593836d9ea2cfb0e60436e054258c4686b066707de94a4f4d5fc79c987d669f2b1facbcf9d9924be41a9169bdfaf16d1c0b153911b8dd7f165789c691de6eee84309e7a23c19a39484809539fca4e0b6ec015a7d55545a34effa077faa55c59e88254f54077f799bf1683537a8ea0244d35b213bda80cc172afd80e361bedd8b8cc57255a5e3d772b7958f91f5d822175ed60ab386d94af98af1da2b59525f8fe3b28d7e53c78fbfe5ab0255f347160ec8343e1494d3a63e57a15d26d00a74769453f6c0bb13b81a4840bad04859d928365a7ea3fab8b4b380a00d72bc0480f949c470157306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f132a902e5111f2cc5e46ac1c60a9b10c074bfbcd4b09012175484135f0e519f0b1c4aaa026d570ecb5e8cddbed65ff76ff61c5552617fd703f7f14d8b78a602ca3cdf6a662d8bc9d79c7f20072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e559d17879570c8ad943e392957b4f979ea17117a13201bafe4f0f6ea5a6c957ada0c54855107c49ab20d8a76678a996ec13eaa66580ae7b813071cbb17d9f37282462f03de147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb5567e54d3504723177d356c4604b7a492ecec37e83efceefd7ca253cbc8edc8be05cc854583d4071bfc061c6a14507434eb54b6f43caea5c4bf690441974b0f5f5adc6825a3a3d5b754df23175e2ce8b03bf3e30000000000000000000000009addae00d6f4116c173ad6b379c4fa48171f9701e0c636c2eb9cc81d9a"], &(0x7f0000000000)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) setsockopt$sock_attach_bpf(r0, 0x6, 0x21, &(0x7f0000000000), 0x4) 20:14:00 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 617.560229][T14720] fuse: Bad value for 'fd' 20:14:00 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:14:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {0x0}], 0x4}}], 0x1, 0x0) [ 618.078883][T14729] fuse: Bad value for 'fd' 20:14:02 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000280)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) sendmsg$NFNL_MSG_ACCT_DEL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xa4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) readv(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x1c}], 0x1) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 20:14:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x24000844) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, 0x0) mkdir(0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, 0x0, 0x2000c840) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000680)='TPB\xf4R\xda\xe3\x1ao\nW\xcb\xa1|\x92\xc4}\x91\xd3\x17\xfd.\xc6Q\xc4\xa4a\xc1\xdfq\xe6$\x9eb\xd0\xa9\xc3\x98\x8d\x8a\xa0w\xb1\f\xc7\xc3\xb8\x13\xcb\xad\x16\x9c(\xf0C/\x82\xe1\xdc\x84\xeb\xa3\x87\xceW<\xaa4\xb7\xbcX\xa8M/\xff\x0f\x97h\xd2W\"\x85\xfe\x19\x80\xa4\xef*\xda\xec\x17\xa2YZ+\xadp\x8a\xf2\xb4+h\xc6\"*#\x1b\xfcX\x8f\x82\xef\xd7H.\xb2\xf3.8\xfc\x82\xf2\x00'/136) socket$kcm(0x2, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x4) recvmsg(r2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000004c0)='lo\x00\x96o8\x14d\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\'m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1') 20:14:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:14:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {0x0}], 0x4}}], 0x1, 0x0) 20:14:02 executing program 3: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000480)="7093", &(0x7f0000000280), 0x7, r0}, 0x38) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) 20:14:02 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x10, r1, 0x8000000) mlockall(0x1) [ 619.635328][ T32] audit: type=1804 audit(1595103242.786:273): pid=14744 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/148/bus" dev="sda1" ino=16356 res=1 [ 619.694545][T14748] fuse: Bad value for 'fd' [ 619.821188][ T32] audit: type=1804 audit(1595103242.836:274): pid=14744 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/148/bus" dev="sda1" ino=16356 res=1 20:14:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {0x0}], 0x4}}], 0x1, 0x0) 20:14:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@l2tp6={0xa, 0x0, 0x0, @remote, 0x1}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000440)="c4", 0x1}], 0x1}, 0x20000070) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) 20:14:03 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 620.205936][T14755] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 620.512622][T14767] fuse: Bad value for 'fd' 20:14:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)}], 0x4}}], 0x1, 0x0) 20:14:04 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 620.890004][T14755] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:14:04 executing program 3: nanosleep(&(0x7f0000000700)={0x0, 0x1430c55b}, 0x0) [ 621.146578][T14773] fuse: Bad value for 'fd' 20:14:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000027c0)=[{&(0x7f0000000400)=""/4108, 0x100c}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/fib_triestat\x00') openat$null(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x40895) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 20:14:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)}], 0x4}}], 0x1, 0x0) 20:14:05 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x8, 0x3, 0x29c, 0x0, 0x118, 0x3e020005, 0xd0, 0x188, 0x208, 0x1d0, 0x1d0, 0x208, 0x1d0, 0x5, 0x0, {[{{@ip={@multicast1=0xe0005100, @local, 0x0, 0x0, 'syzkaller0\x00', 'netpci0\x00'}, 0x0, 0xb0, 0xd0, 0x0, {}, [@common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], 0x0, 0xf0, 0x138, 0x0, {}, [@common=@set={{0x40, 'set\x00'}, {{0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa2d1925c2ac01298]}}}, @common=@set={{0x40, 'set\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x2f8) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) pipe(0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) 20:14:05 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:14:05 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x10, r1, 0x8000000) mlockall(0x1) 20:14:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) mmap(&(0x7f00008da000/0x1000)=nil, 0x1000, 0x0, 0xb5972, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46000) prctl$PR_CAPBSET_READ(0x17, 0x1000000000a) io_setup(0x2349, &(0x7f0000000240)=0x0) io_submit(r1, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) socketpair$unix(0x1, 0x0, 0x0, &(0x7f000001a000)) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) [ 622.437856][T14787] fuse: Unknown parameter '0x0000000000000003' [ 622.479326][T14793] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables [ 622.489209][T14793] Cannot find set identified by id 0 to match [ 622.507987][ T32] audit: type=1804 audit(1595103245.657:275): pid=14791 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/149/bus" dev="sda1" ino=16366 res=1 [ 622.643914][T14796] Cannot find set identified by id 0 to match [ 622.730803][ T32] audit: type=1804 audit(1595103245.697:276): pid=14791 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/149/bus" dev="sda1" ino=16366 res=1 20:14:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)}], 0x4}}], 0x1, 0x0) 20:14:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:14:06 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/vmallocinfo\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) sendfile(r2, r0, 0x0, 0x4000000000010047) 20:14:06 executing program 3: syz_emit_ethernet(0x72, &(0x7f00000002c0)={@multicast, @local, @val={@void}, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @loopback, @loopback}, {0x0, 0x0, 0x0, @multicast2}}}}}, 0x0) [ 623.309623][T14806] fuse: Unknown parameter '0x0000000000000003' 20:14:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19552a24ca6b0cc5018413ca04d52fd27986a0b1658f4a395d09bcb6fb55bb294f", 0x41}], 0x4}}], 0x1, 0x0) 20:14:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 624.126873][T14817] fuse: Unknown parameter '0x0000000000000003' 20:14:07 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$int_out(r1, 0x5452, &(0x7f0000000080)) 20:14:07 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x4c, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x6) write$cgroup_int(r3, &(0x7f0000000200), 0x400c00) 20:14:07 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x248800) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x29) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x3}) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000100)) 20:14:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)}], 0x4}}], 0x1, 0x0) 20:14:07 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:14:07 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, 0xffffffffffffffff, 0x8000000) mlockall(0x1) [ 624.899724][T14829] fuse: Unknown parameter '0x0000000000000003' [ 624.906869][ T32] audit: type=1804 audit(1595103248.047:277): pid=14830 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/150/bus" dev="sda1" ino=16368 res=1 [ 624.932096][ T32] audit: type=1804 audit(1595103248.057:278): pid=14830 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/150/bus" dev="sda1" ino=16368 res=1 20:14:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)}], 0x4}}], 0x1, 0x0) 20:14:08 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:14:08 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSETMODE(r0, 0x5452, 0x71e000) 20:14:08 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) socket(0x400000000000010, 0x802, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x12, &(0x7f0000000240)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x3) [ 625.770710][T14852] fuse: Unknown parameter '0x0000000000000003' 20:14:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)}], 0x4}}], 0x1, 0x0) 20:14:09 executing program 5: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 20:14:09 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 626.324224][T14864] fuse: Unknown parameter '0x0000000000000003' 20:14:09 executing program 3: shmat(0x0, &(0x7f0000fe9000/0x2000)=nil, 0x4000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) msync(&(0x7f0000fea000/0x4000)=nil, 0x4000, 0x4) 20:14:09 executing program 0: preadv(0xffffffffffffffff, &(0x7f00000027c0)=[{&(0x7f0000000400)=""/4108, 0x100c}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 20:14:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19", 0x21}], 0x4}}], 0x1, 0x0) 20:14:09 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:14:09 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, 0xffffffffffffffff, 0x8000000) mlockall(0x1) [ 626.918706][ T32] audit: type=1804 audit(1595103250.068:279): pid=14872 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/151/bus" dev="sda1" ino=16363 res=1 [ 626.945088][ T32] audit: type=1804 audit(1595103250.068:280): pid=14872 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/151/bus" dev="sda1" ino=16363 res=1 [ 627.029667][T14874] fuse: Unknown parameter 'fd0x0000000000000003' 20:14:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012500b42426012b48c19", 0x21}], 0x4}}], 0x1, 0x0) 20:14:10 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x5450, 0x0) 20:14:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 627.826391][T14890] fuse: Unknown parameter 'fd0x0000000000000003' 20:14:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)='J', 0x1}], 0x4}}], 0x1, 0x0) 20:14:11 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x5450, 0x0) 20:14:13 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r2 = syz_open_pts(r1, 0x0) r3 = dup2(r2, r0) ioctl$TIOCGWINSZ(r3, 0x5413, &(0x7f0000000080)) 20:14:13 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:14:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)='J', 0x1}], 0x4}}], 0x1, 0x0) 20:14:13 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.stat\x00', 0x26e1, 0x0) close(r0) close(0xffffffffffffffff) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) syz_open_pts(r0, 0x0) 20:14:13 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, 0xffffffffffffffff, 0x8000000) mlockall(0x1) 20:14:13 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$KDSETKEYCODE(r1, 0x541b, &(0x7f0000000100)) [ 630.245163][ T32] audit: type=1804 audit(1595103253.398:281): pid=14912 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/152/bus" dev="sda1" ino=16349 res=1 [ 630.270365][ T32] audit: type=1804 audit(1595103253.398:282): pid=14912 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/152/bus" dev="sda1" ino=16349 res=1 20:14:13 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(0xffffffffffffffff, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:14:13 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCMIWAIT(r1, 0x541b, 0x745000) 20:14:13 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000240)='t\bnu\x8c\xc4', 0x0) r2 = memfd_create(&(0x7f0000000240)='t\bnu\x8c\xc4', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000380)="d5", 0x1}], 0x1, 0x881806) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000140)) read(r2, &(0x7f0000000000)=""/30, 0xfffffe4c) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)="d5", 0x1}], 0x1, 0x881806) read(r1, &(0x7f0000000000)=""/30, 0xfffffe4c) open$dir(0x0, 0x100, 0x0) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, &(0x7f0000000180)) 20:14:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)='J', 0x1}], 0x4}}], 0x1, 0x0) 20:14:13 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="020100090e00000000000000000000000200100000000000170000000000000005000600000000000a00000000000000fe800000000000000000000000000000000000000000000005000500000000000a"], 0x70}}, 0x0) 20:14:14 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='attr\x00') getdents(r0, &(0x7f00000020c0)=""/45, 0x2d) 20:14:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0", 0x11}], 0x4}}], 0x1, 0x0) 20:14:14 executing program 5: socket$inet6(0xa, 0x1, 0x0) setitimer(0x1, 0x0, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000200)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000080)=0x825e, 0x8) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x6, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9281a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 20:14:15 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(0xffffffffffffffff, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:14:15 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 20:14:15 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x0) 20:14:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0", 0x11}], 0x4}}], 0x1, 0x0) 20:14:15 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="0213000002"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffa0018000, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c"], 0x60}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmmsg(r2, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) 20:14:15 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000000)=[{0x6}]}, 0x10) 20:14:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x1012}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) 20:14:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0", 0x11}], 0x4}}], 0x1, 0x0) [ 632.981392][ T32] audit: type=1804 audit(1595103256.128:283): pid=14962 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/153/bus" dev="sda1" ino=16374 res=1 [ 633.136548][ T32] audit: type=1804 audit(1595103256.188:284): pid=14962 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/153/bus" dev="sda1" ino=16374 res=1 20:14:16 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000002c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="044501001a11cb"]}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:14:16 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x0) 20:14:16 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(0xffffffffffffffff, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 633.580459][ T32] audit: type=1804 audit(1595103256.728:285): pid=14977 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/154/bus" dev="sda1" ino=16376 res=1 20:14:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c01250", 0x19}], 0x4}}], 0x1, 0x0) 20:14:16 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='attr\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r0, &(0x7f00000020c0)=""/45, 0x2d) [ 633.724082][ T32] audit: type=1804 audit(1595103256.778:286): pid=14977 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/154/bus" dev="sda1" ino=16376 res=1 20:14:17 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x32) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x8, &(0x7f0000000040)={0x0, 0x8, 0xffff3a2d}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000000c0)={r0, 0x4, 0x100}) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0186404, &(0x7f0000000100)={&(0x7f0000006000/0x1000)=nil, 0x9, 0x1, 0x92, &(0x7f0000008000/0x4000)=nil, 0x90}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000006, 0x12, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'blake2b-512\x00'}}, 0x0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000001140)={'ipvlan1\x00'}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x9, 0x2010, r1, 0x8000000) mlockall(0x0) 20:14:17 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000002c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="044501001a11cb"]}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 634.160030][ T32] audit: type=1804 audit(1595103257.309:287): pid=15001 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/155/bus" dev="sda1" ino=15841 res=1 [ 634.185343][ T32] audit: type=1804 audit(1595103257.329:288): pid=15001 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir590842932/syzkaller.hwNTsh/155/bus" dev="sda1" ino=15841 res=1 20:14:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0", 0x11}], 0x4}}], 0x1, 0x0) 20:14:17 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/5, 0x5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x9d, &(0x7f00000003c0)="f7f249b9740c9e02007f00000000000032a5b60a00008024c30e478947d190ac00000000000000000000000097ba4ecb40a2ee2e32a3b88aaf3c06f4970e85a63c9a4b0d8b9aad9c9ba4c998db2f7155d302a7be122bb1609f8b0164eb12c07af20200169c864e1d5f8179cba2e431126de0594cf1487e311e84395a80adbe3e7f3622703c353de8e6928bfd5a5f2cc05e4b942d6ed155b67a555f4b2e"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:14:17 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x10) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f0000000280)=""/203) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x1, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_spirange={0x2, 0x10, 0x0, 0x17000000}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote}}]}, 0x70}}, 0x0) 20:14:18 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$SHM_LOCK(0x0, 0xb) shmctl$SHM_UNLOCK(0x0, 0xc) 20:14:18 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:14:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0", 0x11}], 0x4}}], 0x1, 0x0) 20:14:18 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x59f1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r0, r1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r4, 0x4400ae8f, &(0x7f00000000c0)={0x0, 0x0, [0xc0010141, 0x0, 0x3, 0x8, 0xfdfdffff]}) dup2(r5, r4) 20:14:18 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000002c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="044501001a11cb"]}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 635.194097][T15033] kvm: vcpu 129: requested lapic timer restore with starting count register 0x390=4241646265 (4241646265 ns) > initial count (296265111 ns). Using initial count to start timer. 20:14:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0", 0x11}], 0x4}}], 0x1, 0x0) 20:14:18 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000002c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="044501001a11cb"]}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:14:18 executing program 5: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000240)='t\bnu\x8c\xc4', 0x0) r2 = memfd_create(&(0x7f0000000240)='t\bnu\x8c\xc4', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000380)="d5", 0x1}], 0x1, 0x881806) ioctl$SIOCGIFHWADDR(r0, 0x8927, 0x0) read(r2, &(0x7f0000000000)=""/30, 0xfffffe4c) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)="d5", 0x1}], 0x1, 0x881806) read(r1, &(0x7f0000000000)=""/30, 0xfffffe4c) open$dir(&(0x7f0000000080)='./file0\x00', 0x100, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000180)) 20:14:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc", 0x15}], 0x4}}], 0x1, 0x0) 20:14:18 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000240)='t\bnu\x8c\xc4', 0x0) r1 = memfd_create(&(0x7f0000000240)='t\bnu\x8c\xc4', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)="d5", 0x1}], 0x1, 0x881806) read(r1, &(0x7f0000000000)=""/30, 0xfffffe4c) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000380)="d5", 0x1}], 0x1, 0x881806) read(r0, &(0x7f0000000000)=""/30, 0xfffffe4c) open$dir(&(0x7f0000000080)='./file0\x00', 0x100, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, 0x0) 20:14:20 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) read(r2, &(0x7f0000000180)=""/19, 0xfffffe47) 20:14:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc", 0x15}], 0x4}}], 0x1, 0x0) 20:14:20 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000002c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:14:20 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:14:20 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r0, r1, 0x0) dup2(r5, r4) 20:14:20 executing program 1: creat(&(0x7f0000000080)='./bus\x00', 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r0, 0x0) creat(0x0, 0x0) pselect6(0x40, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) 20:14:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc", 0x15}], 0x4}}], 0x1, 0x0) 20:14:21 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000000)=""/63, 0x3f) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, r0, 0x0, 0x405) 20:14:21 executing program 5: clone(0x2000900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@filter={'filter\x00', 0x50, 0x4, 0x3c0, 0xd0, 0x1f8, 0xd0, 0x1f8, 0xd0, 0x2f0, 0x2f0, 0x2f0, 0x2f0, 0x2f0, 0x4, 0x0, {[{{@ipv6={@mcast2, @local, [], [], 'veth1_macvtap\x00', 'veth1_macvtap\x00', {}, {}, 0x0, 0x0, 0x5}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x6}}}, {{@uncond, 0x0, 0x100, 0x128, 0x0, {}, [@common=@frag={{0x30, 'frag\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@icmp6={{0x28, 'icmp6\x00'}, {0x0, '% '}}]}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x420) 20:14:21 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000002c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:14:21 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000540), 0x4) recvmmsg(r1, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0}}], 0x2, 0x122, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_misc(r0, &(0x7f00000002c0)=ANY=[], 0x17) 20:14:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c0", 0x17}], 0x4}}], 0x1, 0x0) [ 639.521113][ T32] audit: type=1800 audit(1595103262.669:289): pid=15104 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="//selinux" name="bus" dev="sda1" ino=15763 res=0 20:14:22 executing program 0: socket$inet6(0xa, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)=0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62160555, 0x0, 0x0, 0x8]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000780)={"54abec7338595f275a2292c45ff078f1cbbf04241d1c3421ec9bf61b2221bc18246e74f0001e36735c2ad340bf94ad2a35cfc5d0953a3b2bfd41050051c6765447395415a9b05dffc9957e300168dc46f8377130fd28e50a805a6005ab6167da65430e3fcc214d7893c6d91026b5f5192f346a367dbc8ae5df0fd099b4e7a6dadd7f555b203f504eda86e0e8d8c5f319604db5a686750d03bf3a67210063e9a17ca0a1ccd80a7d57cb034b828b784b14c9e5dd70ca358c6819c3df7f4443dced6d9a56bb54eac6538cc61c5e9ef3bda9feeb62cbe4f0e1d1c7f6cbbcada85dbb247b0551773f0734e6f4733db49c22e497557c2f74bfa0e4af9b6228643f180d9f9e1e2bcdf0c35a5b8c388e728b574a066e190800db7b42573f534b8f60e8f756dc4d8dec7ad58b0474fc002851b265cc72099d43115828ac723e73009150fcf7196b4133e2988d4b0fc459e57293afef8837fa0d5d24b984a95cb4bdc48fc9c6e73ebee6b1a3239b2c0eef7c751ccb9f2dcdc3c69173db48df6b5d6e59e6465283de675a8d053e7f3abf86f43006a5a0c6225a589c12583e767b9d817f17bf690444a18e6f8a35b2cb4b60c191efbb16393560b568ee6c82bed918aa4a34b575ac9966b395aafa7fc3b7f467b484eb7d2617e0a240e8acbc2a7e02b650f7d1be52f462be20faa32dd88eb041e2c46b24ed7ab79c10f05296f5461f4ebda25dd7b9908da4be62e31c7ba45e5b30b7556a062999f43d2dbb9995d2ffff000000000000ce45caa470933c0906807da75cd38533d8f16d875452c543b259e78215011d2be638eab023513cfe0693d3107e17cfc87e038fc7d1db232d15307fe1d2a818d0a4bde2c53d221111ffa646514dd1fbd3c011b058f79c6fb0a31857ea309018bf72180a434611195c975cf5e285777231b6f158ecaf212183600379fe9762277c13cb6cde9cc0178b883fd1f210180e599f8eb33d33a9ff0f70db1de485b2f2434f2707bf9a54bb6aff687c060000005087f4d53a57adf7c97a06dcc61d7733a83dc505d57d8d5c83bf83e345a979307d708756c3f0f1c53a28883b665fda239019f32fc6f07d700d05023e9ef5b66d4b6be57ffd6fe39703fd4eed61535568f47ee51eff8290618e8387d0ba0d00c5bc4585d2d85688af46bb1da08bf42901634cb10e6b03ee276c16980090b59f3c57b428ae0a7ede758c781e2a5a8585e903adde0a0a281a7779a59067d82985655d9138b75042970e11aee4b95b8bcf232473767cca0139b2c2fb40045c6e031950c314015db2524c3f2fe941f249d158a44aa14774e61b2ee185bdfea8f317e440a39533c6db7ffd3c2b626c1e1eab05cebc59526b016cc6a0e4b766c3f00f619d366e5a4378bc15f805a6fb8c94002000"}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x275a, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, &(0x7f0000000100)={r5}) ioctl$DRM_IOCTL_LOCK(r4, 0x4008642a, &(0x7f0000000140)={r5, 0x21}) ioctl$DRM_IOCTL_SWITCH_CTX(r3, 0x40086424, &(0x7f0000000040)={r5, 0x2}) 20:14:22 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000000)=""/63, 0x3f) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, r0, 0x0, 0x405) 20:14:22 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000002c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:14:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:14:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c0", 0x17}], 0x4}}], 0x1, 0x0) 20:14:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)=0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62160555, 0x0, 0x0, 0x8]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000780)={"54abec7338595f275a2292c45ff078f1cbbf04241d1c3421ec9bf61b2221bc18246e74f0001e36735c2ad340bf94ad2a35cfc5d0953a3b2bfd41050051c6765447395415a9b05dffc9957e300168dc46f8377130fd28e50a805a6005ab6167da65430e3fcc214d7893c6d91026b5f5192f346a367dbc8ae5df0fd099b4e7a6dadd7f555b203f504eda86e0e8d8c5f319604db5a686750d03bf3a67210063e9a17ca0a1ccd80a7d57cb034b828b784b14c9e5dd70ca358c6819c3df7f4443dced6d9a56bb54eac6538cc61c5e9ef3bda9feeb62cbe4f0e1d1c7f6cbbcada85dbb247b0551773f0734e6f4733db49c22e497557c2f74bfa0e4af9b6228643f180d9f9e1e2bcdf0c35a5b8c388e728b574a066e190800db7b42573f534b8f60e8f756dc4d8dec7ad58b0474fc002851b265cc72099d43115828ac723e73009150fcf7196b4133e2988d4b0fc459e57293afef8837fa0d5d24b984a95cb4bdc48fc9c6e73ebee6b1a3239b2c0eef7c751ccb9f2dcdc3c69173db48df6b5d6e59e6465283de675a8d053e7f3abf86f43006a5a0c6225a589c12583e767b9d817f17bf690444a18e6f8a35b2cb4b60c191efbb16393560b568ee6c82bed918aa4a34b575ac9966b395aafa7fc3b7f467b484eb7d2617e0a240e8acbc2a7e02b650f7d1be52f462be20faa32dd88eb041e2c46b24ed7ab79c10f05296f5461f4ebda25dd7b9908da4be62e31c7ba45e5b30b7556a062999f43d2dbb9995d2ffff000000000000ce45caa470933c0906807da75cd38533d8f16d875452c543b259e78215011d2be638eab023513cfe0693d3107e17cfc87e038fc7d1db232d15307fe1d2a818d0a4bde2c53d221111ffa646514dd1fbd3c011b058f79c6fb0a31857ea309018bf72180a434611195c975cf5e285777231b6f158ecaf212183600379fe9762277c13cb6cde9cc0178b883fd1f210180e599f8eb33d33a9ff0f70db1de485b2f2434f2707bf9a54bb6aff687c060000005087f4d53a57adf7c97a06dcc61d7733a83dc505d57d8d5c83bf83e345a979307d708756c3f0f1c53a28883b665fda239019f32fc6f07d700d05023e9ef5b66d4b6be57ffd6fe39703fd4eed61535568f47ee51eff8290618e8387d0ba0d00c5bc4585d2d85688af46bb1da08bf42901634cb10e6b03ee276c16980090b59f3c57b428ae0a7ede758c781e2a5a8585e903adde0a0a281a7779a59067d82985655d9138b75042970e11aee4b95b8bcf232473767cca0139b2c2fb40045c6e031950c314015db2524c3f2fe941f249d158a44aa14774e61b2ee185bdfea8f317e440a39533c6db7ffd3c2b626c1e1eab05cebc59526b016cc6a0e4b766c3f00f619d366e5a4378bc15f805a6fb8c94002000"}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x275a, 0x0) fallocate(r4, 0x0, 0x0, 0x8000) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, 0x0) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, &(0x7f0000000100)) ioctl$DRM_IOCTL_LOCK(r4, 0x4008642a, &(0x7f0000000140)={0x0, 0x21}) ioctl$DRM_IOCTL_SWITCH_CTX(r3, 0x40086424, 0x0) 20:14:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c0", 0x17}], 0x4}}], 0x1, 0x0) [ 640.125544][T15156] kvm: vcpu 0: requested lapic timer restore with starting count register 0x390=3276806403 (6553612806 ns) > initial count (3863496606 ns). Using initial count to start timer. 20:14:23 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000002c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="044501001a11cb"]}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:14:23 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000000)=""/63, 0x3f) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, r0, 0x0, 0x405) 20:14:23 executing program 5: 20:14:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012", 0x18}], 0x4}}], 0x1, 0x0) 20:14:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 640.917730][T15156] kvm: vcpu 0: requested lapic timer restore with starting count register 0x390=3276806403 (6553612806 ns) > initial count (3863496606 ns). Using initial count to start timer. 20:14:24 executing program 0: socket$inet6(0xa, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)=0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62160555, 0x0, 0x0, 0x8]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000780)={"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"}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x275a, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, &(0x7f0000000100)={r5}) ioctl$DRM_IOCTL_LOCK(r4, 0x4008642a, &(0x7f0000000140)={r5, 0x21}) ioctl$DRM_IOCTL_SWITCH_CTX(r3, 0x40086424, &(0x7f0000000040)={r5, 0x2}) 20:14:24 executing program 5: 20:14:24 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000002c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="044501001a11cb"]}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:14:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000000)=""/63, 0x3f) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, r0, 0x0, 0x405) 20:14:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c0", 0x17}], 0x4}}], 0x1, 0x0) 20:14:24 executing program 5: [ 641.509459][T15205] kvm: vcpu 0: requested lapic timer restore with starting count register 0x390=3276806403 (6553612806 ns) > initial count (3863496606 ns). Using initial count to start timer. 20:14:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c0", 0x17}], 0x4}}], 0x1, 0x0) 20:14:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000000)=""/63, 0x3f) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) sendfile(0xffffffffffffffff, r0, 0x0, 0x405) 20:14:24 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000002c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="044501001a11cb"]}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:14:25 executing program 5: 20:14:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c0", 0x17}], 0x4}}], 0x1, 0x0) 20:14:25 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:14:25 executing program 0: socket$inet6(0xa, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)=0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62160555, 0x0, 0x0, 0x8]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000780)={"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"}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x275a, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, &(0x7f0000000100)={r5}) ioctl$DRM_IOCTL_LOCK(r4, 0x4008642a, &(0x7f0000000140)={r5, 0x21}) ioctl$DRM_IOCTL_SWITCH_CTX(r3, 0x40086424, &(0x7f0000000040)={r5, 0x2}) 20:14:25 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000002c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="044501001a11cb"]}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:14:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000000)=""/63, 0x3f) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) sendfile(0xffffffffffffffff, r0, 0x0, 0x405) 20:14:25 executing program 5: 20:14:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012", 0x18}], 0x3}}], 0x1, 0x0) 20:14:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000000)=""/63, 0x3f) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) sendfile(0xffffffffffffffff, r0, 0x0, 0x405) 20:14:25 executing program 5: 20:14:26 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000002c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="044501001a11cb"]}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:14:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012", 0x18}], 0x3}}], 0x1, 0x0) 20:14:26 executing program 0: socket$inet6(0xa, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)=0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62160555, 0x0, 0x0, 0x8]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000780)={"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"}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x275a, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, &(0x7f0000000100)={r5}) ioctl$DRM_IOCTL_LOCK(r4, 0x4008642a, &(0x7f0000000140)={r5, 0x21}) ioctl$DRM_IOCTL_SWITCH_CTX(r3, 0x40086424, &(0x7f0000000040)={r5, 0x2}) 20:14:26 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000000)=""/63, 0x3f) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, r0, 0x0, 0x405) 20:14:26 executing program 5: 20:14:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:14:26 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000002c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="044501001a11cb"]}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:14:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012", 0x18}], 0x3}}], 0x1, 0x0) 20:14:26 executing program 5: 20:14:26 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000000)=""/63, 0x3f) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, r0, 0x0, 0x405) 20:14:27 executing program 0: socket$inet6(0xa, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)=0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62160555, 0x0, 0x0, 0x8]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000780)={"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"}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x275a, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, &(0x7f0000000100)={r5}) ioctl$DRM_IOCTL_LOCK(r4, 0x4008642a, &(0x7f0000000140)={r5, 0x21}) 20:14:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {0x0}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012", 0x18}], 0x4}}], 0x1, 0x0) 20:14:27 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000002c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="044501001a11cb"]}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:14:27 executing program 5: 20:14:27 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000000)=""/63, 0x3f) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, r0, 0x0, 0x405) 20:14:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {0x0}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012", 0x18}], 0x4}}], 0x1, 0x0) 20:14:27 executing program 0: socket$inet6(0xa, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)=0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62160555, 0x0, 0x0, 0x8]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000780)={"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"}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x275a, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, &(0x7f0000000100)={r5}) ioctl$DRM_IOCTL_LOCK(r4, 0x4008642a, &(0x7f0000000140)={r5, 0x21}) 20:14:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:14:27 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000002c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="044501001a11cb"]}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:14:27 executing program 5: 20:14:27 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000000)=""/63, 0x3f) r3 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, r0, 0x0, 0x405) 20:14:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {0x0}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012", 0x18}], 0x4}}], 0x1, 0x0) 20:14:28 executing program 5: 20:14:28 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000002c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="044501001a11cb"]}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:14:28 executing program 0: socket$inet6(0xa, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)=0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62160555, 0x0, 0x0, 0x8]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000780)={"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"}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x275a, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, &(0x7f0000000100)={r5}) ioctl$DRM_IOCTL_LOCK(r4, 0x4008642a, &(0x7f0000000140)={r5, 0x21}) 20:14:28 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000000)=""/63, 0x3f) r3 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, r0, 0x0, 0x405) 20:14:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012", 0x18}], 0x4}}], 0x1, 0x0) 20:14:28 executing program 5: 20:14:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:14:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012", 0x18}], 0x4}}], 0x1, 0x0) 20:14:29 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000002c0)={0x79}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="044501001a11cb"]}}, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 20:14:29 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000000)=""/63, 0x3f) r3 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, r0, 0x0, 0x405) 20:14:29 executing program 0: socket$inet6(0xa, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)=0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62160555, 0x0, 0x0, 0x8]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000780)={"54abec7338595f275a2292c45ff078f1cbbf04241d1c3421ec9bf61b2221bc18246e74f0001e36735c2ad340bf94ad2a35cfc5d0953a3b2bfd41050051c6765447395415a9b05dffc9957e300168dc46f8377130fd28e50a805a6005ab6167da65430e3fcc214d7893c6d91026b5f5192f346a367dbc8ae5df0fd099b4e7a6dadd7f555b203f504eda86e0e8d8c5f319604db5a686750d03bf3a67210063e9a17ca0a1ccd80a7d57cb034b828b784b14c9e5dd70ca358c6819c3df7f4443dced6d9a56bb54eac6538cc61c5e9ef3bda9feeb62cbe4f0e1d1c7f6cbbcada85dbb247b0551773f0734e6f4733db49c22e497557c2f74bfa0e4af9b6228643f180d9f9e1e2bcdf0c35a5b8c388e728b574a066e190800db7b42573f534b8f60e8f756dc4d8dec7ad58b0474fc002851b265cc72099d43115828ac723e73009150fcf7196b4133e2988d4b0fc459e57293afef8837fa0d5d24b984a95cb4bdc48fc9c6e73ebee6b1a3239b2c0eef7c751ccb9f2dcdc3c69173db48df6b5d6e59e6465283de675a8d053e7f3abf86f43006a5a0c6225a589c12583e767b9d817f17bf690444a18e6f8a35b2cb4b60c191efbb16393560b568ee6c82bed918aa4a34b575ac9966b395aafa7fc3b7f467b484eb7d2617e0a240e8acbc2a7e02b650f7d1be52f462be20faa32dd88eb041e2c46b24ed7ab79c10f05296f5461f4ebda25dd7b9908da4be62e31c7ba45e5b30b7556a062999f43d2dbb9995d2ffff000000000000ce45caa470933c0906807da75cd38533d8f16d875452c543b259e78215011d2be638eab023513cfe0693d3107e17cfc87e038fc7d1db232d15307fe1d2a818d0a4bde2c53d221111ffa646514dd1fbd3c011b058f79c6fb0a31857ea309018bf72180a434611195c975cf5e285777231b6f158ecaf212183600379fe9762277c13cb6cde9cc0178b883fd1f210180e599f8eb33d33a9ff0f70db1de485b2f2434f2707bf9a54bb6aff687c060000005087f4d53a57adf7c97a06dcc61d7733a83dc505d57d8d5c83bf83e345a979307d708756c3f0f1c53a28883b665fda239019f32fc6f07d700d05023e9ef5b66d4b6be57ffd6fe39703fd4eed61535568f47ee51eff8290618e8387d0ba0d00c5bc4585d2d85688af46bb1da08bf42901634cb10e6b03ee276c16980090b59f3c57b428ae0a7ede758c781e2a5a8585e903adde0a0a281a7779a59067d82985655d9138b75042970e11aee4b95b8bcf232473767cca0139b2c2fb40045c6e031950c314015db2524c3f2fe941f249d158a44aa14774e61b2ee185bdfea8f317e440a39533c6db7ffd3c2b626c1e1eab05cebc59526b016cc6a0e4b766c3f00f619d366e5a4378bc15f805a6fb8c94002000"}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x275a, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, &(0x7f0000000100)={r4}) ioctl$DRM_IOCTL_SWITCH_CTX(r3, 0x40086424, &(0x7f0000000040)={r4, 0x2}) 20:14:29 executing program 5: 20:14:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012", 0x18}], 0x4}}], 0x1, 0x0) 20:14:29 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000000)=""/63, 0x3f) bind$alg(0xffffffffffffffff, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r3 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r0, 0x0, 0x405) 20:14:29 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000002c0)={0x79}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="044501001a11cb"]}}, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 20:14:30 executing program 5: 20:14:30 executing program 0: socket$inet6(0xa, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)=0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62160555, 0x0, 0x0, 0x8]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000780)={"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"}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x275a, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, &(0x7f0000000100)={r4}) ioctl$DRM_IOCTL_SWITCH_CTX(r3, 0x40086424, &(0x7f0000000040)={r4, 0x2}) 20:14:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee", 0x20}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012", 0x18}], 0x4}}], 0x1, 0x0) 20:14:30 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:14:30 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000000)=""/63, 0x3f) bind$alg(0xffffffffffffffff, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r3 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r0, 0x0, 0x405) 20:14:30 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000002c0)={0x79}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="044501001a11cb"]}}, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 20:14:30 executing program 5: 20:14:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee", 0x20}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012", 0x18}], 0x4}}], 0x1, 0x0) 20:14:30 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000000)=""/63, 0x3f) bind$alg(0xffffffffffffffff, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r3 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r0, 0x0, 0x405) 20:14:30 executing program 0: socket$inet6(0xa, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)=0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62160555, 0x0, 0x0, 0x8]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000780)={"54abec7338595f275a2292c45ff078f1cbbf04241d1c3421ec9bf61b2221bc18246e74f0001e36735c2ad340bf94ad2a35cfc5d0953a3b2bfd41050051c6765447395415a9b05dffc9957e300168dc46f8377130fd28e50a805a6005ab6167da65430e3fcc214d7893c6d91026b5f5192f346a367dbc8ae5df0fd099b4e7a6dadd7f555b203f504eda86e0e8d8c5f319604db5a686750d03bf3a67210063e9a17ca0a1ccd80a7d57cb034b828b784b14c9e5dd70ca358c6819c3df7f4443dced6d9a56bb54eac6538cc61c5e9ef3bda9feeb62cbe4f0e1d1c7f6cbbcada85dbb247b0551773f0734e6f4733db49c22e497557c2f74bfa0e4af9b6228643f180d9f9e1e2bcdf0c35a5b8c388e728b574a066e190800db7b42573f534b8f60e8f756dc4d8dec7ad58b0474fc002851b265cc72099d43115828ac723e73009150fcf7196b4133e2988d4b0fc459e57293afef8837fa0d5d24b984a95cb4bdc48fc9c6e73ebee6b1a3239b2c0eef7c751ccb9f2dcdc3c69173db48df6b5d6e59e6465283de675a8d053e7f3abf86f43006a5a0c6225a589c12583e767b9d817f17bf690444a18e6f8a35b2cb4b60c191efbb16393560b568ee6c82bed918aa4a34b575ac9966b395aafa7fc3b7f467b484eb7d2617e0a240e8acbc2a7e02b650f7d1be52f462be20faa32dd88eb041e2c46b24ed7ab79c10f05296f5461f4ebda25dd7b9908da4be62e31c7ba45e5b30b7556a062999f43d2dbb9995d2ffff000000000000ce45caa470933c0906807da75cd38533d8f16d875452c543b259e78215011d2be638eab023513cfe0693d3107e17cfc87e038fc7d1db232d15307fe1d2a818d0a4bde2c53d221111ffa646514dd1fbd3c011b058f79c6fb0a31857ea309018bf72180a434611195c975cf5e285777231b6f158ecaf212183600379fe9762277c13cb6cde9cc0178b883fd1f210180e599f8eb33d33a9ff0f70db1de485b2f2434f2707bf9a54bb6aff687c060000005087f4d53a57adf7c97a06dcc61d7733a83dc505d57d8d5c83bf83e345a979307d708756c3f0f1c53a28883b665fda239019f32fc6f07d700d05023e9ef5b66d4b6be57ffd6fe39703fd4eed61535568f47ee51eff8290618e8387d0ba0d00c5bc4585d2d85688af46bb1da08bf42901634cb10e6b03ee276c16980090b59f3c57b428ae0a7ede758c781e2a5a8585e903adde0a0a281a7779a59067d82985655d9138b75042970e11aee4b95b8bcf232473767cca0139b2c2fb40045c6e031950c314015db2524c3f2fe941f249d158a44aa14774e61b2ee185bdfea8f317e440a39533c6db7ffd3c2b626c1e1eab05cebc59526b016cc6a0e4b766c3f00f619d366e5a4378bc15f805a6fb8c94002000"}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x275a, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, &(0x7f0000000100)={r4}) ioctl$DRM_IOCTL_SWITCH_CTX(r3, 0x40086424, &(0x7f0000000040)={r4, 0x2}) 20:14:31 executing program 5: 20:14:31 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="044501001a11cb"]}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:14:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee", 0x20}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012", 0x18}], 0x4}}], 0x1, 0x0) [ 648.207280][T15427] kvm: vcpu 0: requested lapic timer restore with starting count register 0x390=3276806403 (6553612806 ns) > initial count (3863496606 ns). Using initial count to start timer. 20:14:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, r0, 0x0, 0x405) 20:14:31 executing program 5: 20:14:31 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x0, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:14:32 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="044501001a11cb"]}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:14:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84", 0x30}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012", 0x18}], 0x4}}], 0x1, 0x0) 20:14:32 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, r0, 0x0, 0x405) 20:14:32 executing program 0: socket$inet6(0xa, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)=0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62160555, 0x0, 0x0, 0x8]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000780)={"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"}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x275a, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r3, 0x40086424, &(0x7f0000000040)={r4, 0x2}) 20:14:32 executing program 5: 20:14:32 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="044501001a11cb"]}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:14:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84", 0x30}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012", 0x18}], 0x4}}], 0x1, 0x0) 20:14:32 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, r0, 0x0, 0x405) 20:14:32 executing program 5: 20:14:33 executing program 0: socket$inet6(0xa, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)=0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62160555, 0x0, 0x0, 0x8]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000780)={"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"}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x275a, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r3, 0x40086424, &(0x7f0000000040)={r4, 0x2}) 20:14:33 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x0, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:14:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84", 0x30}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012", 0x18}], 0x4}}], 0x1, 0x0) 20:14:33 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f00000002c0)={0x79}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r0, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="044501001a11cb"]}}, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 20:14:33 executing program 5: 20:14:33 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) read(r0, &(0x7f0000000000)=""/63, 0x3f) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) sendfile(r3, r0, 0x0, 0x405) [ 650.326869][T15486] kvm: vcpu 0: requested lapic timer restore with starting count register 0x390=3276806403 (6553612806 ns) > initial count (3863496606 ns). Using initial count to start timer. 20:14:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb", 0x38}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012", 0x18}], 0x4}}], 0x1, 0x0) 20:14:33 executing program 5: 20:14:33 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f00000002c0)={0x79}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r0, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="044501001a11cb"]}}, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 20:14:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) read(r0, &(0x7f0000000000)=""/63, 0x3f) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x405) 20:14:34 executing program 5: 20:14:34 executing program 0: socket$inet6(0xa, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)=0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62160555, 0x0, 0x0, 0x8]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000780)={"54abec7338595f275a2292c45ff078f1cbbf04241d1c3421ec9bf61b2221bc18246e74f0001e36735c2ad340bf94ad2a35cfc5d0953a3b2bfd41050051c6765447395415a9b05dffc9957e300168dc46f8377130fd28e50a805a6005ab6167da65430e3fcc214d7893c6d91026b5f5192f346a367dbc8ae5df0fd099b4e7a6dadd7f555b203f504eda86e0e8d8c5f319604db5a686750d03bf3a67210063e9a17ca0a1ccd80a7d57cb034b828b784b14c9e5dd70ca358c6819c3df7f4443dced6d9a56bb54eac6538cc61c5e9ef3bda9feeb62cbe4f0e1d1c7f6cbbcada85dbb247b0551773f0734e6f4733db49c22e497557c2f74bfa0e4af9b6228643f180d9f9e1e2bcdf0c35a5b8c388e728b574a066e190800db7b42573f534b8f60e8f756dc4d8dec7ad58b0474fc002851b265cc72099d43115828ac723e73009150fcf7196b4133e2988d4b0fc459e57293afef8837fa0d5d24b984a95cb4bdc48fc9c6e73ebee6b1a3239b2c0eef7c751ccb9f2dcdc3c69173db48df6b5d6e59e6465283de675a8d053e7f3abf86f43006a5a0c6225a589c12583e767b9d817f17bf690444a18e6f8a35b2cb4b60c191efbb16393560b568ee6c82bed918aa4a34b575ac9966b395aafa7fc3b7f467b484eb7d2617e0a240e8acbc2a7e02b650f7d1be52f462be20faa32dd88eb041e2c46b24ed7ab79c10f05296f5461f4ebda25dd7b9908da4be62e31c7ba45e5b30b7556a062999f43d2dbb9995d2ffff000000000000ce45caa470933c0906807da75cd38533d8f16d875452c543b259e78215011d2be638eab023513cfe0693d3107e17cfc87e038fc7d1db232d15307fe1d2a818d0a4bde2c53d221111ffa646514dd1fbd3c011b058f79c6fb0a31857ea309018bf72180a434611195c975cf5e285777231b6f158ecaf212183600379fe9762277c13cb6cde9cc0178b883fd1f210180e599f8eb33d33a9ff0f70db1de485b2f2434f2707bf9a54bb6aff687c060000005087f4d53a57adf7c97a06dcc61d7733a83dc505d57d8d5c83bf83e345a979307d708756c3f0f1c53a28883b665fda239019f32fc6f07d700d05023e9ef5b66d4b6be57ffd6fe39703fd4eed61535568f47ee51eff8290618e8387d0ba0d00c5bc4585d2d85688af46bb1da08bf42901634cb10e6b03ee276c16980090b59f3c57b428ae0a7ede758c781e2a5a8585e903adde0a0a281a7779a59067d82985655d9138b75042970e11aee4b95b8bcf232473767cca0139b2c2fb40045c6e031950c314015db2524c3f2fe941f249d158a44aa14774e61b2ee185bdfea8f317e440a39533c6db7ffd3c2b626c1e1eab05cebc59526b016cc6a0e4b766c3f00f619d366e5a4378bc15f805a6fb8c94002000"}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x275a, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r3, 0x40086424, &(0x7f0000000040)={r4, 0x2}) 20:14:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') read(r0, &(0x7f0000000000)=""/63, 0x3f) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x405) 20:14:34 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x0, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:14:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb", 0x38}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012", 0x18}], 0x4}}], 0x1, 0x0) 20:14:34 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f00000002c0)={0x79}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r0, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="044501001a11cb"]}}, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 20:14:34 executing program 5: 20:14:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb", 0x38}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012", 0x18}], 0x4}}], 0x1, 0x0) 20:14:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') read(r0, &(0x7f0000000000)=""/63, 0x3f) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x405) 20:14:35 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f00000002c0)={0x79}) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="044501001a11cb"]}}, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 20:14:35 executing program 0: socket$inet6(0xa, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)=0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62160555, 0x0, 0x0, 0x8]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000780)={"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"}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x275a, 0x0) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, &(0x7f0000000100)) ioctl$DRM_IOCTL_SWITCH_CTX(r3, 0x40086424, &(0x7f0000000040)={0x0, 0x2}) 20:14:35 executing program 5: 20:14:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a", 0x3c}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012", 0x18}], 0x4}}], 0x1, 0x0) 20:14:35 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f00000002c0)={0x79}) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="044501001a11cb"]}}, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 652.378665][T15544] kvm: vcpu 0: requested lapic timer restore with starting count register 0x390=3276806403 (6553612806 ns) > initial count (3863496606 ns). Using initial count to start timer. 20:14:35 executing program 1: read(0xffffffffffffffff, &(0x7f0000000000)=""/63, 0x3f) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x405) 20:14:35 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:14:35 executing program 5: 20:14:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a", 0x3c}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012", 0x18}], 0x4}}], 0x1, 0x0) 20:14:36 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f00000002c0)={0x79}) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="044501001a11cb"]}}, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 20:14:36 executing program 1: read(0xffffffffffffffff, &(0x7f0000000000)=""/63, 0x3f) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x405) 20:14:36 executing program 5: 20:14:36 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:14:36 executing program 0: socket$inet6(0xa, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)=0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62160555, 0x0, 0x0, 0x8]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000780)={"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"}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, &(0x7f0000000100)) ioctl$DRM_IOCTL_SWITCH_CTX(r3, 0x40086424, &(0x7f0000000040)={0x0, 0x2}) 20:14:36 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000002c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="044501001a11cb"]}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:14:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a", 0x3c}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012", 0x18}], 0x4}}], 0x1, 0x0) 20:14:36 executing program 5: 20:14:36 executing program 1: read(0xffffffffffffffff, &(0x7f0000000000)=""/63, 0x3f) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x405) 20:14:37 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:14:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c7", 0x3e}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012", 0x18}], 0x4}}], 0x1, 0x0) 20:14:37 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000002c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="044501001a11cb"]}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:14:37 executing program 5: 20:14:37 executing program 0: socket$inet6(0xa, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)=0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62160555, 0x0, 0x0, 0x8]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000780)={"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"}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, &(0x7f0000000100)) ioctl$DRM_IOCTL_SWITCH_CTX(r3, 0x40086424, &(0x7f0000000040)={0x0, 0x2}) 20:14:37 executing program 1: r0 = syz_open_procfs(0x0, 0x0) read(r0, &(0x7f0000000000)=""/63, 0x3f) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x405) 20:14:37 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 20:14:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c7", 0x3e}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012", 0x18}], 0x4}}], 0x1, 0x0) 20:14:37 executing program 5: [ 654.644465][T15613] kvm: vcpu 0: requested lapic timer restore with starting count register 0x390=3276806403 (6553612806 ns) > initial count (3863496606 ns). Using initial count to start timer. 20:14:37 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000002c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="044501001a11cb"]}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:14:37 executing program 1: r0 = syz_open_procfs(0x0, 0x0) read(r0, &(0x7f0000000000)=""/63, 0x3f) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x405) 20:14:38 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 20:14:38 executing program 5: 20:14:38 executing program 1: r0 = syz_open_procfs(0x0, 0x0) read(r0, &(0x7f0000000000)=""/63, 0x3f) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x405) 20:14:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000001c0)="350e6582f048a0943bf319a9c47f4e32f3e881d6a4bcf7718a0d0daa9701706e1fd0697e34f2078e6ad492141a8916c3ef3aa48da4d7303675bac61fb54b147de9fe16fe0edfab616b8e371e959a5dca475ece256de38e28876d0bcc6b9f224d537cbe8e498609ec5f0a2d00ba19da911cea034ed0032eeb970d29e3b7a91b7c31e9d73affa0e624a81e6f81557b74a5b654e66ba37c475f4ea77bcc58d196ad35756670833c69ea966925", 0xab}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c7", 0x3e}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012", 0x18}], 0x4}}], 0x1, 0x0) 20:14:38 executing program 0: socket$inet6(0xa, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)=0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62160555, 0x0, 0x0, 0x8]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000780)={"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"}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = dup(0xffffffffffffffff) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, &(0x7f0000000100)) ioctl$DRM_IOCTL_SWITCH_CTX(r3, 0x40086424, &(0x7f0000000040)={0x0, 0x2}) 20:14:38 executing program 3: write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000002c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="044501001a11cb"]}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:14:38 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 20:14:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r1, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f00000009c0)={0x14}, 0x14}}, 0x8000) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/snmp6\x00') sendfile(r1, r2, 0x0, 0x400) 20:14:38 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') read(0xffffffffffffffff, &(0x7f0000000000)=""/63, 0x3f) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x405) 20:14:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="328c683a2d2be54d4748f51a0744", 0xe}, {&(0x7f00000002c0)="3f3f7df2625445959821702a239e04b2add1446c5a81b1009bcf46ab687ff5ee5d7b43ac3fd5d585a8242ebd517a5a84ec451299a71afebb6c87a67a63c707", 0x3f}, {&(0x7f0000000340)="4a06b763fa8d21c80ef2d63ab976f281b0e0b871bc50c012", 0x18}], 0x3}}], 0x1, 0x0) [ 656.045336][T15664] ===================================================== [ 656.052352][T15664] BUG: KMSAN: uninit-value in sha256_update+0x8c72/0x9090 [ 656.059487][T15664] CPU: 0 PID: 15664 Comm: syz-executor.5 Not tainted 5.8.0-rc5-syzkaller #0 [ 656.068176][T15664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 656.078257][T15664] Call Trace: [ 656.081587][T15664] dump_stack+0x1df/0x240 [ 656.085952][T15664] kmsan_report+0xf7/0x1e0 [ 656.090396][T15664] __msan_warning+0x58/0xa0 [ 656.094928][T15664] sha256_update+0x8c72/0x9090 [ 656.099721][T15664] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 656.105806][T15664] ? update_stack_state+0xa18/0xb40 [ 656.111034][T15664] ? kmsan_task_context_state+0x47/0x90 [ 656.116611][T15664] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 656.122701][T15664] ? update_stack_state+0xa18/0xb40 [ 656.127931][T15664] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 656.134024][T15664] ? __module_address+0x68/0x600 [ 656.139006][T15664] ? is_module_text_address+0x4d/0x2a0 [ 656.144512][T15664] ? unwind_get_return_address+0x8c/0x130 [ 656.150267][T15664] ? entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 656.156823][T15664] ? arch_stack_walk+0x2a2/0x3e0 [ 656.161784][T15664] ? stack_trace_save+0x1a0/0x1a0 [ 656.166851][T15664] crypto_sha256_finup+0xa3/0x1b0 [ 656.171907][T15664] ? crypto_sha256_update+0xb0/0xb0 [ 656.177134][T15664] crypto_shash_finup+0x2b4/0x6b0 [ 656.182383][T15664] ? crypto_hash_walk_first+0x1fd/0x360 [ 656.187956][T15664] ? kmsan_get_metadata+0x11d/0x180 [ 656.193190][T15664] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 656.199027][T15664] shash_ahash_finup+0x266/0x740 [ 656.204009][T15664] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 656.210104][T15664] ? kmsan_get_metadata+0x11d/0x180 [ 656.215326][T15664] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 656.221177][T15664] ? kmsan_get_metadata+0x11d/0x180 [ 656.226403][T15664] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 656.232245][T15664] shash_async_finup+0xbb/0x110 [ 656.237137][T15664] crypto_ahash_op+0x1c6/0x6c0 [ 656.241943][T15664] ? kmsan_get_metadata+0x11d/0x180 [ 656.247161][T15664] ? kmsan_get_metadata+0x11d/0x180 [ 656.252380][T15664] ? shash_async_final+0x470/0x470 [ 656.257518][T15664] ? shash_async_final+0x470/0x470 [ 656.262663][T15664] crypto_ahash_finup+0x8c/0xb0 [ 656.267543][T15664] hash_sendpage+0x870/0xdf0 [ 656.272185][T15664] ? hash_recvmsg+0xd30/0xd30 [ 656.276889][T15664] sock_sendpage+0x1e1/0x2c0 [ 656.281516][T15664] pipe_to_sendpage+0x38c/0x4c0 [ 656.286427][T15664] ? sock_fasync+0x250/0x250 [ 656.291074][T15664] __splice_from_pipe+0x565/0xf00 [ 656.296131][T15664] ? generic_splice_sendpage+0x2d0/0x2d0 [ 656.301820][T15664] generic_splice_sendpage+0x1d5/0x2d0 [ 656.307319][T15664] ? iter_file_splice_write+0x1800/0x1800 [ 656.313059][T15664] direct_splice_actor+0x1fd/0x580 [ 656.318199][T15664] ? kmsan_get_metadata+0x4f/0x180 [ 656.323346][T15664] splice_direct_to_actor+0x6b2/0xf50 [ 656.328734][T15664] ? do_splice_direct+0x580/0x580 [ 656.333808][T15664] do_splice_direct+0x342/0x580 [ 656.338702][T15664] do_sendfile+0x101b/0x1d40 [ 656.343346][T15664] __se_compat_sys_sendfile+0x301/0x3c0 [ 656.348918][T15664] ? kmsan_get_metadata+0x11d/0x180 [ 656.354132][T15664] ? __ia32_sys_sendfile64+0x70/0x70 [ 656.359436][T15664] __ia32_compat_sys_sendfile+0x56/0x70 [ 656.365006][T15664] __do_fast_syscall_32+0x2aa/0x400 [ 656.370234][T15664] do_fast_syscall_32+0x6b/0xd0 [ 656.375108][T15664] do_SYSENTER_32+0x73/0x90 [ 656.379638][T15664] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 656.386003][T15664] RIP: 0023:0xf7f62549 [ 656.390071][T15664] Code: Bad RIP value. [ 656.394143][T15664] RSP: 002b:00000000f5d5d0cc EFLAGS: 00000296 ORIG_RAX: 00000000000000bb [ 656.402567][T15664] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000000005 [ 656.410640][T15664] RDX: 0000000000000000 RSI: 0000000000000400 RDI: 0000000000000000 [ 656.418625][T15664] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 656.426607][T15664] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 656.434587][T15664] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 656.442584][T15664] [ 656.444910][T15664] Uninit was stored to memory at: [ 656.449944][T15664] kmsan_internal_chain_origin+0xad/0x130 [ 656.455673][T15664] kmsan_memcpy_memmove_metadata+0x272/0x2e0 [ 656.461676][T15664] kmsan_memcpy_metadata+0xb/0x10 [ 656.466702][T15664] __msan_memcpy+0x43/0x50 [ 656.471125][T15664] sha256_update+0x229/0x9090 [ 656.475807][T15664] crypto_sha256_finup+0xa3/0x1b0 [ 656.480834][T15664] crypto_shash_finup+0x2b4/0x6b0 [ 656.485857][T15664] shash_ahash_finup+0x266/0x740 [ 656.490800][T15664] shash_async_finup+0xbb/0x110 [ 656.495787][T15664] crypto_ahash_op+0x1c6/0x6c0 [ 656.500674][T15664] crypto_ahash_finup+0x8c/0xb0 [ 656.505530][T15664] hash_sendpage+0x870/0xdf0 [ 656.510130][T15664] sock_sendpage+0x1e1/0x2c0 [ 656.514724][T15664] pipe_to_sendpage+0x38c/0x4c0 [ 656.519578][T15664] __splice_from_pipe+0x565/0xf00 [ 656.524611][T15664] generic_splice_sendpage+0x1d5/0x2d0 [ 656.530079][T15664] direct_splice_actor+0x1fd/0x580 [ 656.535200][T15664] splice_direct_to_actor+0x6b2/0xf50 [ 656.540587][T15664] do_splice_direct+0x342/0x580 [ 656.545452][T15664] do_sendfile+0x101b/0x1d40 [ 656.550051][T15664] __se_compat_sys_sendfile+0x301/0x3c0 [ 656.557103][T15664] __ia32_compat_sys_sendfile+0x56/0x70 [ 656.562662][T15664] __do_fast_syscall_32+0x2aa/0x400 [ 656.567868][T15664] do_fast_syscall_32+0x6b/0xd0 [ 656.573851][T15664] do_SYSENTER_32+0x73/0x90 [ 656.578361][T15664] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 656.584677][T15664] [ 656.587047][T15664] Uninit was created at: [ 656.591323][T15664] kmsan_save_stack_with_flags+0x3c/0x90 [ 656.596972][T15664] kmsan_alloc_page+0xb9/0x180 [ 656.601739][T15664] __alloc_pages_nodemask+0x56a2/0x5dc0 [ 656.607283][T15664] alloc_pages_current+0x672/0x990 [ 656.612401][T15664] push_pipe+0x605/0xb70 [ 656.616645][T15664] iov_iter_get_pages_alloc+0x18a9/0x21c0 [ 656.622363][T15664] do_splice_to+0x4fc/0x14f0 [ 656.626955][T15664] splice_direct_to_actor+0x45c/0xf50 [ 656.632335][T15664] do_splice_direct+0x342/0x580 [ 656.637185][T15664] do_sendfile+0x101b/0x1d40 [ 656.641777][T15664] __se_compat_sys_sendfile+0x301/0x3c0 [ 656.647324][T15664] __ia32_compat_sys_sendfile+0x56/0x70 [ 656.652874][T15664] __do_fast_syscall_32+0x2aa/0x400 [ 656.658090][T15664] do_fast_syscall_32+0x6b/0xd0 [ 656.662965][T15664] do_SYSENTER_32+0x73/0x90 [ 656.667474][T15664] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 656.673794][T15664] ===================================================== [ 656.680722][T15664] Disabling lock debugging due to kernel taint [ 656.686873][T15664] Kernel panic - not syncing: panic_on_warn set ... [ 656.693474][T15664] CPU: 0 PID: 15664 Comm: syz-executor.5 Tainted: G B 5.8.0-rc5-syzkaller #0 [ 656.703531][T15664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 656.713591][T15664] Call Trace: [ 656.716902][T15664] dump_stack+0x1df/0x240 [ 656.721251][T15664] panic+0x3d5/0xc3e [ 656.725209][T15664] kmsan_report+0x1df/0x1e0 [ 656.729730][T15664] __msan_warning+0x58/0xa0 [ 656.734248][T15664] sha256_update+0x8c72/0x9090 [ 656.739026][T15664] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 656.745099][T15664] ? update_stack_state+0xa18/0xb40 [ 656.750312][T15664] ? kmsan_task_context_state+0x47/0x90 [ 656.755865][T15664] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 656.761940][T15664] ? update_stack_state+0xa18/0xb40 [ 656.767160][T15664] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 656.773238][T15664] ? __module_address+0x68/0x600 [ 656.778208][T15664] ? is_module_text_address+0x4d/0x2a0 [ 656.783701][T15664] ? unwind_get_return_address+0x8c/0x130 [ 656.789437][T15664] ? entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 656.795948][T15664] ? arch_stack_walk+0x2a2/0x3e0 [ 656.800909][T15664] ? stack_trace_save+0x1a0/0x1a0 [ 656.805958][T15664] crypto_sha256_finup+0xa3/0x1b0 [ 656.811005][T15664] ? crypto_sha256_update+0xb0/0xb0 [ 656.816228][T15664] crypto_shash_finup+0x2b4/0x6b0 [ 656.821284][T15664] ? crypto_hash_walk_first+0x1fd/0x360 [ 656.826838][T15664] ? kmsan_get_metadata+0x11d/0x180 [ 656.832054][T15664] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 656.837867][T15664] shash_ahash_finup+0x266/0x740 [ 656.842824][T15664] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 656.848907][T15664] ? kmsan_get_metadata+0x11d/0x180 [ 656.854115][T15664] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 656.859930][T15664] ? kmsan_get_metadata+0x11d/0x180 [ 656.865157][T15664] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 656.870979][T15664] shash_async_finup+0xbb/0x110 [ 656.875846][T15664] crypto_ahash_op+0x1c6/0x6c0 [ 656.880623][T15664] ? kmsan_get_metadata+0x11d/0x180 [ 656.885829][T15664] ? kmsan_get_metadata+0x11d/0x180 [ 656.891033][T15664] ? shash_async_final+0x470/0x470 [ 656.896149][T15664] ? shash_async_final+0x470/0x470 [ 656.901290][T15664] crypto_ahash_finup+0x8c/0xb0 [ 656.906155][T15664] hash_sendpage+0x870/0xdf0 [ 656.910783][T15664] ? hash_recvmsg+0xd30/0xd30 [ 656.915488][T15664] sock_sendpage+0x1e1/0x2c0 [ 656.920108][T15664] pipe_to_sendpage+0x38c/0x4c0 [ 656.924964][T15664] ? sock_fasync+0x250/0x250 [ 656.929609][T15664] __splice_from_pipe+0x565/0xf00 [ 656.934656][T15664] ? generic_splice_sendpage+0x2d0/0x2d0 [ 656.940334][T15664] generic_splice_sendpage+0x1d5/0x2d0 [ 656.945860][T15664] ? iter_file_splice_write+0x1800/0x1800 [ 656.951596][T15664] direct_splice_actor+0x1fd/0x580 [ 656.956731][T15664] ? kmsan_get_metadata+0x4f/0x180 [ 656.961862][T15664] splice_direct_to_actor+0x6b2/0xf50 [ 656.967243][T15664] ? do_splice_direct+0x580/0x580 [ 656.972310][T15664] do_splice_direct+0x342/0x580 [ 656.977193][T15664] do_sendfile+0x101b/0x1d40 [ 656.981835][T15664] __se_compat_sys_sendfile+0x301/0x3c0 [ 656.987403][T15664] ? kmsan_get_metadata+0x11d/0x180 [ 656.992608][T15664] ? __ia32_sys_sendfile64+0x70/0x70 [ 656.997904][T15664] __ia32_compat_sys_sendfile+0x56/0x70 [ 657.003468][T15664] __do_fast_syscall_32+0x2aa/0x400 [ 657.008692][T15664] do_fast_syscall_32+0x6b/0xd0 [ 657.013554][T15664] do_SYSENTER_32+0x73/0x90 [ 657.018092][T15664] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 657.024438][T15664] RIP: 0023:0xf7f62549 [ 657.028506][T15664] Code: Bad RIP value. [ 657.032571][T15664] RSP: 002b:00000000f5d5d0cc EFLAGS: 00000296 ORIG_RAX: 00000000000000bb [ 657.041074][T15664] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000000005 [ 657.049056][T15664] RDX: 0000000000000000 RSI: 0000000000000400 RDI: 0000000000000000 [ 657.057042][T15664] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 657.065036][T15664] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 657.073020][T15664] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 657.082167][T15664] Kernel Offset: 0x16a00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 657.093804][T15664] Rebooting in 86400 seconds..